Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof of concept showing how CVE-2016-2098 leads to remote code execution | https://github.com/hderms/dh-CVE_2016_2098 | POC Details |
| 2 | A PoC of CVE-2016-2098 (rails4.2.5.1 / view render) | https://github.com/CyberDefenseInstitute/PoC_CVE-2016-2098_Rails42 | POC Details |
| 3 | Proof of concept CVE-2016-2098 | https://github.com/Alejandro-MartinG/rails-PoC-CVE-2016-2098 | POC Details |
| 4 | Ruby On Rails unrestricted render() exploit | https://github.com/0x00-0x00/CVE-2016-2098 | POC Details |
| 5 | CVE-2016-2098 simple POC written in bash | https://github.com/its-arun/CVE-2016-2098 | POC Details |
| 6 | None | https://github.com/3rg1s/CVE-2016-2098 | POC Details |
| 7 | This exploit is remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data | https://github.com/DanielHemmati/CVE-2016-2098-my-first-exploit | POC Details |
| 8 | CVE-2016-2098 - POC of RCE Ruby on Rails: Improper Input Validation (CVE-2016-2098) in bash. Remote attackers can execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method. | https://github.com/Debalinax64/CVE-2016-2098 | POC Details |
| 9 | Remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data. | https://github.com/j4k0m/CVE-2016-2098 | POC Details |
| 10 | CVE-2016-2098 POC | https://github.com/Shakun8/CVE-2016-2098 | POC Details |
| 11 | Script that exploits the vulnerability that allows remote code execution in Ruby 2.3.8 with CVE-2016-2098 | https://github.com/JoseLRC97/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution | POC Details |
| 12 | A PoC of CVE-2016-2098 I made for PentesterLab | https://github.com/sealldeveloper/CVE-2016-2098-PoC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet