尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | 最新的CVE-2025-30208的poc(这个仓库主要拿来写实战src的一些自己写的bypass-waf的脚本以及搜集的干货博主) | https://github.com/LiChaser/CVE-2025-30208 | POC详情 |
| 2 | 全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation | https://github.com/xuemian168/CVE-2025-30208 | POC详情 |
| 3 | CVE-2025-30208-EXP | https://github.com/ThumpBo/CVE-2025-30208-EXP | POC详情 |
| 4 | CVE-2025-30208 检测工具。python script && nuclei template | https://github.com/xaitx/CVE-2025-30208 | POC详情 |
| 5 | CVE-2025-30208漏洞验证工具 | https://github.com/kk12-30/CVE-2025-30208 | POC详情 |
| 6 | CVE-2025-30208 任意文件读取漏洞快速验证 | https://github.com/YuanBenSir/CVE-2025-30208_POC | POC详情 |
| 7 | CVE-2025-30208-EXP 任意文件读取 | https://github.com/marino-admin/Vite-CVE-2025-30208-Scanner | POC详情 |
| 8 | CVE-2025-30208动态检测脚本,支持默认路径,自定义路径动态检测 | https://github.com/iSee857/CVE-2025-30208-PoC | POC详情 |
| 9 | This exploit is for educational and ethical security testing purposes only. The use of this exploit against targets without prior mutual consent is illegal, and the developer disclaims any liability for misuse or damage caused by this exploit. | https://github.com/On1onss/CVE-2025-30208-LFI | POC详情 |
| 10 | CVE-2025-30208 | Vite脚本 | https://github.com/sadhfdw129/CVE-2025-30208-Vite | POC详情 |
| 11 | CVE-2025-30208 ViteVulnScanner | https://github.com/keklick1337/CVE-2025-30208-ViteVulnScanner | POC详情 |
| 12 | A PoC of the exploit script for the Arbitrary File Read vulnerability of Vite /@fs/ Path Traversal in the transformMiddleware (CVE-2025-30208). | https://github.com/4xura/CVE-2025-30208 | POC详情 |
| 13 | 针对CVE-2025-30208和CVE-2025-31125的漏洞利用 | https://github.com/jackieya/ViteVulScan | POC详情 |
| 14 | None | https://github.com/0xshaheen/CVE-2025-30208 | POC详情 |
| 15 | mass scan for CVE-2025-30208 | https://github.com/sumeet-darekar/CVE-2025-30208 | POC详情 |
| 16 | CVE-2025-30208 - Vite Arbitrary File Read PoC | https://github.com/4m3rr0r/CVE-2025-30208-PoC | POC详情 |
| 17 | Vite-CVE-2025-30208-EXP单目标检测,支持自定义读取路径,深度检索 | https://github.com/lilil3333/Vite-CVE-2025-30208-EXP | POC详情 |
| 18 | Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-30208.yaml | POC详情 |
| 19 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Vite%20%E5%BC%80%E5%8F%91%E6%9C%8D%E5%8A%A1%E5%99%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%E7%BB%95%E8%BF%87%20CVE-2025-30208.md | POC详情 |
| 20 | https://github.com/vulhub/vulhub/blob/master/vite/CVE-2025-30208/README.md | POC详情 | |
| 21 | CVE-2025-30208 vite file read nuclei template | https://github.com/imbas007/CVE-2025-30208-template | POC详情 |
| 22 | Analysis of the Reproduction of CVE-2025-30208 Series Vulnerabilities | https://github.com/r0ngy40/CVE-2025-30208-Series | POC详情 |
| 23 | None | https://github.com/nkuty/CVE-2025-30208-31125-31486-32395 | POC详情 |
| 24 | POC | https://github.com/HaGsec/CVE-2025-30208 | POC详情 |
| 25 | CVE-2025-30208 | https://github.com/B1ack4sh/Blackash-CVE-2025-30208 | POC详情 |
| 26 | CVE‑2025‑30208 is a medium-severity arbitrary file read vulnerability in the Vite development server (a popular frontend build tool) | https://github.com/ThemeHackers/CVE-2025-30208 | POC详情 |
| 27 | CVE‑2025‑30208 is a medium-severity arbitrary file read vulnerability in the Vite development server (a popular frontend build tool) | https://github.com/TH-SecForge/CVE-2025-30208 | POC详情 |
| 28 | CVE-2025-30208 | https://github.com/gonn4cry/CVE-2025-30208 | POC详情 |
| 29 | 🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning. | https://github.com/Dany60-98/CVE-2025-30208-EXP | POC详情 |
| 30 | CVE-2025-30208 | https://github.com/bugdotexe/CVE-2025-30208 | POC详情 |
| 31 | CVE-2025-30208 | https://github.com/qodo-dev/CVE-2025-30208 | POC详情 |
| 32 | CVE-2025-30208 任意文件读取漏洞快速验证 | https://github.com/MiclelsonCN/CVE-2025-30208_POC | POC详情 |
| 33 | CVE-2025-30208 检测工具。python script && nuclei template | https://github.com/Lusensec/CVE-2025-30208 | POC详情 |
| 34 | CVE-2025-30208 | https://github.com/Ashwesker/Blackash-CVE-2025-30208 | POC详情 |
| 35 | This repository documents CVE-2025-30208, an Arbitrary File Read vulnerability affecting Vite development servers when misconfigured or exposed to untrusted networks. | https://github.com/layanOd/CVE-2025-30208-Arbitrary-File-Read-in-Vite-servers | POC详情 |
| 36 | This exploit is for educational and ethical security testing purposes only. The use of this exploit against targets without prior mutual consent is illegal, and the developer disclaims any liability for misuse or damage caused by this exploit. | https://github.com/On1onss/CVE-2025-30208 | POC详情 |
| 37 | CVE-2025-30208 | https://github.com/Ashwesker/Ashwesker-CVE-2025-30208 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论