[ { "id": 581073273, "name": "CVE-2023-50164", "full_name": "minhbao15677\/CVE-2023-50164", "owner": { "login": "minhbao15677", "id": 29054035, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29054035?v=4", "html_url": "https:\/\/github.com\/minhbao15677", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/minhbao15677\/CVE-2023-50164", "description": null, "fork": false, "created_at": "2022-12-22T07:49:13Z", "updated_at": "2024-04-26T02:52:45Z", "pushed_at": "2024-04-26T02:52:42Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 731065261, "name": "CVE-2023-50164-Apache-Struts-RCE", "full_name": "jakabakos\/CVE-2023-50164-Apache-Struts-RCE", "owner": { "login": "jakabakos", "id": 42498816, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4", "html_url": "https:\/\/github.com\/jakabakos", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-50164-Apache-Struts-RCE", "description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).", "fork": false, "created_at": "2023-12-13T09:31:36Z", "updated_at": "2024-12-23T13:10:55Z", "pushed_at": "2024-08-30T06:37:53Z", "stargazers_count": 82, "watchers_count": 82, "has_discussions": false, "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 22, "watchers": 82, "score": 0, "subscribers_count": 4 }, { "id": 732181811, "name": "CVE-2023-50164", "full_name": "bcdannyboy\/CVE-2023-50164", "owner": { "login": "bcdannyboy", "id": 12553297, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4", "html_url": "https:\/\/github.com\/bcdannyboy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-50164", "description": "A scanning utility and PoC for CVE-2023-50164", "fork": false, "created_at": "2023-12-15T21:19:51Z", "updated_at": "2024-06-05T13:33:18Z", "pushed_at": "2023-12-15T23:50:17Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 732688819, "name": "cve-2023-50164-poc", "full_name": "dwisiswant0\/cve-2023-50164-poc", "owner": { "login": "dwisiswant0", "id": 25837540, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4", "html_url": "https:\/\/github.com\/dwisiswant0", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dwisiswant0\/cve-2023-50164-poc", "description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")", "fork": false, "created_at": "2023-12-17T14:18:54Z", "updated_at": "2025-01-14T03:51:06Z", "pushed_at": "2023-12-18T02:46:21Z", "stargazers_count": 58, "watchers_count": 58, "has_discussions": true, "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 16, "watchers": 58, "score": 0, "subscribers_count": 3 }, { "id": 732950140, "name": "cve-2023-50164", "full_name": "helsecert\/cve-2023-50164", "owner": { "login": "helsecert", "id": 2202200, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202200?v=4", "html_url": "https:\/\/github.com\/helsecert", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/helsecert\/cve-2023-50164", "description": null, "fork": false, "created_at": "2023-12-18T08:24:26Z", "updated_at": "2024-01-13T09:38:24Z", "pushed_at": "2023-12-18T13:29:47Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 6 }, { "id": 733837034, "name": "CVE-2023-50164-Apache-Struts-RCE", "full_name": "Thirukrishnan\/CVE-2023-50164-Apache-Struts-RCE", "owner": { "login": "Thirukrishnan", "id": 63901950, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63901950?v=4", "html_url": "https:\/\/github.com\/Thirukrishnan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Thirukrishnan\/CVE-2023-50164-Apache-Struts-RCE", "description": null, "fork": false, "created_at": "2023-12-20T08:39:54Z", "updated_at": "2024-01-23T11:26:28Z", "pushed_at": "2023-12-20T09:51:45Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 733839177, "name": "CVE-2023-50164-ApacheStruts2-Docker", "full_name": "Trackflaw\/CVE-2023-50164-ApacheStruts2-Docker", "owner": { "login": "Trackflaw", "id": 78696986, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4", "html_url": "https:\/\/github.com\/Trackflaw", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2023-50164-ApacheStruts2-Docker", "description": "Vulnerable docker container for Apache Struts 2 RCE CVE-2023-50164", "fork": false, "created_at": "2023-12-20T08:46:19Z", "updated_at": "2024-05-14T07:52:52Z", "pushed_at": "2023-12-20T12:57:28Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 