Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-7028 poc | https://github.com/V1lu0/CVE-2023-7028 | POC Details |
| 2 | CVE-2023-7028 | https://github.com/RandomRobbieBF/CVE-2023-7028 | POC Details |
| 3 | An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address. | https://github.com/duy-31/CVE-2023-7028 | POC Details |
| 4 | This repository presents a proof-of-concept of CVE-2023-7028 | https://github.com/Vozec/CVE-2023-7028 | POC Details |
| 5 | Exploit for CVE-2023-7028 | https://github.com/yoryio/CVE-2023-7028 | POC Details |
| 6 | CVE-2023-7028 killer | https://github.com/Esonhugh/gitlab_honeypot | POC Details |
| 7 | Exploit of account take-over in Gitlab | https://github.com/TheRedDevil1/CVE-2023-7028 | POC Details |
| 8 | None | https://github.com/Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab | POC Details |
| 9 | None | https://github.com/thanhlam-attt/CVE-2023-7028 | POC Details |
| 10 | Repository to install CVE-2023-7028 vulnerable Gitlab instance | https://github.com/Trackflaw/CVE-2023-7028-Docker | POC Details |
| 11 | Python Code for Exploit Automation CVE-2023-7028 | https://github.com/mochammadrafi/CVE-2023-7028 | POC Details |
| 12 | GitLab CVE-2023-7028 | https://github.com/hackeremmen/gitlab-exploit | POC Details |
| 13 | Implementation and exploitation of CVE-2023-7028 account takeover vulnerability related to GO-TO CVE weekly articles of the 11th week. | https://github.com/soltanali0/CVE-2023-7028 | POC Details |
| 14 | CVE-2023-7028 poc | https://github.com/googlei1996/CVE-2023-7028 | POC Details |
| 15 | CVE-2023-7028 POC && Exploit | https://github.com/fa-rrel/CVE-2023-7028 | POC Details |
| 16 | CVE-2023-7028 POC && Exploit | https://github.com/gh-ost00/CVE-2023-7028 | POC Details |
| 17 | None | https://github.com/sariamubeen/CVE-2023-7028 | POC Details |
| 18 | None | https://github.com/Sornphut/CVE-2023-7028-GitLab | POC Details |
| 19 | An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-7028.yaml | POC Details |
| 20 | This FORK of repository presents a proof-of-concept of CVE-2023-7028. I am only improve exploit usage | https://github.com/szybnev/CVE-2023-7028 | POC Details |
| 21 | Penetration test targeting CVE-2023-7028 | https://github.com/KameliaZaman/Exploiting-GitLab-CVE-2023-7028 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet