Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | spider-flow | 0.4.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | SpiderFlow Crawler Platform - Remote Code Execution | https://github.com/Cappricio-Securities/CVE-2024-0195 | POC Details |
| 2 | CVE-2024-0195 Improper Control of Generation of Code ('Code Injection') | https://github.com/fa-rrel/CVE-2024-0195-SpiderFlow | POC Details |
| 3 | None | https://github.com/MuhammadWaseem29/CVE-2024-0195-SpiderFlow | POC Details |
| 4 | None | https://github.com/hack-with-rohit/CVE-2024-0195-SpiderFlow | POC Details |
| 5 | CVE-2024-0195 Improper Control of Generation of Code ('Code Injection') | https://github.com/gh-ost00/CVE-2024-0195-SpiderFlow | POC Details |
| 6 | A vulnerability, which was classified as critical, was found in spider-flow 0.4.3. Affected is the function FunctionService.saveFunction of the file src/main/java/org/spiderflow/controller/FunctionController.java. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249510 is the identifier assigned to this vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-0195.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet