Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat | 11.0.0-M1 ~ 11.0.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/v3153/CVE-2024-50379-POC | POC Details |
| 2 | None | https://github.com/yiliufeng168/CVE-2024-50379-POC | POC Details |
| 3 | Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba) | https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379 | POC Details |
| 4 | Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本 | https://github.com/iSee857/CVE-2024-50379-PoC | POC Details |
| 5 | CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs). | https://github.com/Alchemist3dot14/CVE-2024-50379 | POC Details |
| 6 | RCE through a race condition in Apache Tomcat | https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc | POC Details |
| 7 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/SleepingBag945/CVE-2024-50379 | POC Details |
| 8 | CVE-2024-50379利用 | https://github.com/dear-cell/CVE-2024-50379 | POC Details |
| 9 | CVE-2024-50379-exp | https://github.com/lizhianyuguangming/CVE-2024-50379-exp | POC Details |
| 10 | This repository contains a Python script designed to exploit CVE-2024-50379, a vulnerability that allows attackers to upload a JSP shell to a vulnerable server and execute arbitrary commands remotely. This exploit is particularly useful when the /uploads directory is either unprotected or not present on the target server. | https://github.com/dragonked2/CVE-2024-50379-POC | POC Details |
| 11 | Testing the latset Apache Tomcat CVE-2024-50379 Vuln | https://github.com/bigb0x/CVE-2024-50379 | POC Details |
| 12 | ExploitDB CVE-2024-50379 a vulnerability that enables attackers to upload a JSP shell to a vulnerable server and execute commands remotely. The exploit is especially effective when the /uploads directory is either unprotected or missing on the target server. | https://github.com/pwnosec/CVE-2024-50379 | POC Details |
| 13 | Testing the latset Apache Tomcat CVE-2024-50379 Vuln | https://github.com/dkstar11q/CVE-2024-50379-nuclei | POC Details |
| 14 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/paltrybelly/CVE-2024-50379 | POC Details |
| 15 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/shoddykilom/CVE-2024-50379 | POC Details |
| 16 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/unkemptpanc/CVE-2024-50379 | POC Details |
| 17 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/whimsicalsubw/CVE-2024-50379 | POC Details |
| 18 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/carefreegarb/CVE-2024-50379 | POC Details |
| 19 | None | https://github.com/thunww/CVE-2024-50379 | POC Details |
| 20 | CVE-2024-50379-exp | https://github.com/gomtaengi/CVE-2024-50379-exp | POC Details |
| 21 | Cve exploiting | https://github.com/Yuri08loveElaina/CVE-2024-50379-POC | POC Details |
| 22 | None | https://github.com/Yuri08loveElaina/CVE-2024-50379 | POC Details |
| 23 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability | https://github.com/radzek15/CVE-2024-50379-TOCTOU | POC Details |
No public POC found.
Login to generate AI POCNo comments yet