尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | .json and .yaml files used to exploit CVE-2018-25031 | https://github.com/afine-com/CVE-2018-25031 | POC详情 |
| 2 | None | https://github.com/kriso4os/CVE-2018-25031 | POC详情 |
| 3 | Exploit Swagger UI - User Interface (UI) Misrepresentation of Critical Information (CVE-2018-25031) | https://github.com/rafaelcintralopes/SwaggerUI-CVE-2018-25031 | POC详情 |
| 4 | CVE-2018-25031 tests | https://github.com/mathis2001/CVE-2018-25031 | POC详情 |
| 5 | CVE-2018-25031 Test PoC | https://github.com/wrkk112/CVE-2018-25031 | POC详情 |
| 6 | None | https://github.com/LUCASRENAA/CVE-2018-25031 | POC详情 |
| 7 | PoC of CVE-2018-25031 | https://github.com/hev0x/CVE-2018-25031-PoC | POC详情 |
| 8 | None | https://github.com/ThiiagoEscobar/CVE-2018-25031 | POC详情 |
| 9 | None | https://github.com/johnlaurance/CVE-2018-25031-test2 | POC详情 |
| 10 | None | https://github.com/nullbyter19/CVE-2018-25031 | POC详情 |
| 11 | A simple POC (CVE-2018-25031 | https://github.com/geozin/POC-CVE-2018-25031 | POC详情 |
| 12 | None | https://github.com/h2oa/CVE-2018-25031 | POC详情 |
| 13 | None | https://github.com/natpakun/SSRF-CVE-2018-25031- | POC详情 |
| 14 | CVE-2018-25031-SG | https://github.com/KonEch0/CVE-2018-25031-SG | POC详情 |
| 15 | Testing for exploitation | https://github.com/Proklinius897/CVE-2018-25031-tests | POC详情 |
| 16 | None | https://github.com/MMAKINGDOM/CVE-2018-25031 | POC详情 |
| 17 | Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/headless/cves/2018/CVE-2018-25031.yaml | POC详情 |
| 18 | CVE-2018-25031 | https://github.com/nigartest/CVE-2018-25031 | POC详情 |
| 19 | None | https://github.com/faccimatteo/CVE-2018-25031 | POC详情 |
| 20 | None | https://github.com/h4ckt0m/CVE-2018-25031-test | POC详情 |
| 21 | None | https://github.com/rasinfosec/CVE-2018-25031 | POC详情 |
| 22 | POC for Testing HTML Injection in Swagger UI (CVE-2018-25031). | https://github.com/rh007pt/swagger-ui | POC详情 |
| 23 | POC for Testing HTML Injection in Swagger UI (CVE-2018-25031). | https://github.com/RelicHunt3r/swagger-ui | POC详情 |
| 24 | None | https://github.com/labeebSabbah/CVE-2018-25031 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论