Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/weliveby/cve-2024-38816-demo | POC Details |
| 2 | CVE-2024-38816 Proof of Concept | https://github.com/masa42/CVE-2024-38816-PoC | POC Details |
| 3 | CVE-2024-38816 Proof of Concept | https://github.com/WULINPIN/CVE-2024-38816-PoC | POC Details |
| 4 | None | https://github.com/startsw1th/cve-2024-38816-demo | POC Details |
| 5 | None | https://github.com/Galaxy-system/cve-2024-38816 | POC Details |
| 6 | CVE-2024-38816 | https://github.com/Anthony1078/App-vulnerable | POC Details |
| 7 | Fixed cve-2024-38816 based on version 5.3.39 | https://github.com/wdragondragon/spring-framework | POC Details |
| 8 | Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38816.yaml | POC Details |
| 9 | Fork spring-webmvc 5.3.39 to fix CVE-2024-38816, CVE-2024-38819 | https://github.com/jaloon/spring-webmvc5 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet