高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the /etc/passwd file from a system running GitLab 16.0.0. | https://github.com/Occamsec/CVE-2023-2825 | POC詳細 |
| 2 | CVE-2023-2825 list | https://github.com/yuimarudev/CVE-2023-2825 | POC詳細 |
| 3 | the proof of concept written in Python for an unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups. This is a critical severity issue | https://github.com/Tornad0007/CVE-2023-2825-Gitlab | POC詳細 |
| 4 | On May 23, 2023 GitLab released version 16.0.1 which fixed a critical vulnerability, CVE-2023-2825, affecting the Community Edition (CE) and Enterprise Edition (EE) version 16.0.0. The vulnerability allows unauthenticated users to read arbitrary files through a path traversal bug. | https://github.com/Rubikcuv5/CVE-2023-2825 | POC詳細 |
| 5 | None | https://github.com/caopengyan/CVE-2023-2825 | POC詳細 |
| 6 | CVE-2023-2825 exploit script | https://github.com/cc3305/CVE-2023-2825 | POC詳細 |
| 7 | An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-2825.yaml | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成まだコメントはありません