PoC-in-GitHub/2025/CVE-2025-3248.json
2025-09-14 03:36:29 +09:00

295 lines
No EOL
10 KiB
JSON

[
{
"id": 963904467,
"name": "CVE-2025-3248",
"full_name": "xuemian168\/CVE-2025-3248",
"owner": {
"login": "xuemian168",
"id": 38741078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38741078?v=4",
"html_url": "https:\/\/github.com\/xuemian168",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xuemian168\/CVE-2025-3248",
"description": "A vulnerability scanner for CVE-2025-3248 in Langflow applications. 用于扫描 Langflow 应用中 CVE-2025-3248 漏洞的工具。",
"fork": false,
"created_at": "2025-04-10T11:45:57Z",
"updated_at": "2025-06-25T11:04:06Z",
"pushed_at": "2025-04-10T12:32:30Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ai",
"langflow"
],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 963981735,
"name": "CVE-2025-3248-POC",
"full_name": "PuddinCat\/CVE-2025-3248-POC",
"owner": {
"login": "PuddinCat",
"id": 131779933,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131779933?v=4",
"html_url": "https:\/\/github.com\/PuddinCat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PuddinCat\/CVE-2025-3248-POC",
"description": "POC of CVE-2025-3248, RCE of LangFlow",
"fork": false,
"created_at": "2025-04-10T14:04:29Z",
"updated_at": "2025-04-10T19:31:11Z",
"pushed_at": "2025-04-10T16:39:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248",
"exp",
"langflow",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 967470704,
"name": "CVE-2025-3248",
"full_name": "verylazytech\/CVE-2025-3248",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2025-3248",
"description": null,
"fork": false,
"created_at": "2025-04-16T14:00:02Z",
"updated_at": "2025-08-14T05:03:42Z",
"pushed_at": "2025-04-16T16:48:38Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248",
"langflow",
"rce"
],
"visibility": "public",
"forks": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 978265945,
"name": "CVE-2025-3248",
"full_name": "Praison001\/CVE-2025-3248",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2025-3248",
"description": "Scanner and exploit for CVE-2025-3248",
"fork": false,
"created_at": "2025-05-05T18:10:44Z",
"updated_at": "2025-05-07T04:08:50Z",
"pushed_at": "2025-05-05T18:20:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 982933237,
"name": "CVE-2025-3248",
"full_name": "vigilante-1337\/CVE-2025-3248",
"owner": {
"login": "vigilante-1337",
"id": 208334620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/208334620?v=4",
"html_url": "https:\/\/github.com\/vigilante-1337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vigilante-1337\/CVE-2025-3248",
"description": "CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors to execute arbitrary Python code on the target system. This can lead to full remote code execution without authentication, potentially giving attackers control over the server.",
"fork": false,
"created_at": "2025-05-13T16:08:37Z",
"updated_at": "2025-05-16T09:16:58Z",
"pushed_at": "2025-05-13T16:12:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 991032075,
"name": "CVE-2025-3248",
"full_name": "Vip3rLi0n\/CVE-2025-3248",
"owner": {
"login": "Vip3rLi0n",
"id": 21289340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21289340?v=4",
"html_url": "https:\/\/github.com\/Vip3rLi0n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Vip3rLi0n\/CVE-2025-3248",
"description": "Perform Remote Code Execution using vulnerable API endpoint.",
"fork": false,
"created_at": "2025-05-27T03:01:16Z",
"updated_at": "2025-05-27T15:35:27Z",
"pushed_at": "2025-05-27T03:03:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 993961114,
"name": "RCE-CVE-2025-3248",
"full_name": "tiemio\/RCE-CVE-2025-3248",
"owner": {
"login": "tiemio",
"id": 196255514,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/196255514?v=4",
"html_url": "https:\/\/github.com\/tiemio",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tiemio\/RCE-CVE-2025-3248",
"description": "This Python script exploits CVE-2025-3248 to execute arbitrary commands or spawn a reverse shell on a vulnerable system. Authentication is required to use this exploit.",
"fork": false,
"created_at": "2025-05-31T22:25:35Z",
"updated_at": "2025-05-31T22:29:18Z",
"pushed_at": "2025-05-31T22:29:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1014573339,
"name": "CVE-2025-3248",
"full_name": "r0otk3r\/CVE-2025-3248",
"owner": {
"login": "r0otk3r",
"id": 211012408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/211012408?v=4",
"html_url": "https:\/\/github.com\/r0otk3r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r0otk3r\/CVE-2025-3248",
"description": null,
"fork": false,
"created_at": "2025-07-06T01:49:50Z",
"updated_at": "2025-07-13T17:17:03Z",
"pushed_at": "2025-07-12T10:56:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1049411921,
"name": "CVE-2025-3248",
"full_name": "min8282\/CVE-2025-3248",
"owner": {
"login": "min8282",
"id": 137873062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137873062?v=4",
"html_url": "https:\/\/github.com\/min8282",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/min8282\/CVE-2025-3248",
"description": "CVE-2025-3248",
"fork": false,
"created_at": "2025-09-03T00:13:48Z",
"updated_at": "2025-09-12T05:15:51Z",
"pushed_at": "2025-09-12T05:14:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]