Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | https://github.com/rails/rails | Fixed in 4.2.11.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2020-8163 - Remote code execution of user-provided local names in Rails | https://github.com/lucasallan/CVE-2020-8163 | POC Details |
| 2 | Enviroment and exploit to rce test | https://github.com/h4ms1k/CVE-2020-8163 | POC Details |
| 3 | This is a exploit code for CVE-2020-8163 | https://github.com/TK-Elliot/CVE-2020-8163 | POC Details |
| 4 | This is a exploit code for CVE-2020-8163 | https://github.com/RedPhantomRoot/CVE-2020-8163 | POC Details |
| 5 | This is a exploit code for CVE-2020-8163 | https://github.com/RedBinaryRabbit/CVE-2020-8163 | POC Details |
| 6 | Ruby on Rails before version 5.0.1 is susceptible to remote code execution because it passes user parameters as local variables into partials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-8163.yaml | POC Details |
| 7 | CVE-2020-8163 - Remote code execution of user-provided local names in Rails | https://github.com/lucasamorimca/CVE-2020-8163 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet