Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | .json and .yaml files used to exploit CVE-2018-25031 | https://github.com/afine-com/CVE-2018-25031 | POC Details |
| 2 | None | https://github.com/kriso4os/CVE-2018-25031 | POC Details |
| 3 | Exploit Swagger UI - User Interface (UI) Misrepresentation of Critical Information (CVE-2018-25031) | https://github.com/rafaelcintralopes/SwaggerUI-CVE-2018-25031 | POC Details |
| 4 | CVE-2018-25031 tests | https://github.com/mathis2001/CVE-2018-25031 | POC Details |
| 5 | CVE-2018-25031 Test PoC | https://github.com/wrkk112/CVE-2018-25031 | POC Details |
| 6 | None | https://github.com/LUCASRENAA/CVE-2018-25031 | POC Details |
| 7 | PoC of CVE-2018-25031 | https://github.com/hev0x/CVE-2018-25031-PoC | POC Details |
| 8 | None | https://github.com/ThiiagoEscobar/CVE-2018-25031 | POC Details |
| 9 | None | https://github.com/johnlaurance/CVE-2018-25031-test2 | POC Details |
| 10 | None | https://github.com/nullbyter19/CVE-2018-25031 | POC Details |
| 11 | A simple POC (CVE-2018-25031 | https://github.com/geozin/POC-CVE-2018-25031 | POC Details |
| 12 | None | https://github.com/h2oa/CVE-2018-25031 | POC Details |
| 13 | None | https://github.com/natpakun/SSRF-CVE-2018-25031- | POC Details |
| 14 | CVE-2018-25031-SG | https://github.com/KonEch0/CVE-2018-25031-SG | POC Details |
| 15 | Testing for exploitation | https://github.com/Proklinius897/CVE-2018-25031-tests | POC Details |
| 16 | None | https://github.com/MMAKINGDOM/CVE-2018-25031 | POC Details |
| 17 | Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/headless/cves/2018/CVE-2018-25031.yaml | POC Details |
| 18 | CVE-2018-25031 | https://github.com/nigartest/CVE-2018-25031 | POC Details |
| 19 | None | https://github.com/faccimatteo/CVE-2018-25031 | POC Details |
| 20 | None | https://github.com/h4ckt0m/CVE-2018-25031-test | POC Details |
| 21 | None | https://github.com/rasinfosec/CVE-2018-25031 | POC Details |
| 22 | POC for Testing HTML Injection in Swagger UI (CVE-2018-25031). | https://github.com/rh007pt/swagger-ui | POC Details |
| 23 | POC for Testing HTML Injection in Swagger UI (CVE-2018-25031). | https://github.com/RelicHunt3r/swagger-ui | POC Details |
| 24 | None | https://github.com/labeebSabbah/CVE-2018-25031 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-24433 | 8.1 HIGH | Command Injection |
| CVE-2022-25839 | 4.3 MEDIUM | Improper Input Validation |
| CVE-2021-44618 | Nystudio107 Seomatic 代码注入漏洞 | |
| CVE-2022-23927 | HP PC 安全漏洞 | |
| CVE-2022-23934 | HP PC 安全漏洞 | |
| CVE-2022-23931 | HP PC 安全漏洞 | |
| CVE-2022-23930 | HP PC 安全漏洞 | |
| CVE-2022-23924 | HP PC 安全漏洞 | |
| CVE-2022-23925 | HP PC 安全漏洞 | |
| CVE-2022-23731 | Lg Electronics Lg WebOs 安全漏洞 | |
| CVE-2022-23730 | public API安全漏洞 | |
| CVE-2021-44620 | TotoLink A3100R 命令注入漏洞 | |
| CVE-2022-23926 | HP PC 安全漏洞 | |
| CVE-2021-46708 | swagger-ui-dist 安全漏洞 | |
| CVE-2022-26878 | Linux kernel安全漏洞 | |
| CVE-2022-26874 | Horde Groupware Webmail 跨站脚本漏洞 | |
| CVE-2020-36518 | FasterXML jackson-databind 缓冲区错误漏洞 | |
| CVE-2021-32472 | Moodle 信息泄露漏洞 | |
| CVE-2021-32476 | Moodle 资源管理错误漏洞 | |
| CVE-2021-32478 | Moodle 输入验证错误漏洞 |
Showing top 20 of 41 CVEs. View all on vendor page → →
No comments yet