PoC-in-GitHub/2025/CVE-2025-3248.json
2025-05-20 15:34:49 +09:00

169 lines
No EOL
5.8 KiB
JSON

[
{
"id": 963904467,
"name": "CVE-2025-3248",
"full_name": "xuemian168\/CVE-2025-3248",
"owner": {
"login": "xuemian168",
"id": 38741078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38741078?v=4",
"html_url": "https:\/\/github.com\/xuemian168",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xuemian168\/CVE-2025-3248",
"description": "A vulnerability scanner for CVE-2025-3248 in Langflow applications. 用于扫描 Langflow 应用中 CVE-2025-3248 漏洞的工具。",
"fork": false,
"created_at": "2025-04-10T11:45:57Z",
"updated_at": "2025-04-30T17:31:11Z",
"pushed_at": "2025-04-10T12:32:30Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ai",
"langflow"
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 963981735,
"name": "CVE-2025-3248-POC",
"full_name": "PuddinCat\/CVE-2025-3248-POC",
"owner": {
"login": "PuddinCat",
"id": 131779933,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131779933?v=4",
"html_url": "https:\/\/github.com\/PuddinCat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PuddinCat\/CVE-2025-3248-POC",
"description": "POC of CVE-2025-3248, RCE of LangFlow",
"fork": false,
"created_at": "2025-04-10T14:04:29Z",
"updated_at": "2025-04-10T19:31:11Z",
"pushed_at": "2025-04-10T16:39:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248",
"exp",
"langflow",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 967470704,
"name": "CVE-2025-3248",
"full_name": "verylazytech\/CVE-2025-3248",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2025-3248",
"description": null,
"fork": false,
"created_at": "2025-04-16T14:00:02Z",
"updated_at": "2025-04-17T07:37:58Z",
"pushed_at": "2025-04-16T16:48:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248",
"langflow",
"rce"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 978265945,
"name": "CVE-2025-3248",
"full_name": "Praison001\/CVE-2025-3248",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2025-3248",
"description": "Scanner and exploit for CVE-2025-3248",
"fork": false,
"created_at": "2025-05-05T18:10:44Z",
"updated_at": "2025-05-07T04:08:50Z",
"pushed_at": "2025-05-05T18:20:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 982933237,
"name": "CVE-2025-3248",
"full_name": "vigilante-1337\/CVE-2025-3248",
"owner": {
"login": "vigilante-1337",
"id": 208334620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/208334620?v=4",
"html_url": "https:\/\/github.com\/vigilante-1337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vigilante-1337\/CVE-2025-3248",
"description": "CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors to execute arbitrary Python code on the target system. This can lead to full remote code execution without authentication, potentially giving attackers control over the server.",
"fork": false,
"created_at": "2025-05-13T16:08:37Z",
"updated_at": "2025-05-16T09:16:58Z",
"pushed_at": "2025-05-13T16:12:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]