尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Proof of concept showing how CVE-2016-2098 leads to remote code execution | https://github.com/hderms/dh-CVE_2016_2098 | POC详情 |
| 2 | A PoC of CVE-2016-2098 (rails4.2.5.1 / view render) | https://github.com/CyberDefenseInstitute/PoC_CVE-2016-2098_Rails42 | POC详情 |
| 3 | Proof of concept CVE-2016-2098 | https://github.com/Alejandro-MartinG/rails-PoC-CVE-2016-2098 | POC详情 |
| 4 | Ruby On Rails unrestricted render() exploit | https://github.com/0x00-0x00/CVE-2016-2098 | POC详情 |
| 5 | CVE-2016-2098 simple POC written in bash | https://github.com/its-arun/CVE-2016-2098 | POC详情 |
| 6 | None | https://github.com/3rg1s/CVE-2016-2098 | POC详情 |
| 7 | This exploit is remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data | https://github.com/DanielHemmati/CVE-2016-2098-my-first-exploit | POC详情 |
| 8 | CVE-2016-2098 - POC of RCE Ruby on Rails: Improper Input Validation (CVE-2016-2098) in bash. Remote attackers can execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method. | https://github.com/Debalinax64/CVE-2016-2098 | POC详情 |
| 9 | Remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data. | https://github.com/j4k0m/CVE-2016-2098 | POC详情 |
| 10 | CVE-2016-2098 POC | https://github.com/Shakun8/CVE-2016-2098 | POC详情 |
| 11 | Script that exploits the vulnerability that allows remote code execution in Ruby 2.3.8 with CVE-2016-2098 | https://github.com/JoseLRC97/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution | POC详情 |
| 12 | A PoC of CVE-2016-2098 I made for PentesterLab | https://github.com/sealldeveloper/CVE-2016-2098-PoC | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论