[ { "id": 905424548, "name": "CVE-2024-50379-POC", "full_name": "v3153\/CVE-2024-50379-POC", "owner": { "login": "v3153", "id": 93032617, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93032617?v=4", "html_url": "https:\/\/github.com\/v3153", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/v3153\/CVE-2024-50379-POC", "description": null, "fork": false, "created_at": "2024-12-18T19:53:46Z", "updated_at": "2024-12-26T18:33:32Z", "pushed_at": "2024-12-26T15:22:46Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 905529726, "name": "CVE-2024-50379-POC", "full_name": "yiliufeng168\/CVE-2024-50379-POC", "owner": { "login": "yiliufeng168", "id": 61577401, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61577401?v=4", "html_url": "https:\/\/github.com\/yiliufeng168", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yiliufeng168\/CVE-2024-50379-POC", "description": null, "fork": false, "created_at": "2024-12-19T02:43:18Z", "updated_at": "2024-12-20T06:58:16Z", "pushed_at": "2024-12-18T20:18:39Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 0 }, { "id": 906045424, "name": "Nuclei-Template-CVE-2024-50379", "full_name": "JFOZ1010\/Nuclei-Template-CVE-2024-50379", "owner": { "login": "JFOZ1010", "id": 82562585, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82562585?v=4", "html_url": "https:\/\/github.com\/JFOZ1010", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JFOZ1010\/Nuclei-Template-CVE-2024-50379", "description": "Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba)", "fork": false, "created_at": "2024-12-20T03:43:47Z", "updated_at": "2024-12-24T05:07:37Z", "pushed_at": "2024-12-20T03:54:28Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 906070879, "name": "CVE-2024-50379-PoC", "full_name": "iSee857\/CVE-2024-50379-PoC", "owner": { "login": "iSee857", "id": 73977770, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4", "html_url": "https:\/\/github.com\/iSee857", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/iSee857\/CVE-2024-50379-PoC", "description": "Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本", "fork": false, "created_at": "2024-12-20T05:24:10Z", "updated_at": "2024-12-23T07:43:06Z", "pushed_at": "2024-12-20T05:41:23Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 6, "score": 0, "subscribers_count": 2 }, { "id": 906416890, "name": "CVE-2024-50379", "full_name": "Alchemist3dot14\/CVE-2024-50379", "owner": { "login": "Alchemist3dot14", "id": 63059909, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059909?v=4", "html_url": "https:\/\/github.com\/Alchemist3dot14", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Alchemist3dot14\/CVE-2024-50379", "description": "CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).", "fork": false, "created_at": "2024-12-20T21:30:49Z", "updated_at": "2024-12-23T12:04:31Z", "pushed_at": "2024-12-20T21:55:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 906517672, "name": "Tomcat-CVE-2024-50379-Poc", "full_name": "ph0ebus\/Tomcat-CVE-2024-50379-Poc", "owner": { "login": "ph0ebus", "id": 108201283, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108201283?v=4", "html_url": "https:\/\/github.com\/ph0ebus", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ph0ebus\/Tomcat-CVE-2024-50379-Poc", "description": "RCE through a race condition in Apache Tomcat", "fork": false, "created_at": "2024-12-21T05:54:29Z", "updated_at": "2024-12-24T17:57:35Z", "pushed_at": "2024-12-21T08:56:44Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 10, "score": 0, "subscribers_count": 2 }, { "id": 907257023, "name": "CVE-2024-50379", "full_name": "SleepingBag945\/CVE-2024-50379", "owner": { "login": "SleepingBag945", "id": 100852628, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100852628?v=4", "html_url": "https:\/\/github.com\/SleepingBag945", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SleepingBag945\/CVE-2024-50379", "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "fork": false, "created_at": "2024-12-23T07:20:47Z", "updated_at": "2024-12-27T16:21:41Z", "pushed_at": "2024-12-23T07:30:27Z", "stargazers_count": 50, "watchers_count": 50, "has_discussions": false, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 50, "score": 0, "subscribers_count": 3 }, { "id": 907408912, "name": "CVE-2024-50379", "full_name": "dear-cell\/CVE-2024-50379", "owner": { "login": "dear-cell", "id": 72452338, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72452338?v=4", "html_url": "https:\/\/github.com\/dear-cell", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dear-cell\/CVE-2024-50379", "description": "CVE-2024-50379利用", "fork": false, "created_at": "2024-12-23T14:11:46Z", "updated_at": "2024-12-23T14:13:15Z", "pushed_at": "2024-12-23T14:13:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 908059795, "name": "CVE-2024-50379-exp", "full_name": "lizhianyuguangming\/CVE-2024-50379-exp", "owner": { "login": "lizhianyuguangming", "id": 81677104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81677104?v=4", "html_url": "https:\/\/github.com\/lizhianyuguangming", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lizhianyuguangming\/CVE-2024-50379-exp", "description": "CVE-2024-50379-exp", "fork": false, "created_at": "2024-12-25T02:41:31Z", "updated_at": "2024-12-26T08:52:18Z", "pushed_at": "2024-12-26T08:52:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 908327097, "name": "CVE-2024-50379-POC", "full_name": "dragonked2\/CVE-2024-50379-POC", "owner": { "login": "dragonked2", "id": 66541902, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66541902?v=4", "html_url": "https:\/\/github.com\/dragonked2", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dragonked2\/CVE-2024-50379-POC", "description": "This repository contains a Python script designed to exploit CVE-2024-50379, a vulnerability that allows attackers to upload a JSP shell to a vulnerable server and execute arbitrary commands remotely. This exploit is particularly useful when the \/uploads directory is either unprotected or not present on the target server.", "fork": false, "created_at": "2024-12-25T18:42:29Z", "updated_at": "2024-12-25T19:01:14Z", "pushed_at": "2024-12-25T19:01:10Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 908364457, "name": "CVE-2024-50379", "full_name": "bigb0x\/CVE-2024-50379", "owner": { "login": "bigb0x", "id": 13532434, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", "html_url": "https:\/\/github.com\/bigb0x", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-50379", "description": "Testing the latset Apache Tomcat CVE-2024-50379 Vuln", "fork": false, "created_at": "2024-12-25T21:50:16Z", "updated_at": "2024-12-26T10:31:55Z", "pushed_at": "2024-12-26T10:31:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 } ]