Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Vite任意文件读取漏洞批量检测脚本CVE-2025-31486 | https://github.com/iSee857/CVE-2025-31486-PoC | POC Details |
| 2 | CVE-2025-31486 poc | https://github.com/Ly4j/CVE-2025-31486 | POC Details |
| 3 | None | https://github.com/hackmelocal/CVE-2025-31486-Simulation | POC Details |
| 4 | Vite is a frontend tooling framework for javascript. The contents of arbitrary files can be returned to the browser. By adding ?.svg with ?.wasm?init or with sec-fetch-dest- script header, the server.fs.deny restriction was able to bypass. This bypass is only possible if the file is smaller than build.assetsInlineLimit (default- 4kB) and when using Vite 6.0+. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-31486.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet