2025-01-15 15:32:14 +09:00
[
{
"id" : 905424548 ,
"name" : "CVE-2024-50379-POC" ,
"full_name" : "v3153\/CVE-2024-50379-POC" ,
"owner" : {
"login" : "v3153" ,
"id" : 93032617 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/93032617?v=4" ,
"html_url" : "https:\/\/github.com\/v3153" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/v3153\/CVE-2024-50379-POC" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-12-18T19:53:46Z" ,
"updated_at" : "2024-12-26T18:33:32Z" ,
"pushed_at" : "2024-12-26T15:22:46Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 905529726 ,
"name" : "CVE-2024-50379-POC" ,
"full_name" : "yiliufeng168\/CVE-2024-50379-POC" ,
"owner" : {
"login" : "yiliufeng168" ,
"id" : 61577401 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/61577401?v=4" ,
"html_url" : "https:\/\/github.com\/yiliufeng168" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/yiliufeng168\/CVE-2024-50379-POC" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-12-19T02:43:18Z" ,
"updated_at" : "2024-12-20T06:58:16Z" ,
"pushed_at" : "2024-12-18T20:18:39Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 906045424 ,
"name" : "Nuclei-Template-CVE-2024-50379" ,
"full_name" : "JFOZ1010\/Nuclei-Template-CVE-2024-50379" ,
"owner" : {
"login" : "JFOZ1010" ,
"id" : 82562585 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/82562585?v=4" ,
"html_url" : "https:\/\/github.com\/JFOZ1010" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/JFOZ1010\/Nuclei-Template-CVE-2024-50379" ,
"description" : "Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba)" ,
"fork" : false ,
"created_at" : "2024-12-20T03:43:47Z" ,
"updated_at" : "2024-12-24T05:07:37Z" ,
"pushed_at" : "2024-12-20T03:54:28Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 906070879 ,
"name" : "CVE-2024-50379-PoC" ,
"full_name" : "iSee857\/CVE-2024-50379-PoC" ,
"owner" : {
"login" : "iSee857" ,
"id" : 73977770 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4" ,
"html_url" : "https:\/\/github.com\/iSee857" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/iSee857\/CVE-2024-50379-PoC" ,
"description" : "Apache Tomcat( CVE-2024-50379) 条件竞争致远程代码执行漏洞批量检测脚本" ,
"fork" : false ,
"created_at" : "2024-12-20T05:24:10Z" ,
2025-01-26 03:32:15 +09:00
"updated_at" : "2025-01-25T16:00:08Z" ,
2025-01-15 15:32:14 +09:00
"pushed_at" : "2024-12-20T05:41:23Z" ,
2025-01-26 03:32:15 +09:00
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2025-01-15 15:32:14 +09:00
"has_discussions" : false ,
2025-01-22 15:32:41 +09:00
"forks_count" : 4 ,
2025-01-15 15:32:14 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2025-01-22 15:32:41 +09:00
"forks" : 4 ,
2025-01-26 03:32:15 +09:00
"watchers" : 11 ,
2025-01-15 15:32:14 +09:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 906416890 ,
"name" : "CVE-2024-50379" ,
"full_name" : "Alchemist3dot14\/CVE-2024-50379" ,
"owner" : {
"login" : "Alchemist3dot14" ,
"id" : 63059909 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63059909?v=4" ,
"html_url" : "https:\/\/github.com\/Alchemist3dot14" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Alchemist3dot14\/CVE-2024-50379" ,
"description" : "CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs)." ,
"fork" : false ,
"created_at" : "2024-12-20T21:30:49Z" ,
"updated_at" : "2024-12-23T12:04:31Z" ,
"pushed_at" : "2024-12-20T21:55:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 906517672 ,
"name" : "Tomcat-CVE-2024-50379-Poc" ,
"full_name" : "ph0ebus\/Tomcat-CVE-2024-50379-Poc" ,
"owner" : {
"login" : "ph0ebus" ,
"id" : 108201283 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/108201283?v=4" ,
"html_url" : "https:\/\/github.com\/ph0ebus" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ph0ebus\/Tomcat-CVE-2024-50379-Poc" ,
"description" : "RCE through a race condition in Apache Tomcat" ,
"fork" : false ,
"created_at" : "2024-12-21T05:54:29Z" ,
2025-01-23 03:34:27 +09:00
"updated_at" : "2025-01-22T15:39:28Z" ,
2025-01-15 15:32:14 +09:00
"pushed_at" : "2024-12-21T08:56:44Z" ,
2025-01-23 03:34:27 +09:00
"stargazers_count" : 52 ,
"watchers_count" : 52 ,
2025-01-15 15:32:14 +09:00
"has_discussions" : false ,
2025-01-21 15:32:20 +09:00
"forks_count" : 6 ,
2025-01-15 15:32:14 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2025-01-21 15:32:20 +09:00
"forks" : 6 ,
2025-01-23 03:34:27 +09:00
"watchers" : 52 ,
2025-01-15 15:32:14 +09:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 907257023 ,
"name" : "CVE-2024-50379" ,
"full_name" : "SleepingBag945\/CVE-2024-50379" ,
"owner" : {
"login" : "SleepingBag945" ,
"id" : 100852628 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/100852628?v=4" ,
"html_url" : "https:\/\/github.com\/SleepingBag945" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/SleepingBag945\/CVE-2024-50379" ,
"description" : "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp" ,
"fork" : false ,
"created_at" : "2024-12-23T07:20:47Z" ,
2025-01-25 03:33:18 +09:00
"updated_at" : "2025-01-24T17:01:26Z" ,
2025-01-15 15:32:14 +09:00
"pushed_at" : "2024-12-23T07:30:27Z" ,
2025-01-25 03:33:18 +09:00
"stargazers_count" : 74 ,
"watchers_count" : 74 ,
2025-01-15 15:32:14 +09:00
"has_discussions" : false ,
"forks_count" : 16 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 16 ,
2025-01-25 03:33:18 +09:00
"watchers" : 74 ,
2025-01-15 15:32:14 +09:00
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 907408912 ,
"name" : "CVE-2024-50379" ,
"full_name" : "dear-cell\/CVE-2024-50379" ,
"owner" : {
"login" : "dear-cell" ,
"id" : 72452338 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/72452338?v=4" ,
"html_url" : "https:\/\/github.com\/dear-cell" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dear-cell\/CVE-2024-50379" ,
"description" : "CVE-2024-50379利用" ,
"fork" : false ,
"created_at" : "2024-12-23T14:11:46Z" ,
"updated_at" : "2025-01-14T09:50:55Z" ,
"pushed_at" : "2024-12-23T14:13:11Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 908059795 ,
"name" : "CVE-2024-50379-exp" ,
"full_name" : "lizhianyuguangming\/CVE-2024-50379-exp" ,
"owner" : {
"login" : "lizhianyuguangming" ,
"id" : 81677104 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/81677104?v=4" ,
"html_url" : "https:\/\/github.com\/lizhianyuguangming" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lizhianyuguangming\/CVE-2024-50379-exp" ,
"description" : "CVE-2024-50379-exp" ,
"fork" : false ,
"created_at" : "2024-12-25T02:41:31Z" ,
"updated_at" : "2025-01-14T18:05:32Z" ,
"pushed_at" : "2024-12-31T07:11:13Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 908327097 ,
"name" : "CVE-2024-50379-POC" ,
"full_name" : "dragonked2\/CVE-2024-50379-POC" ,
"owner" : {
"login" : "dragonked2" ,
"id" : 66541902 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66541902?v=4" ,
"html_url" : "https:\/\/github.com\/dragonked2" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dragonked2\/CVE-2024-50379-POC" ,
"description" : "This repository contains a Python script designed to exploit CVE-2024-50379, a vulnerability that allows attackers to upload a JSP shell to a vulnerable server and execute arbitrary commands remotely. This exploit is particularly useful when the \/uploads directory is either unprotected or not present on the target server." ,
"fork" : false ,
"created_at" : "2024-12-25T18:42:29Z" ,
"updated_at" : "2025-01-02T13:30:06Z" ,
"pushed_at" : "2024-12-25T19:01:10Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 908364457 ,
"name" : "CVE-2024-50379" ,
"full_name" : "bigb0x\/CVE-2024-50379" ,
"owner" : {
"login" : "bigb0x" ,
"id" : 13532434 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4" ,
"html_url" : "https:\/\/github.com\/bigb0x" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/bigb0x\/CVE-2024-50379" ,
"description" : "Testing the latset Apache Tomcat CVE-2024-50379 Vuln" ,
"fork" : false ,
"created_at" : "2024-12-25T21:50:16Z" ,
"updated_at" : "2024-12-26T10:31:55Z" ,
"pushed_at" : "2024-12-26T10:31:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
2025-01-23 21:33:13 +09:00
} ,
{
"id" : 921095914 ,
"name" : "CVE-2024-50379" ,
"full_name" : "pwnosec\/CVE-2024-50379" ,
"owner" : {
"login" : "pwnosec" ,
"id" : 183417502 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/183417502?v=4" ,
"html_url" : "https:\/\/github.com\/pwnosec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/pwnosec\/CVE-2024-50379" ,
"description" : "ExploitDB CVE-2024-50379 a vulnerability that enables attackers to upload a JSP shell to a vulnerable server and execute commands remotely. The exploit is especially effective when the \/uploads directory is either unprotected or missing on the target server." ,
"fork" : false ,
"created_at" : "2025-01-23T10:28:40Z" ,
2025-01-26 03:32:15 +09:00
"updated_at" : "2025-01-25T16:28:54Z" ,
2025-01-23 21:33:13 +09:00
"pushed_at" : "2025-01-23T11:40:26Z" ,
2025-01-26 03:32:15 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2025-01-23 21:33:13 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : true ,
"topics" : [
"apache-tomcat" ,
"apache-tomcat-exploiter" ,
"cve-2024-50379"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2025-01-26 03:32:15 +09:00
"watchers" : 1 ,
2025-01-23 21:33:13 +09:00
"score" : 0 ,
"subscribers_count" : 0
2025-01-15 15:32:14 +09:00
}
]