[ { "id": 84158718, "name": "S2-045", "full_name": "PolarisLab\/S2-045", "owner": { "login": "PolarisLab", "id": 25890110, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4", "html_url": "https:\/\/github.com\/PolarisLab" }, "html_url": "https:\/\/github.com\/PolarisLab\/S2-045", "description": "Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http:\/\/www.mottoin.com\/97954.html", "fork": false, "created_at": "2017-03-07T05:30:30Z", "updated_at": "2022-03-22T17:04:53Z", "pushed_at": "2017-03-07T05:37:55Z", "stargazers_count": 24, "watchers_count": 24, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 12, "watchers": 24, "score": 0 }, { "id": 84186490, "name": "Struts2-045-Exp", "full_name": "Flyteas\/Struts2-045-Exp", "owner": { "login": "Flyteas", "id": 15673913, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15673913?v=4", "html_url": "https:\/\/github.com\/Flyteas" }, "html_url": "https:\/\/github.com\/Flyteas\/Struts2-045-Exp", "description": "Struts2 S2-045(CVE-2017-5638)Exp with GUI", "fork": false, "created_at": "2017-03-07T10:30:20Z", "updated_at": "2021-12-24T03:37:36Z", "pushed_at": "2017-03-13T06:30:41Z", "stargazers_count": 62, "watchers_count": 62, "forks_count": 28, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 28, "watchers": 62, "score": 0 }, { "id": 84277596, "name": "cve-2017-5638", "full_name": "bongbongco\/cve-2017-5638", "owner": { "login": "bongbongco", "id": 3170006, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4", "html_url": "https:\/\/github.com\/bongbongco" }, "html_url": "https:\/\/github.com\/bongbongco\/cve-2017-5638", "description": null, "fork": false, "created_at": "2017-03-08T04:17:33Z", "updated_at": "2017-03-08T04:31:28Z", "pushed_at": "2017-03-08T04:31:26Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 84481525, "name": "S2-045-EXP-POC-TOOLS", "full_name": "jas502n\/S2-045-EXP-POC-TOOLS", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/S2-045-EXP-POC-TOOLS", "description": "S2-045 漏洞 POC-TOOLS CVE-2017-5638", "fork": false, "created_at": "2017-03-09T19:40:47Z", "updated_at": "2021-10-24T08:41:34Z", "pushed_at": "2021-08-18T08:18:42Z", "stargazers_count": 25, "watchers_count": 25, "forks_count": 21, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 21, "watchers": 25, "score": 0 }, { "id": 84518902, "name": "strutszeiro", "full_name": "mthbernardes\/strutszeiro", "owner": { "login": "mthbernardes", "id": 12648924, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12648924?v=4", "html_url": "https:\/\/github.com\/mthbernardes" }, "html_url": "https:\/\/github.com\/mthbernardes\/strutszeiro", "description": "Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)", "fork": false, "created_at": "2017-03-10T04:23:41Z", "updated_at": "2022-04-07T07:54:04Z", "pushed_at": "2021-08-16T13:58:19Z", "stargazers_count": 40, "watchers_count": 40, "forks_count": 26, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 26, "watchers": 40, "score": 0 }, { "id": 84581800, "name": "cve-2017-5638", "full_name": "xsscx\/cve-2017-5638", "owner": { "login": "xsscx", "id": 10790582, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10790582?v=4", "html_url": "https:\/\/github.com\/xsscx" }, "html_url": "https:\/\/github.com\/xsscx\/cve-2017-5638", "description": "Example PoC Code for CVE-2017-5638 | Apache Struts Exploit ", "fork": false, "created_at": "2017-03-10T16:56:14Z", "updated_at": "2022-04-11T03:10:06Z", "pushed_at": "2017-03-12T15:43:27Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 24, "allow_forking": true, "is_template": false, "topics": [ "apache", "code", "content-type", "cve-2017-5638", "exploit", "poc", "python", "struts2" ], "visibility": "public", "forks": 24, "watchers": 14, "score": 0 }, { "id": 84620334, "name": "OgnlContentTypeRejectorValve", "full_name": "Masahiro-Yamada\/OgnlContentTypeRejectorValve", "owner": { "login": "Masahiro-Yamada", "id": 479387, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/479387?v=4", "html_url": "https:\/\/github.com\/Masahiro-Yamada" }, "html_url": "https:\/\/github.com\/Masahiro-Yamada\/OgnlContentTypeRejectorValve", "description": "This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)", "fork": false, "created_at": "2017-03-11T03:18:12Z", "updated_at": "2017-04-11T00:06:36Z", "pushed_at": "2017-03-13T14:49:25Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 84639178, "name": "CVE-2017-5638-Apache-Struts2", "full_name": "aljazceru\/CVE-2017-5638-Apache-Struts2", "owner": { "login": "aljazceru", "id": 4439523, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4439523?v=4", "html_url": "https:\/\/github.com\/aljazceru" }, "html_url": "https:\/\/github.com\/aljazceru\/CVE-2017-5638-Apache-Struts2", "description": "Tweaking original PoC (https:\/\/github.com\/rapid7\/metasploit-framework\/issues\/8064) to work on self-signed certificates ", "fork": false, "created_at": "2017-03-11T09:39:09Z", "updated_at": "2019-07-15T22:02:37Z", "pushed_at": "2017-03-11T09:41:27Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 84640546, "name": "test_struts2_vulnerability_CVE-2017-5638", "full_name": "sjitech\/test_struts2_vulnerability_CVE-2017-5638", "owner": { "login": "sjitech", "id": 5180638, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5180638?v=4", "html_url": "https:\/\/github.com\/sjitech" }, "html_url": "https:\/\/github.com\/sjitech\/test_struts2_vulnerability_CVE-2017-5638", "description": "test struts2 vulnerability CVE-2017-5638 in Mac OS X", "fork": false, "created_at": "2017-03-11T10:03:54Z", "updated_at": "2017-03-13T11:14:00Z", "pushed_at": "2017-03-13T07:38:25Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 84642680, "name": "CVE-2017-5638", "full_name": "jrrombaldo\/CVE-2017-5638", "owner": { "login": "jrrombaldo", "id": 121948, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121948?v=4", "html_url": "https:\/\/github.com\/jrrombaldo" }, "html_url": "https:\/\/github.com\/jrrombaldo\/CVE-2017-5638", "description": null, "fork": false, "created_at": "2017-03-11T10:43:16Z", "updated_at": "2017-03-11T13:07:57Z", "pushed_at": "2017-03-24T19:12:10Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 84644857, "name": "CVE-2017-5638", "full_name": "random-robbie\/CVE-2017-5638", "owner": { "login": "random-robbie", "id": 4902869, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4", "html_url": "https:\/\/github.com\/random-robbie" }, "html_url": "https:\/\/github.com\/random-robbie\/CVE-2017-5638", "description": "CVE: 2017-5638 in different formats", "fork": false, "created_at": "2017-03-11T11:22:44Z", "updated_at": "2017-03-11T11:28:58Z", "pushed_at": "2017-03-16T11:26:04Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 84655941, "name": "CVE-2017-5638_struts", "full_name": "initconf\/CVE-2017-5638_struts", "owner": { "login": "initconf", "id": 4044729, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4", "html_url": "https:\/\/github.com\/initconf" }, "html_url": "https:\/\/github.com\/initconf\/CVE-2017-5638_struts", "description": "detection for Apache Struts recon and compromise ", "fork": false, "created_at": "2017-03-11T14:30:02Z", "updated_at": "2020-04-13T02:20:20Z", "pushed_at": "2017-09-15T22:34:00Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 8, "score": 0 }, { "id": 84693026, "name": "struts-pwn", "full_name": "mazen160\/struts-pwn", "owner": { "login": "mazen160", "id": 8996052, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4", "html_url": "https:\/\/github.com\/mazen160" }, "html_url": "https:\/\/github.com\/mazen160\/struts-pwn", "description": "An exploit for Apache Struts CVE-2017-5638", "fork": false, "created_at": "2017-03-12T02:02:25Z", "updated_at": "2022-03-17T07:49:33Z", "pushed_at": "2018-05-21T18:33:26Z", "stargazers_count": 403, "watchers_count": 403, "forks_count": 148, "allow_forking": true, "is_template": false, "topics": [ "apache", "cve-2017-5638", "exploit", "struts", "struts-pwn" ], "visibility": "public", "forks": 148, "watchers": 403, "score": 0 }, { "id": 84705148, "name": "Struts-Apache-ExploitPack", "full_name": "ret2jazzy\/Struts-Apache-ExploitPack", "owner": { "login": "ret2jazzy", "id": 20831187, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20831187?v=4", "html_url": "https:\/\/github.com\/ret2jazzy" }, "html_url": "https:\/\/github.com\/ret2jazzy\/Struts-Apache-ExploitPack", "description": "These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)", "fork": false, "created_at": "2017-03-12T06:28:51Z", "updated_at": "2021-04-09T16:59:35Z", "pushed_at": "2017-03-12T07:26:03Z", "stargazers_count": 16, "watchers_count": 16, "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 15, "watchers": 16, "score": 0 }, { "id": 84725982, "name": "ExpStruts", "full_name": "lolwaleet\/ExpStruts", "owner": { "login": "lolwaleet", "id": 20018319, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20018319?v=4", "html_url": "https:\/\/github.com\/lolwaleet" }, "html_url": "https:\/\/github.com\/lolwaleet\/ExpStruts", "description": "A php based exploiter for CVE-2017-5638.", "fork": false, "created_at": "2017-03-12T13:03:52Z", "updated_at": "2020-03-15T16:58:21Z", "pushed_at": "2017-03-12T13:04:33Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ "exploit", "php", "struts2" ], "visibility": "public", "forks": 3, "watchers": 2, "score": 0 }, { "id": 84819853, "name": "CVE-2017-5638-Apache-Struts2", "full_name": "oktavianto\/CVE-2017-5638-Apache-Struts2", "owner": { "login": "oktavianto", "id": 8210275, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8210275?v=4", "html_url": "https:\/\/github.com\/oktavianto" }, "html_url": "https:\/\/github.com\/oktavianto\/CVE-2017-5638-Apache-Struts2", "description": "Example PHP Exploiter for CVE-2017-5638", "fork": false, "created_at": "2017-03-13T11:39:55Z", "updated_at": "2020-04-07T06:38:46Z", "pushed_at": "2017-03-20T19:40:16Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 2, "score": 0 }, { "id": 85010282, "name": "cve-2017-5638", "full_name": "jrrdev\/cve-2017-5638", "owner": { "login": "jrrdev", "id": 17674081, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17674081?v=4", "html_url": "https:\/\/github.com\/jrrdev" }, "html_url": "https:\/\/github.com\/jrrdev\/cve-2017-5638", "description": "cve-2017-5638 Vulnerable site sample", "fork": false, "created_at": "2017-03-15T00:19:33Z", "updated_at": "2021-04-24T13:16:56Z", "pushed_at": "2017-04-04T19:57:38Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [ "cve-2017-5638", "struts-pwn" ], "visibility": "public", "forks": 12, "watchers": 14, "score": 0 }, { "id": 85145901, "name": "Strutshock", "full_name": "opt9\/Strutshock", "owner": { "login": "opt9", "id": 192655, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192655?v=4", "html_url": "https:\/\/github.com\/opt9" }, "html_url": "https:\/\/github.com\/opt9\/Strutshock", "description": "Struts2 RCE CVE-2017-5638 non-intrusive check shell script", "fork": false, "created_at": "2017-03-16T02:59:22Z", "updated_at": "2021-09-30T13:38:46Z", "pushed_at": "2017-03-16T04:02:40Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 85341283, "name": "StrutsShell", "full_name": "falcon-lnhg\/StrutsShell", "owner": { "login": "falcon-lnhg", "id": 5199658, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5199658?v=4", "html_url": "https:\/\/github.com\/falcon-lnhg" }, "html_url": "https:\/\/github.com\/falcon-lnhg\/StrutsShell", "description": "Apache Struts (CVE-2017-5638) Shell", "fork": false, "created_at": "2017-03-17T18:05:55Z", "updated_at": "2017-08-31T21:27:12Z", "pushed_at": "2017-04-04T16:11:25Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 85390529, "name": "CVE-2017-5638", "full_name": "bhagdave\/CVE-2017-5638", "owner": { "login": "bhagdave", "id": 3230037, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3230037?v=4", "html_url": "https:\/\/github.com\/bhagdave" }, "html_url": "https:\/\/github.com\/bhagdave\/CVE-2017-5638", "description": null, "fork": false, "created_at": "2017-03-18T09:39:59Z", "updated_at": "2017-03-19T01:25:24Z", "pushed_at": "2017-03-21T21:53:56Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 85664016, "name": "st2-046-poc", "full_name": "jas502n\/st2-046-poc", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/st2-046-poc", "description": "st2-046-poc CVE-2017-5638", "fork": false, "created_at": "2017-03-21T05:47:49Z", "updated_at": "2020-05-21T14:53:21Z", "pushed_at": "2018-08-17T05:15:41Z", "stargazers_count": 21, "watchers_count": 21, "forks_count": 29, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 29, "watchers": 21, "score": 0 }, { "id": 85733752, "name": "S2-046_S2-045_POC", "full_name": "KarzsGHR\/S2-046_S2-045_POC", "owner": { "login": "KarzsGHR", "id": 12841587, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12841587?v=4", "html_url": "https:\/\/github.com\/KarzsGHR" }, "html_url": "https:\/\/github.com\/KarzsGHR\/S2-046_S2-045_POC", "description": "S2-046|S2-045: Struts 2 Remote Code Execution vulnerability(CVE-2017-5638)", "fork": false, "created_at": "2017-03-21T17:36:40Z", "updated_at": "2019-11-20T02:42:35Z", "pushed_at": "2017-04-26T09:12:33Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "cve-2017-5638", "s2-045", "s2-046" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 85926594, "name": "S2-Reaper", "full_name": "gsfish\/S2-Reaper", "owner": { "login": "gsfish", "id": 15968154, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15968154?v=4", "html_url": "https:\/\/github.com\/gsfish" }, "html_url": "https:\/\/github.com\/gsfish\/S2-Reaper", "description": "CVE-2017-5638", "fork": false, "created_at": "2017-03-23T08:44:10Z", "updated_at": "2017-03-30T09:51:23Z", "pushed_at": "2017-03-30T10:06:38Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0 }, { "id": 86200933, "name": "cve-2017-5638", "full_name": "mcassano\/cve-2017-5638", "owner": { "login": "mcassano", "id": 2073030, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2073030?v=4", "html_url": "https:\/\/github.com\/mcassano" }, "html_url": "https:\/\/github.com\/mcassano\/cve-2017-5638", "description": null, "fork": false, "created_at": "2017-03-26T01:58:52Z", "updated_at": "2017-03-26T02:00:58Z", "pushed_at": "2017-04-01T04:20:15Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 86415022, "name": "Strutscli", "full_name": "opt9\/Strutscli", "owner": { "login": "opt9", "id": 192655, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192655?v=4", "html_url": "https:\/\/github.com\/opt9" }, "html_url": "https:\/\/github.com\/opt9\/Strutscli", "description": "Struts2 RCE CVE-2017-5638 CLI shell", "fork": false, "created_at": "2017-03-28T04:31:44Z", "updated_at": "2017-04-14T08:03:48Z", "pushed_at": "2017-03-28T04:36:11Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 87695524, "name": "strutsy", "full_name": "tahmed11\/strutsy", "owner": { "login": "tahmed11", "id": 25324534, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25324534?v=4", "html_url": "https:\/\/github.com\/tahmed11" }, "html_url": "https:\/\/github.com\/tahmed11\/strutsy", "description": "Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability", "fork": false, "created_at": "2017-04-09T08:57:08Z", "updated_at": "2021-12-15T14:32:07Z", "pushed_at": "2018-09-01T10:15:30Z", "stargazers_count": 13, "watchers_count": 13, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 12, "watchers": 13, "score": 0 }, { "id": 90377429, "name": "CVE-2017-5638", "full_name": "payatu\/CVE-2017-5638", "owner": { "login": "payatu", "id": 16715624, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16715624?v=4", "html_url": "https:\/\/github.com\/payatu" }, "html_url": "https:\/\/github.com\/payatu\/CVE-2017-5638", "description": "Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header ", "fork": false, "created_at": "2017-05-05T13:17:37Z", "updated_at": "2021-08-05T17:29:12Z", "pushed_at": "2017-05-05T13:55:53Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 9, "score": 0 }, { "id": 92562840, "name": "Struts2-045-Exp", "full_name": "Aasron\/Struts2-045-Exp", "owner": { "login": "Aasron", "id": 17878407, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17878407?v=4", "html_url": "https:\/\/github.com\/Aasron" }, "html_url": "https:\/\/github.com\/Aasron\/Struts2-045-Exp", "description": "CVE-2017-5638", "fork": false, "created_at": "2017-05-27T02:03:28Z", "updated_at": "2017-05-27T02:33:31Z", "pushed_at": "2017-06-01T09:53:09Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 92638419, "name": "Stutsfi", "full_name": "SpiderMate\/Stutsfi", "owner": { "login": "SpiderMate", "id": 26036081, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26036081?v=4", "html_url": "https:\/\/github.com\/SpiderMate" }, "html_url": "https:\/\/github.com\/SpiderMate\/Stutsfi", "description": "An exploit for CVE-2017-5638 Remote Code Execution (RCE) Vulnerability in Apache Struts 2", "fork": false, "created_at": "2017-05-28T03:48:10Z", "updated_at": "2020-08-10T00:48:43Z", "pushed_at": "2018-01-13T04:19:16Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0 }, { "id": 92644725, "name": "Struts2Shell", "full_name": "jpacora\/Struts2Shell", "owner": { "login": "jpacora", "id": 2137673, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2137673?v=4", "html_url": "https:\/\/github.com\/jpacora" }, "html_url": "https:\/\/github.com\/jpacora\/Struts2Shell", "description": "An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug.", "fork": false, "created_at": "2017-05-28T06:44:13Z", "updated_at": "2017-05-28T06:44:27Z", "pushed_at": "2017-06-03T06:33:51Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 93442387, "name": "CVE-2017-5638", "full_name": "AndreasKl\/CVE-2017-5638", "owner": { "login": "AndreasKl", "id": 1105899, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1105899?v=4", "html_url": "https:\/\/github.com\/AndreasKl" }, "html_url": "https:\/\/github.com\/AndreasKl\/CVE-2017-5638", "description": null, "fork": false, "created_at": "2017-06-05T20:11:06Z", "updated_at": "2020-10-14T14:40:32Z", "pushed_at": "2017-06-05T21:43:40Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 93710291, "name": "struts-rce-cve-2017-5638", "full_name": "riyazwalikar\/struts-rce-cve-2017-5638", "owner": { "login": "riyazwalikar", "id": 1900486, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1900486?v=4", "html_url": "https:\/\/github.com\/riyazwalikar" }, "html_url": "https:\/\/github.com\/riyazwalikar\/struts-rce-cve-2017-5638", "description": "Struts-RCE CVE-2017-5638", "fork": false, "created_at": "2017-06-08T05:22:31Z", "updated_at": "2017-06-08T08:18:51Z", "pushed_at": "2017-06-08T05:25:42Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 93794473, "name": "CVE-2017-5638", "full_name": "homjxi0e\/CVE-2017-5638", "owner": { "login": "homjxi0e", "id": 25440152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", "html_url": "https:\/\/github.com\/homjxi0e" }, "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-5638", "description": null, "fork": false, "created_at": "2017-06-08T21:47:11Z", "updated_at": "2017-06-08T21:47:11Z", "pushed_at": "2017-06-08T21:48:52Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 94180453, "name": "CVE-2017-5638", "full_name": "eeehit\/CVE-2017-5638", "owner": { "login": "eeehit", "id": 22052276, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22052276?v=4", "html_url": "https:\/\/github.com\/eeehit" }, "html_url": "https:\/\/github.com\/eeehit\/CVE-2017-5638", "description": "CVE-2017-5638 Test environment", "fork": false, "created_at": "2017-06-13T06:59:15Z", "updated_at": "2017-06-13T07:07:06Z", "pushed_at": "2017-06-13T07:00:00Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve-2017-5638", "dockerfile", "war" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 95873695, "name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner", "full_name": "sUbc0ol\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner", "owner": { "login": "sUbc0ol", "id": 24601456, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24601456?v=4", "html_url": "https:\/\/github.com\/sUbc0ol" }, "html_url": "https:\/\/github.com\/sUbc0ol\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner", "description": null, "fork": false, "created_at": "2017-06-30T09:40:31Z", "updated_at": "2020-03-26T07:50:37Z", "pushed_at": "2017-06-30T09:41:31Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 95874930, "name": "Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638", "full_name": "sUbc0ol\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638", "owner": { "login": "sUbc0ol", "id": 24601456, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24601456?v=4", "html_url": "https:\/\/github.com\/sUbc0ol" }, "html_url": "https:\/\/github.com\/sUbc0ol\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638", "description": null, "fork": false, "created_at": "2017-06-30T09:55:41Z", "updated_at": "2021-04-15T01:47:59Z", "pushed_at": "2017-06-30T09:57:01Z", "stargazers_count": 15, "watchers_count": 15, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 15, "score": 0 }, { "id": 104686879, "name": "strutser", "full_name": "invisiblethreat\/strutser", "owner": { "login": "invisiblethreat", "id": 2525006, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2525006?v=4", "html_url": "https:\/\/github.com\/invisiblethreat" }, "html_url": "https:\/\/github.com\/invisiblethreat\/strutser", "description": "Check for Struts Vulnerability CVE-2017-5638", "fork": false, "created_at": "2017-09-25T00:40:57Z", "updated_at": "2019-06-11T14:15:40Z", "pushed_at": "2017-09-28T21:10:29Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "cve-2017-5638", "struts" ], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 105124155, "name": "CVE-2017-5638", "full_name": "lizhi16\/CVE-2017-5638", "owner": { "login": "lizhi16", "id": 22630810, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22630810?v=4", "html_url": "https:\/\/github.com\/lizhi16" }, "html_url": "https:\/\/github.com\/lizhi16\/CVE-2017-5638", "description": null, "fork": false, "created_at": "2017-09-28T08:43:21Z", "updated_at": "2018-03-27T09:10:07Z", "pushed_at": "2018-03-25T02:49:17Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 108805305, "name": "Common-Vulnerability-and-Exploit", "full_name": "donaldashdown\/Common-Vulnerability-and-Exploit", "owner": { "login": "donaldashdown", "id": 24925373, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24925373?v=4", "html_url": "https:\/\/github.com\/donaldashdown" }, "html_url": "https:\/\/github.com\/donaldashdown\/Common-Vulnerability-and-Exploit", "description": "This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach.", "fork": false, "created_at": "2017-10-30T05:21:53Z", "updated_at": "2017-10-30T05:21:53Z", "pushed_at": "2017-11-11T23:32:05Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 117999664, "name": "cybersecurity-struts2", "full_name": "pr0x1ma-byte\/cybersecurity-struts2", "owner": { "login": "pr0x1ma-byte", "id": 28523112, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28523112?v=4", "html_url": "https:\/\/github.com\/pr0x1ma-byte" }, "html_url": "https:\/\/github.com\/pr0x1ma-byte\/cybersecurity-struts2", "description": "Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.", "fork": false, "created_at": "2018-01-18T15:19:39Z", "updated_at": "2019-01-23T00:39:32Z", "pushed_at": "2019-01-23T00:39:29Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0 }, { "id": 119230111, "name": "apache-struts-v2-CVE-2017-5638", "full_name": "cafnet\/apache-struts-v2-CVE-2017-5638", "owner": { "login": "cafnet", "id": 12993208, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12993208?v=4", "html_url": "https:\/\/github.com\/cafnet" }, "html_url": "https:\/\/github.com\/cafnet\/apache-struts-v2-CVE-2017-5638", "description": "Working POC for CVE 2017-5638", "fork": false, "created_at": "2018-01-28T05:17:04Z", "updated_at": "2018-01-28T05:55:11Z", "pushed_at": "2018-01-28T05:55:09Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 121659152, "name": "CVE-2017-5638", "full_name": "0x00-0x00\/CVE-2017-5638", "owner": { "login": "0x00-0x00", "id": 23364530, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", "html_url": "https:\/\/github.com\/0x00-0x00" }, "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2017-5638", "description": "Struts02 s2-045 exploit program", "fork": false, "created_at": "2018-02-15T17:31:07Z", "updated_at": "2022-03-06T08:48:22Z", "pushed_at": "2018-02-15T17:36:07Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 5, "score": 0 }, { "id": 123348547, "name": "struts2_cve-2017-5638", "full_name": "m3ssap0\/struts2_cve-2017-5638", "owner": { "login": "m3ssap0", "id": 705120, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4", "html_url": "https:\/\/github.com\/m3ssap0" }, "html_url": "https:\/\/github.com\/m3ssap0\/struts2_cve-2017-5638", "description": "This is a sort of Java porting of the Python exploit at: https:\/\/www.exploit-db.com\/exploits\/41570\/.", "fork": false, "created_at": "2018-02-28T22:11:50Z", "updated_at": "2018-03-17T10:17:06Z", "pushed_at": "2018-03-10T11:56:50Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve-2017-5638", "exploit", "security", "security-tools", "struts2", "vulnerability", "vulnerability-scanners" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 125206287, "name": "struts2-jakarta-inject", "full_name": "Greynad\/struts2-jakarta-inject", "owner": { "login": "Greynad", "id": 5173529, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5173529?v=4", "html_url": "https:\/\/github.com\/Greynad" }, "html_url": "https:\/\/github.com\/Greynad\/struts2-jakarta-inject", "description": "Golang exploit for CVE-2017-5638", "fork": false, "created_at": "2018-03-14T12:04:34Z", "updated_at": "2018-03-28T19:59:04Z", "pushed_at": "2018-03-19T17:57:29Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 126003106, "name": "struts-rce", "full_name": "ggolawski\/struts-rce", "owner": { "login": "ggolawski", "id": 35563296, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35563296?v=4", "html_url": "https:\/\/github.com\/ggolawski" }, "html_url": "https:\/\/github.com\/ggolawski\/struts-rce", "description": "Apache Struts CVE-2017-5638 RCE exploitation", "fork": false, "created_at": "2018-03-20T10:51:46Z", "updated_at": "2018-05-18T09:54:51Z", "pushed_at": "2018-03-20T11:32:35Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 133253539, "name": "CVE-2017-5638", "full_name": "win3zz\/CVE-2017-5638", "owner": { "login": "win3zz", "id": 12781459, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12781459?v=4", "html_url": "https:\/\/github.com\/win3zz" }, "html_url": "https:\/\/github.com\/win3zz\/CVE-2017-5638", "description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script", "fork": false, "created_at": "2018-05-13T16:13:26Z", "updated_at": "2021-02-24T00:03:00Z", "pushed_at": "2018-05-13T16:14:53Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 2, "score": 0 }, { "id": 138520346, "name": "CVE-2017-5638-Mass-Exploit", "full_name": "leandrocamposcardoso\/CVE-2017-5638-Mass-Exploit", "owner": { "login": "leandrocamposcardoso", "id": 13025156, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13025156?v=4", "html_url": "https:\/\/github.com\/leandrocamposcardoso" }, "html_url": "https:\/\/github.com\/leandrocamposcardoso\/CVE-2017-5638-Mass-Exploit", "description": null, "fork": false, "created_at": "2018-06-24T22:40:54Z", "updated_at": "2018-06-24T22:41:48Z", "pushed_at": "2020-06-07T07:06:32Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 138721867, "name": "struts2-rce", "full_name": "Iletee\/struts2-rce", "owner": { "login": "Iletee", "id": 1454138, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1454138?v=4", "html_url": "https:\/\/github.com\/Iletee" }, "html_url": "https:\/\/github.com\/Iletee\/struts2-rce", "description": "Exploitable target to CVE-2017-5638", "fork": false, "created_at": "2018-06-26T10:21:50Z", "updated_at": "2021-11-24T11:30:30Z", "pushed_at": "2021-11-24T11:30:26Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 156, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 156, "watchers": 8, "score": 0 }, { "id": 147389150, "name": "check_struts", "full_name": "andypitcher\/check_struts", "owner": { "login": "andypitcher", "id": 12878731, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12878731?v=4", "html_url": "https:\/\/github.com\/andypitcher" }, "html_url": "https:\/\/github.com\/andypitcher\/check_struts", "description": "Apache Struts version analyzer (Ansible) based on CVE-2017-5638", "fork": false, "created_at": "2018-09-04T18:19:26Z", "updated_at": "2020-03-05T21:25:49Z", "pushed_at": "2018-10-29T21:49:54Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 158640611, "name": "CVE-2017-5638", "full_name": "un4ckn0wl3z\/CVE-2017-5638", "owner": { "login": "un4ckn0wl3z", "id": 16059320, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16059320?v=4", "html_url": "https:\/\/github.com\/un4ckn0wl3z" }, "html_url": "https:\/\/github.com\/un4ckn0wl3z\/CVE-2017-5638", "description": null, "fork": false, "created_at": "2018-11-22T04:02:59Z", "updated_at": "2018-11-22T07:57:38Z", "pushed_at": "2018-11-22T04:08:08Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 202619396, "name": "cve-2017-5638", "full_name": "injcristianrojas\/cve-2017-5638", "owner": { "login": "injcristianrojas", "id": 862690, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/862690?v=4", "html_url": "https:\/\/github.com\/injcristianrojas" }, "html_url": "https:\/\/github.com\/injcristianrojas\/cve-2017-5638", "description": "Demo app of THAT data broker's security breach", "fork": false, "created_at": "2019-08-15T22:27:23Z", "updated_at": "2019-09-07T02:06:14Z", "pushed_at": "2022-02-09T22:58:26Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 263394878, "name": "Aspire", "full_name": "pasannirmana\/Aspire", "owner": { "login": "pasannirmana", "id": 62306147, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62306147?v=4", "html_url": "https:\/\/github.com\/pasannirmana" }, "html_url": "https:\/\/github.com\/pasannirmana\/Aspire", "description": "CVE-2017-5638", "fork": false, "created_at": "2020-05-12T16:42:51Z", "updated_at": "2020-05-12T16:50:44Z", "pushed_at": "2020-05-12T16:50:41Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 291728915, "name": "XworkStruts-RCE", "full_name": "ludy-dev\/XworkStruts-RCE", "owner": { "login": "ludy-dev", "id": 70466565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4", "html_url": "https:\/\/github.com\/ludy-dev" }, "html_url": "https:\/\/github.com\/ludy-dev\/XworkStruts-RCE", "description": "(CVE-2017-5638) XworkStruts RCE Vuln test script", "fork": false, "created_at": "2020-08-31T13:53:37Z", "updated_at": "2020-11-07T10:14:21Z", "pushed_at": "2020-11-07T10:14:19Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 319075797, "name": "CVE-2017-5638", "full_name": "jongmartinez\/CVE-2017-5638", "owner": { "login": "jongmartinez", "id": 11743460, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11743460?v=4", "html_url": "https:\/\/github.com\/jongmartinez" }, "html_url": "https:\/\/github.com\/jongmartinez\/CVE-2017-5638", "description": "PoC for CVE: 2017-5638 - Apache Struts2 S2-045", "fork": false, "created_at": "2020-12-06T16:16:43Z", "updated_at": "2020-12-06T16:39:19Z", "pushed_at": "2020-12-06T16:39:17Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 379816029, "name": "CVE-2017-5638", "full_name": "Badbird3\/CVE-2017-5638", "owner": { "login": "Badbird3", "id": 51175524, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51175524?v=4", "html_url": "https:\/\/github.com\/Badbird3" }, "html_url": "https:\/\/github.com\/Badbird3\/CVE-2017-5638", "description": null, "fork": false, "created_at": "2021-06-24T05:41:45Z", "updated_at": "2021-06-24T05:43:55Z", "pushed_at": "2021-06-24T05:43:52Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 392774963, "name": "struts_hack", "full_name": "jptr218\/struts_hack", "owner": { "login": "jptr218", "id": 84092766, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4", "html_url": "https:\/\/github.com\/jptr218" }, "html_url": "https:\/\/github.com\/jptr218\/struts_hack", "description": "An implementation of CVE-2017-5638", "fork": false, "created_at": "2021-08-04T17:27:55Z", "updated_at": "2021-08-20T09:57:33Z", "pushed_at": "2021-08-20T09:57:30Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 459374550, "name": "vulnerability_struts-2.3.31", "full_name": "testpilot031\/vulnerability_struts-2.3.31", "owner": { "login": "testpilot031", "id": 7565250, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7565250?v=4", "html_url": "https:\/\/github.com\/testpilot031" }, "html_url": "https:\/\/github.com\/testpilot031\/vulnerability_struts-2.3.31", "description": "Build the struts-2.3.31 (CVE-2017-5638) environment", "fork": false, "created_at": "2022-02-15T00:38:47Z", "updated_at": "2022-02-15T00:45:01Z", "pushed_at": "2022-02-15T01:08:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 464522849, "name": "CVE-2017-5638", "full_name": "readloud\/CVE-2017-5638", "owner": { "login": "readloud", "id": 67372333, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67372333?v=4", "html_url": "https:\/\/github.com\/readloud" }, "html_url": "https:\/\/github.com\/readloud\/CVE-2017-5638", "description": "This script is intended to validate Apache Struts 2 vulnerability (CVE-2017-5638), AKA Struts-Shock.", "fork": false, "created_at": "2022-02-28T14:49:52Z", "updated_at": "2022-02-28T14:52:17Z", "pushed_at": "2022-02-28T14:51:34Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "apache-struts-2-vulnerability", "cve-2017-5638", "struts-shock" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 474902004, "name": "CVE-2017-5638", "full_name": "Tankirat\/CVE-2017-5638", "owner": { "login": "Tankirat", "id": 19858155, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19858155?v=4", "html_url": "https:\/\/github.com\/Tankirat" }, "html_url": "https:\/\/github.com\/Tankirat\/CVE-2017-5638", "description": null, "fork": false, "created_at": "2022-03-28T07:58:31Z", "updated_at": "2022-03-28T07:58:31Z", "pushed_at": "2022-03-28T09:50:16Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]