[ { "id": 581073273, "name": "CVE-2023-50164", "full_name": "minhbao15677\/CVE-2023-50164", "owner": { "login": "minhbao15677", "id": 29054035, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29054035?v=4", "html_url": "https:\/\/github.com\/minhbao15677" }, "html_url": "https:\/\/github.com\/minhbao15677\/CVE-2023-50164", "description": null, "fork": false, "created_at": "2022-12-22T07:49:13Z", "updated_at": "2024-04-26T02:52:45Z", "pushed_at": "2024-04-26T02:52:42Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 731065261, "name": "CVE-2023-50164-Apache-Struts-RCE", "full_name": "jakabakos\/CVE-2023-50164-Apache-Struts-RCE", "owner": { "login": "jakabakos", "id": 42498816, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4", "html_url": "https:\/\/github.com\/jakabakos" }, "html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-50164-Apache-Struts-RCE", "description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).", "fork": false, "created_at": "2023-12-13T09:31:36Z", "updated_at": "2024-08-03T06:03:44Z", "pushed_at": "2024-04-04T14:33:11Z", "stargazers_count": 75, "watchers_count": 75, "has_discussions": false, "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 20, "watchers": 75, "score": 0, "subscribers_count": 4 }, { "id": 732181811, "name": "CVE-2023-50164", "full_name": "bcdannyboy\/CVE-2023-50164", "owner": { "login": "bcdannyboy", "id": 12553297, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4", "html_url": "https:\/\/github.com\/bcdannyboy" }, "html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-50164", "description": "A scanning utility and PoC for CVE-2023-50164", "fork": false, "created_at": "2023-12-15T21:19:51Z", "updated_at": "2024-06-05T13:33:18Z", "pushed_at": "2023-12-15T23:50:17Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 732688819, "name": "cve-2023-50164-poc", "full_name": "dwisiswant0\/cve-2023-50164-poc", "owner": { "login": "dwisiswant0", "id": 25837540, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4", "html_url": "https:\/\/github.com\/dwisiswant0" }, "html_url": "https:\/\/github.com\/dwisiswant0\/cve-2023-50164-poc", "description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")", "fork": false, "created_at": "2023-12-17T14:18:54Z", "updated_at": "2024-06-14T01:14:13Z", "pushed_at": "2023-12-18T02:46:21Z", "stargazers_count": 57, "watchers_count": 57, "has_discussions": true, "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 16, "watchers": 57, "score": 0, "subscribers_count": 3 }, { "id": 732950140, "name": "cve-2023-50164", "full_name": "helsecert\/cve-2023-50164", "owner": { "login": "helsecert", "id": 2202200, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202200?v=4", "html_url": "https:\/\/github.com\/helsecert" }, "html_url": "https:\/\/github.com\/helsecert\/cve-2023-50164", "description": null, "fork": false, "created_at": "2023-12-18T08:24:26Z", "updated_at": "2024-01-13T09:38:24Z", "pushed_at": "2023-12-18T13:29:47Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 6 }, { "id": 733837034, "name": "CVE-2023-50164-Apache-Struts-RCE", "full_name": "Thirukrishnan\/CVE-2023-50164-Apache-Struts-RCE", "owner": { "login": "Thirukrishnan", "id": 63901950, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63901950?v=4", "html_url": "https:\/\/github.com\/Thirukrishnan" }, "html_url": "https:\/\/github.com\/Thirukrishnan\/CVE-2023-50164-Apache-Struts-RCE", "description": null, "fork": false, "created_at": "2023-12-20T08:39:54Z", "updated_at": "2024-01-23T11:26:28Z", "pushed_at": "2023-12-20T09:51:45Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 733839177, "name": "CVE-2023-50164-ApacheStruts2-Docker", "full_name": "Trackflaw\/CVE-2023-50164-ApacheStruts2-Docker", "owner": { "login": "Trackflaw", "id": 78696986, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4", "html_url": "https:\/\/github.com\/Trackflaw" }, "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2023-50164-ApacheStruts2-Docker", "description": "Vulnerable docker container for Apache Struts 2 RCE CVE-2023-50164", "fork": false, "created_at": "2023-12-20T08:46:19Z", "updated_at": "2024-05-14T07:52:52Z", "pushed_at": "2023-12-20T12:57:28Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 734560456, "name": "cve-2023-50164", "full_name": "miles3719\/cve-2023-50164", "owner": { "login": "miles3719", "id": 104630628, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104630628?v=4", "html_url": "https:\/\/github.com\/miles3719" }, "html_url": "https:\/\/github.com\/miles3719\/cve-2023-50164", "description": null, "fork": false, "created_at": "2023-12-22T02:15:36Z", "updated_at": "2023-12-22T02:15:36Z", "pushed_at": "2023-12-22T02:15:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 734561364, "name": "cve-2023-50164", "full_name": "aaronm-sysdig\/cve-2023-50164", "owner": { "login": "aaronm-sysdig", "id": 132866139, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132866139?v=4", "html_url": "https:\/\/github.com\/aaronm-sysdig" }, "html_url": "https:\/\/github.com\/aaronm-sysdig\/cve-2023-50164", "description": null, "fork": false, "created_at": "2023-12-22T02:20:11Z", "updated_at": "2024-01-13T09:38:29Z", "pushed_at": "2024-01-01T03:25:58Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 737392401, "name": "CVE-2023-50164-POC", "full_name": "snyk-labs\/CVE-2023-50164-POC", "owner": { "login": "snyk-labs", "id": 47793611, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47793611?v=4", "html_url": "https:\/\/github.com\/snyk-labs" }, "html_url": "https:\/\/github.com\/snyk-labs\/CVE-2023-50164-POC", "description": null, "fork": false, "created_at": "2023-12-30T21:37:08Z", "updated_at": "2024-03-25T07:18:41Z", "pushed_at": "2024-01-16T14:59:23Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 7 }, { "id": 742353008, "name": "CVE-2023-50164-PoC", "full_name": "sunnyvale-it\/CVE-2023-50164-PoC", "owner": { "login": "sunnyvale-it", "id": 44291039, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4", "html_url": "https:\/\/github.com\/sunnyvale-it" }, "html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2023-50164-PoC", "description": "CVE-2023-50164 (Apache Struts path traversal to RCE vulnerability) - Proof of Concept", "fork": false, "created_at": "2024-01-12T09:34:57Z", "updated_at": "2024-01-25T20:19:52Z", "pushed_at": "2024-01-16T13:05:54Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 0 }, { "id": 787494467, "name": "CVE-2023-50164Analysis-", "full_name": "AsfandAliMemon25\/CVE-2023-50164Analysis-", "owner": { "login": "AsfandAliMemon25", "id": 154571318, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154571318?v=4", "html_url": "https:\/\/github.com\/AsfandAliMemon25" }, "html_url": "https:\/\/github.com\/AsfandAliMemon25\/CVE-2023-50164Analysis-", "description": "CVE-2023-50164 An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.", "fork": false, "created_at": "2024-04-16T16:20:04Z", "updated_at": "2024-04-24T12:11:57Z", "pushed_at": "2024-04-16T17:09:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "dockerfile", "exploit", "vulnerability", "webapplications" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]