Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Analysis via script CVE-2023-5612 | https://github.com/TopskiyPavelQwertyGang/Review.CVE-2023-5612 | POC Details |
| 2 | Nmap NSE to check for CVE-2023-5612 | https://github.com/mad3E7cat/CVE-2023-5612 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-0402 | 9.9 CRITICAL | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GitLab |
| CVE-2023-6159 | 6.5 MEDIUM | Inefficient Regular Expression Complexity in GitLab |
| CVE-2023-5933 | 6.4 MEDIUM | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab |
| CVE-2024-0456 | 4.3 MEDIUM | Direct Request ('Forced Browsing') in GitLab |
No comments yet