Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof of concept showing how CVE-2016-2098 leads to remote code execution | https://github.com/hderms/dh-CVE_2016_2098 | POC Details |
| 2 | A PoC of CVE-2016-2098 (rails4.2.5.1 / view render) | https://github.com/CyberDefenseInstitute/PoC_CVE-2016-2098_Rails42 | POC Details |
| 3 | Proof of concept CVE-2016-2098 | https://github.com/Alejandro-MartinG/rails-PoC-CVE-2016-2098 | POC Details |
| 4 | Ruby On Rails unrestricted render() exploit | https://github.com/0x00-0x00/CVE-2016-2098 | POC Details |
| 5 | CVE-2016-2098 simple POC written in bash | https://github.com/its-arun/CVE-2016-2098 | POC Details |
| 6 | None | https://github.com/3rg1s/CVE-2016-2098 | POC Details |
| 7 | This exploit is remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data | https://github.com/DanielHemmati/CVE-2016-2098-my-first-exploit | POC Details |
| 8 | CVE-2016-2098 - POC of RCE Ruby on Rails: Improper Input Validation (CVE-2016-2098) in bash. Remote attackers can execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method. | https://github.com/Debalinax64/CVE-2016-2098 | POC Details |
| 9 | Remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data. | https://github.com/j4k0m/CVE-2016-2098 | POC Details |
| 10 | CVE-2016-2098 POC | https://github.com/Shakun8/CVE-2016-2098 | POC Details |
| 11 | Script that exploits the vulnerability that allows remote code execution in Ruby 2.3.8 with CVE-2016-2098 | https://github.com/JoseLRC97/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution | POC Details |
| 12 | A PoC of CVE-2016-2098 I made for PentesterLab | https://github.com/sealldeveloper/CVE-2016-2098-PoC | POC Details |
No public POC found.
Login to generate AI POC| CVE-2016-0790 | CloudBees Jenkins CI和LTS 安全漏洞 | |
| CVE-2016-2510 | BeanShell 任意命令执行漏洞 | |
| CVE-2015-2774 | Erlang OTP 信息泄露漏洞 | |
| CVE-2016-0729 | Apache Xerces XML Parser库缓冲区错误漏洞 | |
| CVE-2016-2086 | Joyent Node.js 安全漏洞 | |
| CVE-2016-2216 | Joyent Node.js HTTP响应拆分攻击 | |
| CVE-2016-2511 | websvn 跨站脚本漏洞 | |
| CVE-2016-0788 | CloudBees Jenkins CI和LTS 远程代码执行漏洞 | |
| CVE-2016-0789 | CloudBees Jenkins CI和LTS CLI CRLF注入漏洞 | |
| CVE-2015-8681 | Huawei P8和Mate S ovisp驱动程序安全漏洞 | |
| CVE-2016-0791 | CloudBees Jenkins CI和LTS 安全漏洞 | |
| CVE-2016-0792 | CloudBees Jenkins CI和LTS 任意代码执行漏洞 | |
| CVE-2016-1531 | Exim Configuration File Path 安全漏洞 | |
| CVE-2016-2097 | Ruby on Rails Action View组件目录遍历漏洞 | |
| CVE-2016-2563 | PuTTY和KiTTY 基于栈的缓冲区溢出漏洞 | |
| CVE-2016-2789 | Citrix Systems XenMobile Server 跨站脚本漏洞 | |
| CVE-2016-2851 | libotr 整数溢出漏洞 | |
| CVE-2016-3976 | SAP NetWeaver AS Java 目录遍历漏洞 | |
| CVE-2016-3973 | SAP NetWeaver AS Java Real-Time Collaboration服务安全漏洞 | |
| CVE-2016-1019 | Adobe Flash Player 安全漏洞 |
Showing top 20 of 36 CVEs. View all on vendor page → →
No comments yet