Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2017-5638

Description

The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.

POC

Reference

- http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html

- http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/

- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

- https://github.com/rapid7/metasploit-framework/issues/8064

- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03723en_us

- https://isc.sans.edu/diary/22169

- https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt

- https://www.exploit-db.com/exploits/41614/

Github

- https://github.com/0day666/Vulnerability-verification

- https://github.com/0pensrcerer/struts2-rce-public

- https://github.com/0pensrcerer/struts2rce

- https://github.com/0x00-0x00/CVE-2017-5638

- https://github.com/0x0d3ad/Kn0ck

- https://github.com/0x4D5352/rekall-penetration-test

- https://github.com/0xConstant/CVE-2017-5638

- https://github.com/0xConstant/ExploitDevJourney

- https://github.com/0xh4di/PayloadsAllTheThings

- https://github.com/0xkasra/CVE-2017-5638

- https://github.com/0xkasra/ExploitDevJourney

- https://github.com/0xm4ud/S2-045-RCE

- https://github.com/0xm4ud/S2-045-and-S2-052-Struts-2-in-1

- https://github.com/1uci1er/The-Ultimate-Metasploit-Framework-Guide

- https://github.com/20142995/Goby

- https://github.com/20142995/nuclei-templates

- https://github.com/20142995/pocsuite3

- https://github.com/20142995/sectool

- https://github.com/3llio0T/Active-

- https://github.com/3vikram/Application-Vulnerabilities-Payloads

- https://github.com/84KaliPleXon3/Payloads_All_The_Things

- https://github.com/AMH-glitch/CHWA-LB-IDSDATASET

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/Aasron/Struts2-045-Exp

- https://github.com/AdamCrosser/awesome-vuln-writeups

- https://github.com/AdityaBhatt3010/When-Servers-Overshare-Information-disclosure-in-error-messages

- https://github.com/AkselSoft-Hub/remote-code-execution-sample

- https://github.com/Akshit-Pati/nmap-commands

- https://github.com/AlexielArdilla/El-libro-absurdamente-completo-del-Hacker-Etico

- https://github.com/AlexielArdilla/Hard-Hatter-Hacking-Etico

- https://github.com/AndreaOm/awesome-stars

- https://github.com/AndreasKl/CVE-2017-5638

- https://github.com/AntiDajjal/S012

- https://github.com/Badbird3/CVE-2017-5638

- https://github.com/Biswojeet8293/red_team_week3

- https://github.com/BugBlocker/lotus-scripts

- https://github.com/CMYanko/struts2-showcase

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/ChalkingCode/ExploitedDucks

- https://github.com/CrackerCat/myhktools

- https://github.com/CyAxe/lotus-scripts

- https://github.com/CybVulnHunter/nmap-guidelines

- https://github.com/Cyberleet1337/Payloadswebhack

- https://github.com/Delishsploits/PayloadsAndMethodology

- https://github.com/DrAmmarMoustafa/CHASE-LB-Container-Dataset

- https://github.com/DrAmmarMoustafa/CHASE-LB-Container-IDS-Dataset

- https://github.com/DynamicDesignz/Alien-Framework

- https://github.com/ELHADANITAHA/OWASP-JSP-TP

- https://github.com/ElonMusk2002/Cyber-ed-solutions

- https://github.com/Elsfa7-110/kenzer-templates

- https://github.com/Elymaro/Struty

- https://github.com/ExplodingKetchup/SC3010-Struts2-vuln-demo

- https://github.com/Fairuz205027/nmap-easymode

- https://github.com/Flyteas/Struts2-045-Exp

- https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5

- https://github.com/FrostyBackpack/udemy-application-security-the-complete-guide

- https://github.com/Gajanand2599/Vulnerability-_Scanning-_Assignment-_by_-Accredian-June-2025-

- https://github.com/Ghebriou/platform_pfe

- https://github.com/GhostTroops/TOP

- https://github.com/GhostTroops/myhktools

- https://github.com/GongWook/Openstack_ResourceHijacking

- https://github.com/Greynad/struts2-jakarta-inject

- https://github.com/GuynnR/Payloads

- https://github.com/H0j3n/EzpzCheatSheet

- https://github.com/HimmelAward/Goby_POC

- https://github.com/Ihsan-Abdul/Penetration-Test-Report

- https://github.com/IkerSaint/VULNAPP-vulnerable-app

- https://github.com/Iletee/struts2-rce

- https://github.com/J1ezds/Vulnerability-Wiki-page

- https://github.com/JERRY123S/all-poc

- https://github.com/JSchauert/Penetration-Testing-2

- https://github.com/JSchauert/Project-2-Offensive-Security-CTF

- https://github.com/JShortSona/Jenkins-Struts2

- https://github.com/Jhoel777ar/El-libro-absurdamente-completo-del-Hacker-Etico

- https://github.com/Jhoel777ar/Hard-Hatter-Hacking-Etico

- https://github.com/Jodagh/struts

- https://github.com/JordanMcAlpine1/WebAppLinuxWindowsPenTest

- https://github.com/Justice-akason/KORTNIT-GROUP-OSINT-Driven-Threat-Intelligence-Assessment-

- https://github.com/K1ngDamien/epss-super-sorter

- https://github.com/Kaizhe/attacker

- https://github.com/KarzsGHR/S2-046_S2-045_POC

- https://github.com/LUCASRENAA/vulncheck-sca-workflow

- https://github.com/Lawrence-Dean/awesome-stars

- https://github.com/Maarckz/PayloadParaTudo

- https://github.com/Maissacrement/cyber_sec_master_spv

- https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValve

- https://github.com/MelanyRoob/Goby

- https://github.com/Meowmycks/OSCPprep-BlueSky

- https://github.com/MuhammadAbdullah192/CVE-2017-5638-Remote-Code-Execution-Apache-Struts2-EXPLOITATION

- https://github.com/Muhammd/Awesome-Payloads

- https://github.com/NAIRBS/SC3010-Grp-33

- https://github.com/NAYLINNU/PayloadAllTheThings

- https://github.com/NCSU-DANCE-Research-Group/CDL

- https://github.com/Nicolasbcrrl/h2_Goat

- https://github.com/Nieuport/PayloadsAllTheThings

- https://github.com/Nithylesh/web-application-firewall-

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PWN-Kingdom/Test_Tasks

- https://github.com/Paarth1809/cyart-vapt-team

- https://github.com/Pav-ksd-pl/PayloadsAllTheThings

- https://github.com/PolarisLab/S2-045

- https://github.com/PranjalBugged-Out/Equifax-Data-Breach-Educational-Video

- https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker

- https://github.com/Prodject/Kn0ck

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Pwera/Anchore-Notes

- https://github.com/QChiLan/jexboss

- https://github.com/QHxDr-dz/CVE-2017-5638

- https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-

- https://github.com/Ra7mo0on/PayloadsAllTheThings

- https://github.com/RayScri/Struts2-045-RCE

- https://github.com/SatenderKumar3024/CompTIA-Cloud-Certification-Exam---EXAM-NUMBER-CV0-004---Satender-Kumar

- https://github.com/SexyBeast233/SecBooks

- https://github.com/Soldie/PayloadsAllTheThings

- https://github.com/SpiderMate/Stutsfi

- https://github.com/SunatP/FortiSIEM-Incapsula-Parser

- https://github.com/Tankirat/CVE-2017-5638

- https://github.com/TheTechSurgeon/struts2-rce-public

- https://github.com/TheTechSurgeon/struts2rce

- https://github.com/Threekiii/Awesome-Exploit

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Threekiii/Vulhub-Reproduce

- https://github.com/UNC1739/awesome-vulnerability-research

- https://github.com/VpSanta3/Rscan

- https://github.com/Well-Neri/Simulado-L-gica-de-programa-o

- https://github.com/Wh1teHatUn1c0rn/RedOps-Framework

- https://github.com/XPR1M3/Payloads_All_The_Things

- https://github.com/Xernary/CVE-2017-5638-POC

- https://github.com/Xernary/internet-security-project

- https://github.com/Xhendos/CVE-2017-5638

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/Z0fhack/Goby_POC

- https://github.com/Zero094/Vulnerability-verification

- https://github.com/abaer123/BaerBox-Struts2-RCE

- https://github.com/abdullah89255/Bug-bounty-pentesting-and-CVE-trends

- https://github.com/abdullah89255/Entry-points-Article

- https://github.com/abdullah89255/RCE-vulnerabilities

- https://github.com/acpcreation/Github-SCA

- https://github.com/acpcreation/struts2-rce-public

- https://github.com/adeyholar/Foundation-Sec-8B-4b-quant

- https://github.com/ajoanes98/struts-test

- https://github.com/albinowax/ActiveScanPlusPlus

- https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2

- https://github.com/alphaSeclab/sec-daily-2019

- https://github.com/amitnandi04/Common-Vulnerability-Exposure-CVE-

- https://github.com/andrewkroh/auditbeat-apache-struts-demo

- https://github.com/andrysec/PayloadsAllVulnerability

- https://github.com/andypitcher/check_struts

- https://github.com/anfal17/network-intrusion-detection-gan-ai-agent

- https://github.com/anfal17/smart_firewal_draft

- https://github.com/anhtu97/PayloadAllEverything

- https://github.com/anquanscan/sec-tools

- https://github.com/apkadmin/PayLoadsAll

- https://github.com/aylincetin/PayloadsAllTheThings

- https://github.com/badigervijay/AI-Based-Threat-Intelligence-Platform

- https://github.com/bakery312/Vulhub-Reproduce

- https://github.com/banomaly/ExploitDevJourney

- https://github.com/battleofthebots/credit-monitoring

- https://github.com/bhagdave/CVE-2017-5638

- https://github.com/bibortone/Jexboss

- https://github.com/bongbongco/cve-2017-5638

- https://github.com/brunsu/woodswiki

- https://github.com/c002/Apache-Struts

- https://github.com/c002/Java-Application-Exploits

- https://github.com/c1apps/c1-apache-struts2

- https://github.com/cafnet/apache-struts-v2-CVE-2017-5638

- https://github.com/chanamoallim/Apache-Struts-Exploit-with-Metasploit

- https://github.com/chanchalpatra/payload

- https://github.com/chetflowers/Equifax-Breach-Analysis-And-Recommendations

- https://github.com/chetflowers/Equifax-Data-Breach-Analysis-and-Cybersecurity-Recommendations

- https://github.com/chetflowers/Equifax.Data.Breach.Technical.Analysis.Strategic.Cybersecurity.Recommendations

- https://github.com/code-sharx/struts2-rce

- https://github.com/colorblindpentester/CVE-2017-5638

- https://github.com/corpbob/struts-vulnerability-demo

- https://github.com/csd81/net

- https://github.com/cx-benjamin-simpson/struts2-rce-public

- https://github.com/cx-benjamin-simpson/struts2rce

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/cyberleelawat/LeelawatX-CVE-Hunter

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/dannymas/FwdSh3ll

- https://github.com/deepfence/apache-struts

- https://github.com/delanAtMergebase/defender-demo

- https://github.com/do0dl3/myhktools

- https://github.com/donaldashdown/Common-Vulnerability-and-Exploit

- https://github.com/eannaratone/struts2-rce

- https://github.com/eeehit/CVE-2017-5638

- https://github.com/eescanilla/Apache-Struts-v3

- https://github.com/envico801/anki-owasp-top-10

- https://github.com/erickfernandox/slicepathsurl

- https://github.com/erickfernandox/slicepathurl

- https://github.com/evolvesecurity/vuln-struts2-vm

- https://github.com/f5oto/hackable

- https://github.com/faisalmemon/picoCTF-JAuth-writeup

- https://github.com/falcon-lnhg/StrutsShell

- https://github.com/falocab/PayloadsAllTheThings

- https://github.com/fath3rl0s/Sysdig

- https://github.com/finos/code-scanning

- https://github.com/finos/security-scanning

- https://github.com/fupinglee/Struts2_Bugs

- https://github.com/ggolawski/struts-rce

- https://github.com/gh0st27/Struts2Scanner

- https://github.com/gmu-swe/rivulet

- https://github.com/gobysec/Goby

- https://github.com/gsfish/S2-Reaper

- https://github.com/gyanaa/https-github.com-joaomatosf-jexboss

- https://github.com/hackealy/Nmap

- https://github.com/hacking-kubernetes/hacking-kubernetes.info

- https://github.com/hacktheworldlive/exploits-guide

- https://github.com/haidersama/nmap-arabic

- https://github.com/haroldBristol/Final_Proj_Paguio

- https://github.com/haxerr9/CVE-2017-5638

- https://github.com/haydena23/NSESearch

- https://github.com/hellochunqiu/PayloadsAllTheThings

- https://github.com/hktalent/TOP

- https://github.com/hktalent/myhktools

- https://github.com/homjxi0e/CVE-2017-5638

- https://github.com/hook-s3c/CVE-2018-11776-Python-PoC

- https://github.com/huimzjty/vulwiki

- https://github.com/hxysaury/saury-vulnhub

- https://github.com/iampetru/PoC-CVE-2017-5638

- https://github.com/icaro-c-santos/seguranca-aplicacoes-estudo-01

- https://github.com/ice0bear14h/struts2scan

- https://github.com/igorschultz/containerSecurity-demo

- https://github.com/immunio/apache-struts2-CVE-2017-5638

- https://github.com/initconf/CVE-2017-5638_struts

- https://github.com/injcristianrojas/cve-2017-5638

- https://github.com/invisiblethreat/strutser

- https://github.com/iqrok/myhktools

- https://github.com/izapps/c1-apache-struts2

- https://github.com/jas502n/S2-045-EXP-POC-TOOLS

- https://github.com/jas502n/st2-046-poc

- https://github.com/java-benchmark/struts2-showcase

- https://github.com/jbmihoub/all-poc

- https://github.com/jiridoubek/waf-basic_p2

- https://github.com/jmtatop01/PPS-Unidad3Actividad2-JulioM

- https://github.com/jnicastro-Sonatype/struts2-rce-github-flo-public

- https://github.com/joaomatosf/jexboss

- https://github.com/joidiego/Detection-struts-cve-2017-5638-detector

- https://github.com/jongmartinez/CVE-2017-5638

- https://github.com/jorgevillaescusa/c1-apache-struts2

- https://github.com/jpacora/Struts2Shell

- https://github.com/jptr218/struts_hack

- https://github.com/jrrdev/cve-2017-5638

- https://github.com/jrrombaldo/CVE-2017-5638

- https://github.com/jye64/Hacking2

- https://github.com/k0imet/pyfetch

- https://github.com/kaotickj/Red-Team-Manual

- https://github.com/kaylertee/Computer-Security-Equifax-2017

- https://github.com/killvxk/Awesome-Exploit

- https://github.com/kine90/Cybersecurity

- https://github.com/kk98kk0/Payloads

- https://github.com/kkolk/devsecops-pipeline-demo

- https://github.com/kloutkake/CVE-2017-5638-PoC

- https://github.com/knownsec/pocsuite3

- https://github.com/ksw9722/PayloadsAllTheThings

- https://github.com/kyawthiha7/pentest-methodology

- https://github.com/leandrocamposcardoso/CVE-2017-5638-Mass-Exploit

- https://github.com/likekabin/Apache-Struts-v3

- https://github.com/likescam/Apache-Struts-v3

- https://github.com/linchong-cmd/BugLists

- https://github.com/lizhi16/CVE-2017-5638

- https://github.com/lnick2023/nicenice

- https://github.com/lolwaleet/ExpStruts

- https://github.com/ludy-dev/XworkStruts-RCE

- https://github.com/lukaszknysak/F5-Advanced-Web-Application-Firewall

- https://github.com/m3ssap0/struts2_cve-2017-5638

- https://github.com/m4udSec/S2-045-RCE

- https://github.com/m4udSec/S2-045-and-S2-052-Struts-2-in-1

- https://github.com/maoo/security-scanning

- https://github.com/matt-bentley/KubernetesHackDemo

- https://github.com/maurycupitt/struts2-rce-github-mc

- https://github.com/mazen160/struts-pwn

- https://github.com/mcassano/cve-2017-5638

- https://github.com/merlinepedra/nuclei-templates

- https://github.com/merlinepedra25/nuclei-templates

- https://github.com/mfdev-solution/Exploit-CVE-2017-5638

- https://github.com/mike-williams/Struts2Vuln

- https://github.com/milkdevil/jexboss

- https://github.com/mrhacker51/ReverseShellCommands

- https://github.com/mritunjay-k/CVE-2017-5638

- https://github.com/mssky9527/Rscan

- https://github.com/mthbernardes/strutszeiro

- https://github.com/mussar0x4D5352/rekall-penetration-test

- https://github.com/n0-traces/cve_monitor

- https://github.com/nartgnourt/picoctf

- https://github.com/ndouglas-cloudsmith/exploit-check

- https://github.com/nevidimk0/PayloadsAllTheThings

- https://github.com/nightfallai/pii-leak-prevention-guide

- https://github.com/nitinsanap95-hash/Elevate-Lab-Project----50-Question-Ansers

- https://github.com/nixawk/labs

- https://github.com/nnayar-r2c/finos-security-scanning

- https://github.com/norsemen-local/lambdalabs

- https://github.com/nullx3d/PaypScan

- https://github.com/octodemo/Moose-Dependabot-Twitch

- https://github.com/oktavianto/CVE-2017-5638-Apache-Struts2

- https://github.com/oneplus-x/MS17-010

- https://github.com/oneplus-x/Sn1per

- https://github.com/oneplus-x/jok3r

- https://github.com/opt9/Strutscli

- https://github.com/opt9/Strutshock

- https://github.com/ozkanbilge/Apache-Struts

- https://github.com/ozkanbilge/Payloads

- https://github.com/paralelo14/CVE_2017_5638

- https://github.com/paralelo14/google_explorer

- https://github.com/pasannirmana/Aspire

- https://github.com/payatu/CVE-2017-5638

- https://github.com/pctF/vulnerable-app

- https://github.com/pekita1/awesome-stars

- https://github.com/phil-fly/poc

- https://github.com/pmihsan/Jex-Boss

- https://github.com/pr0x1ma-byte/cybersecurity-struts2

- https://github.com/pr0x1ma-byte/cybersecurity-struts2-send

- https://github.com/praveenmv-git/dependabotdemo

- https://github.com/pthiagu2/Security-multi-stage-data-analysis

- https://github.com/q99266/saury-vulnhub

- https://github.com/qashqao/jexboss

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/r-a-h-u-l2325/patch_management_report.md-Detailed-report-

- https://github.com/random-robbie/CVE-2017-5638

- https://github.com/ranhn/Goby-Poc

- https://github.com/ranjan-prp/PayloadsAllTheThings

- https://github.com/raoufmaklouf/cve5scan

- https://github.com/ravijainpro/payloads_xss

- https://github.com/readloud/CVE-2017-5638

- https://github.com/rebujacker/CVEPoCs

- https://github.com/ret2jazzy/Struts-Apache-ExploitPack

- https://github.com/retr0-13/Goby

- https://github.com/riyazwalikar/struts-rce-cve-2017-5638

- https://github.com/rusty-sec/lotus-scripts

- https://github.com/s1kr10s/Apache-Struts-v4

- https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner

- https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638

- https://github.com/sam-sanasam/smartFirewall

- https://github.com/samba234/Sniper

- https://github.com/samq-randcorp/struts-demo

- https://github.com/samq-wsdemo/struts-demo

- https://github.com/samqbush/struts2-showcase

- https://github.com/samuelabdelsayed/insecure-app

- https://github.com/samuelproject/ApacheStruts2

- https://github.com/sealmindset/struts2rce

- https://github.com/secretmike/demo-app

- https://github.com/seeewhy/sonatype-nexus-community

- https://github.com/shawnmckinney/remote-code-execution-sample

- https://github.com/shhimnothere/payloadsallthethings

- https://github.com/sighup1/cybersecurity-struts2

- https://github.com/sighup1/cybersecurity-struts2-send

- https://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638

- https://github.com/sn-ravance/struts2-rce

- https://github.com/snovvcrash/FwdSh3ll

- https://github.com/sobinge/--1

- https://github.com/sobinge/PayloadsAllTheThings

- https://github.com/sobinge/PayloadsAllThesobinge

- https://github.com/sobinge/nuclei-templates

- https://github.com/sonatype-workshops/struts2-rce

- https://github.com/sonatype/sonatype-field-workshop

- https://github.com/sotudeko/struts2-rce

- https://github.com/ss9214/cs564capstone

- https://github.com/stillHere3000/KnownMalware

- https://github.com/stnert/cybersec-pwn-pres

- https://github.com/syadg123/exboss

- https://github.com/tahmed11/strutsy

- https://github.com/tan0720/Understanding-OWASP-and-Analyzing-a-Real-World-Web-Application-Security-Risk

- https://github.com/tdcoming/Vulnerability-engine

- https://github.com/testpilot031/vulnerability_struts-2.3.31

- https://github.com/tombstoneghost/cyber-arsenal47

- https://github.com/tomgranados/struts-rce

- https://github.com/toothbrushsoapflannelbiscuits/cve-2017-5638

- https://github.com/touchmycrazyredhat/myhktools

- https://github.com/trapp3rhat/CVE-shellshock

- https://github.com/trhacknon/myhktools

- https://github.com/tsheth/JavaStruts-App-Terraform

- https://github.com/uiucseclab/RemoteKit

- https://github.com/un4ckn0wl3z/CVE-2017-5638

- https://github.com/unusualwork/Sn1per

- https://github.com/vjp-aimarMG/PPS-Unidad3Actividad2-AimarMartin

- https://github.com/vjp-angelPB/PPS-Unidad3Actividad2-Angel

- https://github.com/vjp-mansurSY/PPS-Unidad3Actividad2-MansurSY

- https://github.com/wangeradd1/MyPyExploit

- https://github.com/we45/AppSec-Automation-Instructions

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/whoadmin/pocs

- https://github.com/win3zz/CVE-2017-5638

- https://github.com/winterwolf32/PayloadsAllTheThings

- https://github.com/wizznmo/Breach-Response-Case-Studies

- https://github.com/woods-sega/woodswiki

- https://github.com/wwwSong/song

- https://github.com/xbl3/awesome-cve-poc_qazbnm456

- https://github.com/xeroxis-xs/Computer-Security-Apache-Struts-Vulnerability

- https://github.com/xsscx/cve-2017-5638

- https://github.com/yembors64632/cve_monitor_Public

- https://github.com/ynsmroztas/Apache-Struts-V4

- https://github.com/zacharie410/Exploiting-Web-Apps

- https://github.com/zema1/oracle-vuln-crawler

- https://github.com/zulloper/cve-poc