Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-0402 Gitlab arbitrary file write/RCE | https://github.com/ch4nui/CVE-2024-0402-RCE | POC Details |
| 2 | Exploit for CVE-2024-0402 in Gitlab | https://github.com/doyensec/malicious-devfile-registry | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-6159 | 6.5 MEDIUM | Inefficient Regular Expression Complexity in GitLab |
| CVE-2023-5933 | 6.4 MEDIUM | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab |
| CVE-2023-5612 | 5.3 MEDIUM | Missing Authorization in GitLab |
| CVE-2024-0456 | 4.3 MEDIUM | Direct Request ('Forced Browsing') in GitLab |
No comments yet