# CVE-2020-13151-POC-Aerospike-Server-Host-Command-Execution-RCE-
Reference: https://b4ny4n.github.io/network-pentest/2020/08/01/cve-2020-13151-poc-aerospike.html
`exploit.py` - python code to run
[4.0K] /data/pocs/4664b1b9d6e9c38e3b38f04f1755d0c1e9c8d40e
├── [6.8K] exploit.py
├── [1.7K] poc.lua
└── [ 199] README.md
0 directories, 3 files