尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Silly Rails App to demonstrate vuln CVE-2013-0156 | https://github.com/terracatta/name_reverser | POC详情 |
| 2 | Inspect all of your heroku apps to see if they are running a vulnerable version of Rails | https://github.com/heroku/heroku-CVE-2013-0156 | POC详情 |
| 3 | crack repo from jnunemaker but with version 0.1.8 and rails CVE-2013-0156 vulnerability fixed | https://github.com/josal/crack-0.1.8-fixed | POC详情 |
| 4 | Bootstrapped Rails 3.2.10 to test the remote code exploit CVE-2013-0156 | https://github.com/bsodmike/rails-exploit-cve-2013-0156 | POC详情 |
| 5 | Arbitrary deserialization that can be used to trigger SQL injection and even Code execution | https://github.com/R3dKn33-zz/CVE-2013-0156 | POC详情 |
| 6 | Pseudo shell for CVE-2013-0156. | https://github.com/Jjdt12/kuang_grade_mk11 | POC详情 |
| 7 | This script is specifically designed to solve the challenge on PentesterLab for the CVE-2013-0156 exploit | https://github.com/oxBEN10/CVE-2013-0156 | POC详情 |
| 8 | This script is specifically designed to solve the challenge on PentesterLab for the CVE-2013-0156 exploit | https://github.com/oxben10/CVE-2013-0156 | POC详情 |
| 9 | Infoblox NetMRI virtual appliances before version 7.6.1 are vulnerable to remote code execution (RCE) due to the use of a hardcoded Ruby on Rails session cookie secret key. The Rails web component deserializes session cookies if the signing key is valid. Attackers with knowledge of this key can craft malicious session cookies that are deserialized by the application, leading to arbitrary code execution. This vulnerability is related to the known Ruby on Rails deserialization flaw (CVE-2013-0156). Infoblox did not assign a new CVE for this issue, as it is a result of the underlying Rails vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/infoblox/infoblox-netmri-rails-cookie-rce.yaml | POC详情 |
| 10 | Modified ruby script for RCE | https://github.com/7s26simon/CVE-2013-0156 | POC详情 |
未找到公开 POC。
登录以生成 AI POC
| CVE-2013-0757 | Mozilla Firefox/Thunderbird/SeaMonkey COW绕过权限提升漏洞 | |
| CVE-2013-0771 | Mozilla Firefox/Thunderbird/SeaMonkey 基于堆的缓冲区错误漏洞 | |
| CVE-2013-0770 | Mozilla Firefox/Thunderbird/SeaMonkey 内存破坏漏洞 | |
| CVE-2013-0769 | Mozilla Firefox/Thunderbird/SeaMonkey 内存破坏漏洞 | |
| CVE-2013-0768 | Mozilla Firefox/Thunderbird/SeaMonkey Canvas缓冲区错误漏洞 | |
| CVE-2013-0767 | Mozilla Firefox/Thunderbird/SeaMonkey 越界读取漏洞 | |
| CVE-2013-0766 | Mozilla Firefox/Thunderbird/SeaMonkey 释放后使用漏洞 | |
| CVE-2013-0764 | Mozilla Firefox/Thunderbird/SeaMonkey 任意代码执行漏洞 | |
| CVE-2013-0763 | Mozilla Firefox/Thunderbird/SeaMonkey Mesa释放后使用漏洞 | |
| CVE-2013-0762 | Mozilla Firefox/Thunderbird/SeaMonkey 释放后使用漏洞 | |
| CVE-2013-0761 | Mozilla Firefox/Thunderbird/SeaMonkey 释放后使用漏洞 | |
| CVE-2013-0760 | Mozilla Firefox/Thunderbird/SeaMonkey 缓冲区错误漏洞 | |
| CVE-2013-0759 | Mozilla Firefox/SeaMonkey/Thunderbird 地址栏欺骗漏洞 | |
| CVE-2013-0758 | Mozilla Firefox/Thunderbird/SeaMonkey 权限提升漏洞 | |
| CVE-2013-0155 | Ruby on Rails 不安全查询生成漏洞 | |
| CVE-2013-0756 | Mozilla Firefox/Thunderbird/SeaMonkey ‘obj_toSource’函数释放后使用漏洞 | |
| CVE-2013-0755 | Mozilla Firefox/Thunderbird/SeaMonkey Vibrate释放后使用漏洞 | |
| CVE-2013-0754 | Mozilla Firefox/Thunderbird/SeaMonkey 释放后使用漏洞 | |
| CVE-2013-0753 | Mozilla Firefox/Thunderbird/SeaMonkey ‘serializeToStream’释放后使用漏洞 | |
| CVE-2013-0752 | Mozilla Firefox/Thunderbird/SeaMonkey XBL处理内存破坏漏洞 |
显示前 20 条,共 29 条。 查看全部 → →
暂无评论