Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | .json and .yaml files used to exploit CVE-2018-25031 | https://github.com/afine-com/CVE-2018-25031 | POC Details |
| 2 | None | https://github.com/kriso4os/CVE-2018-25031 | POC Details |
| 3 | Exploit Swagger UI - User Interface (UI) Misrepresentation of Critical Information (CVE-2018-25031) | https://github.com/rafaelcintralopes/SwaggerUI-CVE-2018-25031 | POC Details |
| 4 | CVE-2018-25031 tests | https://github.com/mathis2001/CVE-2018-25031 | POC Details |
| 5 | CVE-2018-25031 Test PoC | https://github.com/wrkk112/CVE-2018-25031 | POC Details |
| 6 | None | https://github.com/LUCASRENAA/CVE-2018-25031 | POC Details |
| 7 | PoC of CVE-2018-25031 | https://github.com/hev0x/CVE-2018-25031-PoC | POC Details |
| 8 | None | https://github.com/ThiiagoEscobar/CVE-2018-25031 | POC Details |
| 9 | None | https://github.com/johnlaurance/CVE-2018-25031-test2 | POC Details |
| 10 | None | https://github.com/nullbyter19/CVE-2018-25031 | POC Details |
| 11 | A simple POC (CVE-2018-25031 | https://github.com/geozin/POC-CVE-2018-25031 | POC Details |
| 12 | None | https://github.com/h2oa/CVE-2018-25031 | POC Details |
| 13 | None | https://github.com/natpakun/SSRF-CVE-2018-25031- | POC Details |
| 14 | CVE-2018-25031-SG | https://github.com/KonEch0/CVE-2018-25031-SG | POC Details |
| 15 | Testing for exploitation | https://github.com/Proklinius897/CVE-2018-25031-tests | POC Details |
| 16 | None | https://github.com/MMAKINGDOM/CVE-2018-25031 | POC Details |
| 17 | Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/headless/cves/2018/CVE-2018-25031.yaml | POC Details |
| 18 | CVE-2018-25031 | https://github.com/nigartest/CVE-2018-25031 | POC Details |
| 19 | None | https://github.com/faccimatteo/CVE-2018-25031 | POC Details |
| 20 | None | https://github.com/h4ckt0m/CVE-2018-25031-test | POC Details |
| 21 | None | https://github.com/rasinfosec/CVE-2018-25031 | POC Details |
| 22 | POC for Testing HTML Injection in Swagger UI (CVE-2018-25031). | https://github.com/rh007pt/swagger-ui | POC Details |
| 23 | POC for Testing HTML Injection in Swagger UI (CVE-2018-25031). | https://github.com/RelicHunt3r/swagger-ui | POC Details |
| 24 | None | https://github.com/labeebSabbah/CVE-2018-25031 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet