Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | For the analysis of CVE-2013-2028 | https://github.com/danghvu/nginx-1.4.0 | POC Details |
| 2 | Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow | https://github.com/kitctf/nginxpwn | POC Details |
| 3 | this is not stable | https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC | POC Details |
| 4 | CVE-2013-2028 python exploit | https://github.com/m4drat/CVE-2013-2028-Exploit | POC Details |
| 5 | Dockerfile to build cve-2013-2028 container with centos6 and nginx | https://github.com/mambroziak/docker-cve-2013-2028 | POC Details |
| 6 | A CVE-2013-2028 implementation | https://github.com/jptr218/nginxhack | POC Details |
| 7 | CVE-2013-2028复现 | https://github.com/Sunqiz/CVE-2013-2028-reproduction | POC Details |
| 8 | Tool for checking Nginx CVE-2013-2028 | https://github.com/xiw1ll/CVE-2013-2028_Checker | POC Details |
No public POC found.
Login to generate AI POCNo comments yet