尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| djangoproject | Django | 5.2 ~ 5.2.8 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/rockmelodies/django_sqli_target_CVE-2025-64459 | POC详情 |
| 2 | check if vulnerable python-django version to CVE-2025-64459 bug | https://github.com/nunpa/CVE-2025-64459 | POC详情 |
| 3 | CVE-2025-64459 | https://github.com/B1ack4sh/Blackash-CVE-2025-64459 | POC详情 |
| 4 | A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter() parameter injection via dictionary expansion using Docker. | https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed | POC详情 |
| 5 | CVE-2025-64459 | https://github.com/Ashwesker/Blackash-CVE-2025-64459 | POC详情 |
| 6 | Vulnerability: SQL Injection via QuerySet and Q() keyword argument unpacking. CVE ID: CVE-2025-64459 Severity: Critical (CVSS 9.1) Affected Versions: Django 5.1 < 5.1.14, 4.2 < 4.2.26, and 5.2 < 5.2.8. Researcher: Cyberstan (University of Warwick) | https://github.com/stanly363/CVE-2025-64459-Poc | POC详情 |
| 7 | None | https://github.com/ZeYrOXxXxXxX/CVE-2025-64459 | POC详情 |
| 8 | CVE-2025-64459-Exploit-Fix | https://github.com/ALPYAHYA/CVE-2025-64459-Exploit-Fix | POC详情 |
| 9 | CVE-2025-64459-Exploit-PoC | https://github.com/ALPYAHYA/CVE-2025-64459-Exploit-PoC | POC详情 |
| 10 | None | https://github.com/Z3YR0xX/CVE-2025-64459 | POC详情 |
| 11 | CVE-2025-64459 | https://github.com/Ashwesker/Ashwesker-CVE-2025-64459 | POC详情 |
| 12 | None | https://github.com/alxsourin/Helpdesk-Telecom-CVE-2025-64459 | POC详情 |
| 13 | CVE-2025-64459-hunter | https://github.com/purehate/CVE-2025-64459-hunter | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论