Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/0xyassine/CVE-2023-40028 | POC Details |
| 2 | CVE-2023-40028 wirkt sich auf Ghost, ein Open-Source-Content-Management-System (CMS) aus. | https://github.com/BBSynapse/CVE-2023-40028 | POC Details |
| 3 | CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. | https://github.com/0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028 | POC Details |
| 4 | None | https://github.com/sudlit/CVE-2023-40028 | POC Details |
| 5 | Arbitrary file read in Ghost-CMS allows an attacker to upload a malicious ZIP file with a symlink. | https://github.com/monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read | POC Details |
| 6 | CVE-2023-40028 PoC Exploit | https://github.com/rvizx/CVE-2023-40028 | POC Details |
| 7 | None | https://github.com/godylockz/CVE-2023-40028 | POC Details |
| 8 | None | https://github.com/rehan6658/CVE-2023-40028 | POC Details |
| 9 | CVE-2023-40028 is a security vulnerability affecting Ghost CMS versions prior to 5.59.1. | https://github.com/syogod/CVE-2023-40028 | POC Details |
| 10 | Arbitrary file read in Ghost-CMS allows an attacker to upload a malicious ZIP file with a symlink. | https://github.com/monke443/CVE-2023-40028 | POC Details |
| 11 | POC for CVE-2023-40028: Ghost CMS Arbitrary File Read | https://github.com/buutt3rf1y/CVE-2023-40028 | POC Details |
| 12 | Exploit for CVE-2023-40028 (for educational purposes) | https://github.com/Stp1t/CVE-2023-40028 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet