Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for "GitLab Instance" Arbitrary server file read vulnerability | https://github.com/KooroshRZ/CVE-2020-10977 | POC Details |
| 2 | GitLab 12.9.0 Arbitrary File Read | https://github.com/thewhiteh4t/cve-2020-10977 | POC Details |
| 3 | authenticated arbitrary file read for Gitlab (CVE-2020-10977) | https://github.com/JustMichi/CVE-2020-10977.py | POC Details |
| 4 | GitLab 12.9 Arbitrary File Read | https://github.com/JayHerlth/cve-2020-10977 | POC Details |
| 5 | A (wanted to be) better script than what can be found on exploit-db about the authenticated arbitrary read file on GitLab v12.9.0 (CVE-2020-10977) | https://github.com/erk3/gitlab-12.9.0-file-read | POC Details |
| 6 | Gitlab v12.4.0-8.1 RCE | https://github.com/liath/CVE-2020-10977 | POC Details |
| 7 | cve-2020-10977 read and execute | https://github.com/lisp3r/cve-2020-10977-read-and-execute | POC Details |
| 8 | GitLab Arbitrary File Read Exploit | https://github.com/vandycknick/gitlab-cve-2020-10977 | POC Details |
| 9 | GitLab 12.9 Arbitrary File Read | https://github.com/possib1e/cve-2020-10977 | POC Details |
| 10 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/GitLab%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E5%AF%BC%E8%87%B4RCE%20CVE-2020-10977.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet