PoC-in-GitHub/2025/CVE-2025-3248.json
2025-08-15 03:40:13 +09:00

574 lines
No EOL
20 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 963904467,
"name": "CVE-2025-3248",
"full_name": "xuemian168\/CVE-2025-3248",
"owner": {
"login": "xuemian168",
"id": 38741078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38741078?v=4",
"html_url": "https:\/\/github.com\/xuemian168",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xuemian168\/CVE-2025-3248",
"description": "A vulnerability scanner for CVE-2025-3248 in Langflow applications. 用于扫描 Langflow 应用中 CVE-2025-3248 漏洞的工具。",
"fork": false,
"created_at": "2025-04-10T11:45:57Z",
"updated_at": "2025-06-25T11:04:06Z",
"pushed_at": "2025-04-10T12:32:30Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ai",
"langflow"
],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 963981735,
"name": "CVE-2025-3248-POC",
"full_name": "PuddinCat\/CVE-2025-3248-POC",
"owner": {
"login": "PuddinCat",
"id": 131779933,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131779933?v=4",
"html_url": "https:\/\/github.com\/PuddinCat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PuddinCat\/CVE-2025-3248-POC",
"description": "POC of CVE-2025-3248, RCE of LangFlow",
"fork": false,
"created_at": "2025-04-10T14:04:29Z",
"updated_at": "2025-04-10T19:31:11Z",
"pushed_at": "2025-04-10T16:39:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248",
"exp",
"langflow",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 967470704,
"name": "CVE-2025-3248",
"full_name": "verylazytech\/CVE-2025-3248",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2025-3248",
"description": null,
"fork": false,
"created_at": "2025-04-16T14:00:02Z",
"updated_at": "2025-08-14T05:03:42Z",
"pushed_at": "2025-04-16T16:48:38Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248",
"langflow",
"rce"
],
"visibility": "public",
"forks": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 978265945,
"name": "CVE-2025-3248",
"full_name": "Praison001\/CVE-2025-3248",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2025-3248",
"description": "Scanner and exploit for CVE-2025-3248",
"fork": false,
"created_at": "2025-05-05T18:10:44Z",
"updated_at": "2025-05-07T04:08:50Z",
"pushed_at": "2025-05-05T18:20:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 982933237,
"name": "CVE-2025-3248",
"full_name": "vigilante-1337\/CVE-2025-3248",
"owner": {
"login": "vigilante-1337",
"id": 208334620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/208334620?v=4",
"html_url": "https:\/\/github.com\/vigilante-1337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vigilante-1337\/CVE-2025-3248",
"description": "CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors to execute arbitrary Python code on the target system. This can lead to full remote code execution without authentication, potentially giving attackers control over the server.",
"fork": false,
"created_at": "2025-05-13T16:08:37Z",
"updated_at": "2025-05-16T09:16:58Z",
"pushed_at": "2025-05-13T16:12:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 991032075,
"name": "CVE-2025-3248",
"full_name": "Vip3rLi0n\/CVE-2025-3248",
"owner": {
"login": "Vip3rLi0n",
"id": 21289340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21289340?v=4",
"html_url": "https:\/\/github.com\/Vip3rLi0n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Vip3rLi0n\/CVE-2025-3248",
"description": "Perform Remote Code Execution using vulnerable API endpoint.",
"fork": false,
"created_at": "2025-05-27T03:01:16Z",
"updated_at": "2025-05-27T15:35:27Z",
"pushed_at": "2025-05-27T03:03:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 993961114,
"name": "RCE-CVE-2025-3248",
"full_name": "tiemio\/RCE-CVE-2025-3248",
"owner": {
"login": "tiemio",
"id": 196255514,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/196255514?v=4",
"html_url": "https:\/\/github.com\/tiemio",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tiemio\/RCE-CVE-2025-3248",
"description": "This Python script exploits CVE-2025-3248 to execute arbitrary commands or spawn a reverse shell on a vulnerable system. Authentication is required to use this exploit.",
"fork": false,
"created_at": "2025-05-31T22:25:35Z",
"updated_at": "2025-05-31T22:29:18Z",
"pushed_at": "2025-05-31T22:29:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1003514619,
"name": "CVE-2025-3248-Langflow-RCE",
"full_name": "ynsmroztas\/CVE-2025-3248-Langflow-RCE",
"owner": {
"login": "ynsmroztas",
"id": 58443521,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58443521?v=4",
"html_url": "https:\/\/github.com\/ynsmroztas",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ynsmroztas\/CVE-2025-3248-Langflow-RCE",
"description": "CVE-2025-3248 Langflow RCE Exploit",
"fork": false,
"created_at": "2025-06-17T09:06:20Z",
"updated_at": "2025-07-29T10:53:50Z",
"pushed_at": "2025-06-17T09:07:43Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 15,
"score": 0,
"subscribers_count": 0
},
{
"id": 1004051602,
"name": "CVE-2025-3248",
"full_name": "imbas007\/CVE-2025-3248",
"owner": {
"login": "imbas007",
"id": 100182585,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100182585?v=4",
"html_url": "https:\/\/github.com\/imbas007",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/imbas007\/CVE-2025-3248",
"description": null,
"fork": false,
"created_at": "2025-06-18T03:42:57Z",
"updated_at": "2025-07-18T01:09:53Z",
"pushed_at": "2025-06-18T04:35:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1004536002,
"name": "CVE-2025-3248",
"full_name": "0xgh057r3c0n\/CVE-2025-3248",
"owner": {
"login": "0xgh057r3c0n",
"id": 144083709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144083709?v=4",
"html_url": "https:\/\/github.com\/0xgh057r3c0n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xgh057r3c0n\/CVE-2025-3248",
"description": "Exploit for Langflow AI Remote Code Execution (Unauthenticated)",
"fork": false,
"created_at": "2025-06-18T19:27:52Z",
"updated_at": "2025-06-18T19:59:16Z",
"pushed_at": "2025-06-18T19:59:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1004764154,
"name": "CVE-2025-3248",
"full_name": "zapstiko\/CVE-2025-3248",
"owner": {
"login": "zapstiko",
"id": 44252004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44252004?v=4",
"html_url": "https:\/\/github.com\/zapstiko",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zapstiko\/CVE-2025-3248",
"description": "CVE-2025-3248 — Langflow RCE Exploit",
"fork": false,
"created_at": "2025-06-19T06:30:29Z",
"updated_at": "2025-07-16T04:58:33Z",
"pushed_at": "2025-06-19T06:47:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1006591365,
"name": "Blackash-CVE-2025-3248",
"full_name": "B1ack4sh\/Blackash-CVE-2025-3248",
"owner": {
"login": "B1ack4sh",
"id": 215029052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/215029052?v=4",
"html_url": "https:\/\/github.com\/B1ack4sh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/B1ack4sh\/Blackash-CVE-2025-3248",
"description": "CVE-2025-3248 Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage",
"fork": false,
"created_at": "2025-06-22T15:49:32Z",
"updated_at": "2025-06-22T21:20:28Z",
"pushed_at": "2025-06-22T21:20:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1006609193,
"name": "CVE-2025-3248-Scanner",
"full_name": "issamjr\/CVE-2025-3248-Scanner",
"owner": {
"login": "issamjr",
"id": 101994309,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4",
"html_url": "https:\/\/github.com\/issamjr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/issamjr\/CVE-2025-3248-Scanner",
"description": "Powerful unauthenticated RCE scanner for CVE-2025-3248 affecting Langflow < 1.3.0",
"fork": false,
"created_at": "2025-06-22T16:30:27Z",
"updated_at": "2025-08-14T15:11:20Z",
"pushed_at": "2025-06-23T23:11:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1006778763,
"name": "langflow-rce-exploit",
"full_name": "0-d3y\/langflow-rce-exploit",
"owner": {
"login": "0-d3y",
"id": 103077384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103077384?v=4",
"html_url": "https:\/\/github.com\/0-d3y",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0-d3y\/langflow-rce-exploit",
"description": "Remote Code Execution Exploit for Langflow (CVE-2025-3248) - [ By S4Tech ]",
"fork": false,
"created_at": "2025-06-23T01:23:09Z",
"updated_at": "2025-06-29T11:02:55Z",
"pushed_at": "2025-06-23T02:47:40Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},
{
"id": 1006980686,
"name": "CVE-2025-3248",
"full_name": "dennisec\/CVE-2025-3248",
"owner": {
"login": "dennisec",
"id": 87594979,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87594979?v=4",
"html_url": "https:\/\/github.com\/dennisec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dennisec\/CVE-2025-3248",
"description": "CVE-2025-3248",
"fork": false,
"created_at": "2025-06-23T09:30:48Z",
"updated_at": "2025-06-23T09:30:48Z",
"pushed_at": "2025-06-23T09:30:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1006983984,
"name": "Mass-CVE-2025-3248",
"full_name": "dennisec\/Mass-CVE-2025-3248",
"owner": {
"login": "dennisec",
"id": 87594979,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87594979?v=4",
"html_url": "https:\/\/github.com\/dennisec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dennisec\/Mass-CVE-2025-3248",
"description": "Mass-CVE-2025-3248",
"fork": false,
"created_at": "2025-06-23T09:36:39Z",
"updated_at": "2025-08-04T21:56:15Z",
"pushed_at": "2025-06-23T09:43:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1008110127,
"name": "Langflow-CVE-2025-3248-Multi-target",
"full_name": "ill-deed\/Langflow-CVE-2025-3248-Multi-target",
"owner": {
"login": "ill-deed",
"id": 210107232,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210107232?v=4",
"html_url": "https:\/\/github.com\/ill-deed",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ill-deed\/Langflow-CVE-2025-3248-Multi-target",
"description": "Langflow versions prior to 1.3.0 are susceptible to code injection in the \/api\/v1\/validate\/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.",
"fork": false,
"created_at": "2025-06-25T03:40:58Z",
"updated_at": "2025-07-27T23:44:43Z",
"pushed_at": "2025-07-27T23:44:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1014573339,
"name": "CVE-2025-3248",
"full_name": "r0otk3r\/CVE-2025-3248",
"owner": {
"login": "r0otk3r",
"id": 211012408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/211012408?v=4",
"html_url": "https:\/\/github.com\/r0otk3r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r0otk3r\/CVE-2025-3248",
"description": null,
"fork": false,
"created_at": "2025-07-06T01:49:50Z",
"updated_at": "2025-07-13T17:17:03Z",
"pushed_at": "2025-07-12T10:56:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]