尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | .json and .yaml files used to exploit CVE-2018-25031 | https://github.com/afine-com/CVE-2018-25031 | POC详情 |
| 2 | None | https://github.com/kriso4os/CVE-2018-25031 | POC详情 |
| 3 | Exploit Swagger UI - User Interface (UI) Misrepresentation of Critical Information (CVE-2018-25031) | https://github.com/rafaelcintralopes/SwaggerUI-CVE-2018-25031 | POC详情 |
| 4 | CVE-2018-25031 tests | https://github.com/mathis2001/CVE-2018-25031 | POC详情 |
| 5 | CVE-2018-25031 Test PoC | https://github.com/wrkk112/CVE-2018-25031 | POC详情 |
| 6 | None | https://github.com/LUCASRENAA/CVE-2018-25031 | POC详情 |
| 7 | PoC of CVE-2018-25031 | https://github.com/hev0x/CVE-2018-25031-PoC | POC详情 |
| 8 | None | https://github.com/ThiiagoEscobar/CVE-2018-25031 | POC详情 |
| 9 | None | https://github.com/johnlaurance/CVE-2018-25031-test2 | POC详情 |
| 10 | None | https://github.com/nullbyter19/CVE-2018-25031 | POC详情 |
| 11 | A simple POC (CVE-2018-25031 | https://github.com/geozin/POC-CVE-2018-25031 | POC详情 |
| 12 | None | https://github.com/h2oa/CVE-2018-25031 | POC详情 |
| 13 | None | https://github.com/natpakun/SSRF-CVE-2018-25031- | POC详情 |
| 14 | CVE-2018-25031-SG | https://github.com/KonEch0/CVE-2018-25031-SG | POC详情 |
| 15 | Testing for exploitation | https://github.com/Proklinius897/CVE-2018-25031-tests | POC详情 |
| 16 | None | https://github.com/MMAKINGDOM/CVE-2018-25031 | POC详情 |
| 17 | Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/headless/cves/2018/CVE-2018-25031.yaml | POC详情 |
| 18 | CVE-2018-25031 | https://github.com/nigartest/CVE-2018-25031 | POC详情 |
| 19 | None | https://github.com/faccimatteo/CVE-2018-25031 | POC详情 |
| 20 | None | https://github.com/h4ckt0m/CVE-2018-25031-test | POC详情 |
| 21 | None | https://github.com/rasinfosec/CVE-2018-25031 | POC详情 |
| 22 | POC for Testing HTML Injection in Swagger UI (CVE-2018-25031). | https://github.com/rh007pt/swagger-ui | POC详情 |
| 23 | POC for Testing HTML Injection in Swagger UI (CVE-2018-25031). | https://github.com/RelicHunt3r/swagger-ui | POC详情 |
| 24 | None | https://github.com/labeebSabbah/CVE-2018-25031 | POC详情 |
未找到公开 POC。
登录以生成 AI POC| CVE-2022-24433 | 8.1 HIGH | simple-git-hooks 参数注入漏洞 |
| CVE-2022-25839 | 4.3 MEDIUM | URL.js 输入验证错误漏洞 |
| CVE-2021-44618 | Nystudio107 Seomatic 代码注入漏洞 | |
| CVE-2022-23927 | HP PC 安全漏洞 | |
| CVE-2022-23934 | HP PC 安全漏洞 | |
| CVE-2022-23931 | HP PC 安全漏洞 | |
| CVE-2022-23930 | HP PC 安全漏洞 | |
| CVE-2022-23924 | HP PC 安全漏洞 | |
| CVE-2022-23925 | HP PC 安全漏洞 | |
| CVE-2022-23731 | Lg Electronics Lg WebOs 安全漏洞 | |
| CVE-2022-23730 | public API安全漏洞 | |
| CVE-2021-44620 | TotoLink A3100R 命令注入漏洞 | |
| CVE-2022-23926 | HP PC 安全漏洞 | |
| CVE-2021-46708 | swagger-ui-dist 安全漏洞 | |
| CVE-2022-26878 | Linux kernel安全漏洞 | |
| CVE-2022-26874 | Horde Groupware Webmail 跨站脚本漏洞 | |
| CVE-2020-36518 | FasterXML jackson-databind 缓冲区错误漏洞 | |
| CVE-2021-32472 | Moodle 信息泄露漏洞 | |
| CVE-2021-32476 | Moodle 资源管理错误漏洞 | |
| CVE-2021-32478 | Moodle 输入验证错误漏洞 |
显示前 20 条,共 41 条。 查看全部 → →
暂无评论