Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2025-32395-POC | https://github.com/ruiwenya/CVE-2025-32395 | POC Details |
| 2 | https://github.com/vulhub/vulhub/blob/master/vite/CVE-2025-32395/README.md | POC Details | |
| 3 | Vite versions prior to 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13 contain a file exposure vulnerability caused by improper handling of request URLs with '#' in the dev server running on Node or Bun, letting attackers access arbitrary files, exploit requires the server to be exposed to the network and running on Node or Bun. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-32395.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet