[
    {
        "id": 581073273,
        "name": "CVE-2023-50164",
        "full_name": "minhbao15677\/CVE-2023-50164",
        "owner": {
            "login": "minhbao15677",
            "id": 29054035,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29054035?v=4",
            "html_url": "https:\/\/github.com\/minhbao15677",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/minhbao15677\/CVE-2023-50164",
        "description": null,
        "fork": false,
        "created_at": "2022-12-22T07:49:13Z",
        "updated_at": "2024-04-26T02:52:45Z",
        "pushed_at": "2024-04-26T02:52:42Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 731065261,
        "name": "CVE-2023-50164-Apache-Struts-RCE",
        "full_name": "jakabakos\/CVE-2023-50164-Apache-Struts-RCE",
        "owner": {
            "login": "jakabakos",
            "id": 42498816,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
            "html_url": "https:\/\/github.com\/jakabakos",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-50164-Apache-Struts-RCE",
        "description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).",
        "fork": false,
        "created_at": "2023-12-13T09:31:36Z",
        "updated_at": "2024-11-27T21:19:08Z",
        "pushed_at": "2024-08-30T06:37:53Z",
        "stargazers_count": 81,
        "watchers_count": 81,
        "has_discussions": false,
        "forks_count": 22,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 22,
        "watchers": 81,
        "score": 0,
        "subscribers_count": 4
    },
    {
        "id": 732181811,
        "name": "CVE-2023-50164",
        "full_name": "bcdannyboy\/CVE-2023-50164",
        "owner": {
            "login": "bcdannyboy",
            "id": 12553297,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4",
            "html_url": "https:\/\/github.com\/bcdannyboy",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-50164",
        "description": "A scanning utility and PoC for CVE-2023-50164",
        "fork": false,
        "created_at": "2023-12-15T21:19:51Z",
        "updated_at": "2024-06-05T13:33:18Z",
        "pushed_at": "2023-12-15T23:50:17Z",
        "stargazers_count": 4,
        "watchers_count": 4,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 4,
        "score": 0,
        "subscribers_count": 2
    },
    {
        "id": 732688819,
        "name": "cve-2023-50164-poc",
        "full_name": "dwisiswant0\/cve-2023-50164-poc",
        "owner": {
            "login": "dwisiswant0",
            "id": 25837540,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
            "html_url": "https:\/\/github.com\/dwisiswant0",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/dwisiswant0\/cve-2023-50164-poc",
        "description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
        "fork": false,
        "created_at": "2023-12-17T14:18:54Z",
        "updated_at": "2024-11-16T19:50:08Z",
        "pushed_at": "2023-12-18T02:46:21Z",
        "stargazers_count": 59,
        "watchers_count": 59,
        "has_discussions": true,
        "forks_count": 16,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 16,
        "watchers": 59,
        "score": 0,
        "subscribers_count": 3
    },
    {
        "id": 732950140,
        "name": "cve-2023-50164",
        "full_name": "helsecert\/cve-2023-50164",
        "owner": {
            "login": "helsecert",
            "id": 2202200,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202200?v=4",
            "html_url": "https:\/\/github.com\/helsecert",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/helsecert\/cve-2023-50164",
        "description": null,
        "fork": false,
        "created_at": "2023-12-18T08:24:26Z",
        "updated_at": "2024-01-13T09:38:24Z",
        "pushed_at": "2023-12-18T13:29:47Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 6
    },
    {
        "id": 733837034,
        "name": "CVE-2023-50164-Apache-Struts-RCE",
        "full_name": "Thirukrishnan\/CVE-2023-50164-Apache-Struts-RCE",
        "owner": {
            "login": "Thirukrishnan",
            "id": 63901950,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63901950?v=4",
            "html_url": "https:\/\/github.com\/Thirukrishnan",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/Thirukrishnan\/CVE-2023-50164-Apache-Struts-RCE",
        "description": null,
        "fork": false,
        "created_at": "2023-12-20T08:39:54Z",
        "updated_at": "2024-01-23T11:26:28Z",
        "pushed_at": "2023-12-20T09:51:45Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 733839177,
        "name": "CVE-2023-50164-ApacheStruts2-Docker",
        "full_name": "Trackflaw\/CVE-2023-50164-ApacheStruts2-Docker",
        "owner": {
            "login": "Trackflaw",
            "id": 78696986,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
            "html_url": "https:\/\/github.com\/Trackflaw",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2023-50164-ApacheStruts2-Docker",
        "description": "Vulnerable docker container for Apache Struts 2 RCE CVE-2023-50164",
        "fork": false,
        "created_at": "2023-12-20T08:46:19Z",
        "updated_at": "2024-05-14T07:52:52Z",
        "pushed_at": "2023-12-20T12:57:28Z",
        "stargazers_count": 5,
        "watchers_count": 5,
        "has_discussions": false,
        "forks_count": 3,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 3,
        "watchers": 5,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 734560456,
        "name": "cve-2023-50164",
        "full_name": "miles3719\/cve-2023-50164",
        "owner": {
            "login": "miles3719",
            "id": 104630628,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104630628?v=4",
            "html_url": "https:\/\/github.com\/miles3719",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/miles3719\/cve-2023-50164",
        "description": null,
        "fork": false,
        "created_at": "2023-12-22T02:15:36Z",
        "updated_at": "2023-12-22T02:15:36Z",
        "pushed_at": "2023-12-22T02:15:36Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 734561364,
        "name": "cve-2023-50164",
        "full_name": "aaronm-sysdig\/cve-2023-50164",
        "owner": {
            "login": "aaronm-sysdig",
            "id": 132866139,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132866139?v=4",
            "html_url": "https:\/\/github.com\/aaronm-sysdig",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/aaronm-sysdig\/cve-2023-50164",
        "description": null,
        "fork": false,
        "created_at": "2023-12-22T02:20:11Z",
        "updated_at": "2024-01-13T09:38:29Z",
        "pushed_at": "2024-01-01T03:25:58Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 737392401,
        "name": "CVE-2023-50164-POC",
        "full_name": "snyk-labs\/CVE-2023-50164-POC",
        "owner": {
            "login": "snyk-labs",
            "id": 47793611,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47793611?v=4",
            "html_url": "https:\/\/github.com\/snyk-labs",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/snyk-labs\/CVE-2023-50164-POC",
        "description": null,
        "fork": false,
        "created_at": "2023-12-30T21:37:08Z",
        "updated_at": "2024-11-29T05:49:34Z",
        "pushed_at": "2024-01-16T14:59:23Z",
        "stargazers_count": 5,
        "watchers_count": 5,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 5,
        "score": 0,
        "subscribers_count": 7
    },
    {
        "id": 742353008,
        "name": "CVE-2023-50164-PoC",
        "full_name": "sunnyvale-it\/CVE-2023-50164-PoC",
        "owner": {
            "login": "sunnyvale-it",
            "id": 44291039,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
            "html_url": "https:\/\/github.com\/sunnyvale-it",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2023-50164-PoC",
        "description": "CVE-2023-50164 (Apache Struts path traversal to RCE vulnerability) - Proof of Concept",
        "fork": false,
        "created_at": "2024-01-12T09:34:57Z",
        "updated_at": "2024-01-25T20:19:52Z",
        "pushed_at": "2024-01-16T13:05:54Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 2,
        "score": 0,
        "subscribers_count": 0
    },
    {
        "id": 787494467,
        "name": "CVE-2023-50164Analysis-",
        "full_name": "AsfandAliMemon25\/CVE-2023-50164Analysis-",
        "owner": {
            "login": "AsfandAliMemon25",
            "id": 154571318,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154571318?v=4",
            "html_url": "https:\/\/github.com\/AsfandAliMemon25",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/AsfandAliMemon25\/CVE-2023-50164Analysis-",
        "description": "CVE-2023-50164 An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.",
        "fork": false,
        "created_at": "2024-04-16T16:20:04Z",
        "updated_at": "2024-04-24T12:11:57Z",
        "pushed_at": "2024-04-16T17:09:20Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "apache",
            "dockerfile",
            "exploit",
            "vulnerability",
            "webapplications"
        ],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 868505012,
        "name": "CVE-2023-50164-PoC",
        "full_name": "NikitaPark\/CVE-2023-50164-PoC",
        "owner": {
            "login": "NikitaPark",
            "id": 25609921,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25609921?v=4",
            "html_url": "https:\/\/github.com\/NikitaPark",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/NikitaPark\/CVE-2023-50164-PoC",
        "description": "CVE-2023-50164 PoC Application & Exploit script",
        "fork": false,
        "created_at": "2024-10-06T14:58:26Z",
        "updated_at": "2024-12-17T06:08:14Z",
        "pushed_at": "2024-10-09T11:18:48Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 891621160,
        "name": "CVE-2024-10924-Wordpress-Docker",
        "full_name": "Trackflaw\/CVE-2024-10924-Wordpress-Docker",
        "owner": {
            "login": "Trackflaw",
            "id": 78696986,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
            "html_url": "https:\/\/github.com\/Trackflaw",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-10924-Wordpress-Docker",
        "description": "Vulnerable docker container for Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass CVE-2023-50164",
        "fork": false,
        "created_at": "2024-11-20T16:50:24Z",
        "updated_at": "2024-11-25T19:41:23Z",
        "pushed_at": "2024-11-22T09:28:08Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 2,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 2,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 1
    }
]