734560456, "name": "cve-2023-50164", "full_name": "miles3719\/cve-2023-50164", "owner": { "login": "miles3719", "id": 104630628, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104630628?v=4", "html_url": "https:\/\/github.com\/miles3719", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/miles3719\/cve-2023-50164", "description": null, "fork": false, "created_at": "2023-12-22T02:15:36Z", "updated_at": "2023-12-22T02:15:36Z", "pushed_at": "2023-12-22T02:15:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 734561364, "name": "cve-2023-50164", "full_name": "aaronm-sysdig\/cve-2023-50164", "owner": { "login": "aaronm-sysdig", "id": 132866139, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132866139?v=4", "html_url": "https:\/\/github.com\/aaronm-sysdig", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/aaronm-sysdig\/cve-2023-50164", "description": null, "fork": false, "created_at": "2023-12-22T02:20:11Z", "updated_at": "2024-01-13T09:38:29Z", "pushed_at": "2024-01-01T03:25:58Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 737392401, "name": "CVE-2023-50164-POC", "full_name": "snyk-labs\/CVE-2023-50164-POC", "owner": { "login": "snyk-labs", "id": 47793611, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47793611?v=4", "html_url": "https:\/\/github.com\/snyk-labs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/snyk-labs\/CVE-2023-50164-POC", "description": null, "fork": false, "created_at": "2023-12-30T21:37:08Z", "updated_at": "2024-11-29T05:49:34Z", "pushed_at": "2024-01-16T14:59:23Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 7 }, { "id": 742353008, "name": "CVE-2023-50164-PoC", "full_name": "sunnyvale-it\/CVE-2023-50164-PoC", "owner": { "login": "sunnyvale-it", "id": 44291039, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4", "html_url": "https:\/\/github.com\/sunnyvale-it", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2023-50164-PoC", "description": "CVE-2023-50164 (Apache Struts path traversal to RCE vulnerability) - Proof of Concept", "fork": false, "created_at": "2024-01-12T09:34:57Z", "updated_at": "2024-01-25T20:19:52Z", "pushed_at": "2024-01-16T13:05:54Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 0 }, { "id": 787494467, "name": "CVE-2023-50164Analysis-", "full_name": "AsfandAliMemon25\/CVE-2023-50164Analysis-", "owner": { "login": "AsfandAliMemon25", "id": 154571318, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154571318?v=4", "html_url": "https:\/\/github.com\/AsfandAliMemon25", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AsfandAliMemon25\/CVE-2023-50164Analysis-", "description": "CVE-2023-50164 An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.", "fork": false, "created_at": "2024-04-16T16:20:04Z", "updated_at": "2024-04-24T12:11:57Z", "pushed_at": "2024-04-16T17:09:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "dockerfile", "exploit", "vulnerability", "webapplications" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 868505012, "name": "CVE-2023-50164-PoC", "full_name": "NikitaPark\/CVE-2023-50164-PoC", "owner": { "login": "NikitaPark", "id": 25609921, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25609921?v=4", "html_url": "https:\/\/github.com\/NikitaPark", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NikitaPark\/CVE-2023-50164-PoC", "description": "CVE-2023-50164 PoC Application & Exploit script", "fork": false, "created_at": "2024-10-06T14:58:26Z", "updated_at": "2024-12-17T06:08:14Z", "pushed_at": "2024-10-09T11:18:48Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 891621160, "name": "CVE-2024-10924-Wordpress-Docker", "full_name": "Trackflaw\/CVE-2024-10924-Wordpress-Docker", "owner": { "login": "Trackflaw", "id": 78696986, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4", "html_url": "https:\/\/github.com\/Trackflaw", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-10924-Wordpress-Docker", "description": "Vulnerable docker container for Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass CVE-2023-50164", "fork": false, "created_at": "2024-11-20T16:50:24Z", "updated_at": "2024-11-25T19:41:23Z", "pushed_at": "2024-11-22T09:28:08Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0, "subscribers_count": 1 } ]