CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.
☆13Jan 7, 2025Updated last year
Alternatives and similar repositories for Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028
Users that are interested in Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- NixOS configurations☆10Nov 11, 2024Updated last year
- ☆13Mar 23, 2024Updated 2 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆32Mar 27, 2026Updated last month
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass