尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat | 11.0.0-M1 ~ 11.0.1 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/v3153/CVE-2024-50379-POC | POC详情 |
| 2 | None | https://github.com/yiliufeng168/CVE-2024-50379-POC | POC详情 |
| 3 | Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba) | https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379 | POC详情 |
| 4 | Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本 | https://github.com/iSee857/CVE-2024-50379-PoC | POC详情 |
| 5 | CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs). | https://github.com/Alchemist3dot14/CVE-2024-50379 | POC详情 |
| 6 | RCE through a race condition in Apache Tomcat | https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc | POC详情 |
| 7 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/SleepingBag945/CVE-2024-50379 | POC详情 |
| 8 | CVE-2024-50379利用 | https://github.com/dear-cell/CVE-2024-50379 | POC详情 |
| 9 | CVE-2024-50379-exp | https://github.com/lizhianyuguangming/CVE-2024-50379-exp | POC详情 |
| 10 | This repository contains a Python script designed to exploit CVE-2024-50379, a vulnerability that allows attackers to upload a JSP shell to a vulnerable server and execute arbitrary commands remotely. This exploit is particularly useful when the /uploads directory is either unprotected or not present on the target server. | https://github.com/dragonked2/CVE-2024-50379-POC | POC详情 |
| 11 | Testing the latset Apache Tomcat CVE-2024-50379 Vuln | https://github.com/bigb0x/CVE-2024-50379 | POC详情 |
| 12 | ExploitDB CVE-2024-50379 a vulnerability that enables attackers to upload a JSP shell to a vulnerable server and execute commands remotely. The exploit is especially effective when the /uploads directory is either unprotected or missing on the target server. | https://github.com/pwnosec/CVE-2024-50379 | POC详情 |
| 13 | Testing the latset Apache Tomcat CVE-2024-50379 Vuln | https://github.com/dkstar11q/CVE-2024-50379-nuclei | POC详情 |
| 14 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/paltrybelly/CVE-2024-50379 | POC详情 |
| 15 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/shoddykilom/CVE-2024-50379 | POC详情 |
| 16 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/unkemptpanc/CVE-2024-50379 | POC详情 |
| 17 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/whimsicalsubw/CVE-2024-50379 | POC详情 |
| 18 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/carefreegarb/CVE-2024-50379 | POC详情 |
| 19 | None | https://github.com/thunww/CVE-2024-50379 | POC详情 |
| 20 | CVE-2024-50379-exp | https://github.com/gomtaengi/CVE-2024-50379-exp | POC详情 |
| 21 | Cve exploiting | https://github.com/Yuri08loveElaina/CVE-2024-50379-POC | POC详情 |
| 22 | None | https://github.com/Yuri08loveElaina/CVE-2024-50379 | POC详情 |
| 23 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability | https://github.com/radzek15/CVE-2024-50379-TOCTOU | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论