Files
CVEs-PoC/2014/CVE-2014-3625.md
T
2024-05-26 14:27:05 +02:00

42 lines
1.7 KiB
Markdown

### [CVE-2014-3625](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3625)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Directory traversal vulnerability in Pivotal Spring Framework 3.0.4 through 3.2.x before 3.2.12, 4.0.x before 4.0.8, and 4.1.x before 4.1.2 allows remote attackers to read arbitrary files via unspecified vectors, related to static resource handling.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/301415926/Web-Security-Leanrning
- https://github.com/666999z/2
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CHYbeta/Web-Security-Learning
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
- https://github.com/JERRY123S/all-poc
- https://github.com/R0B1NL1N/Web-Security-Learning
- https://github.com/TaiiHu/Web-Security-Learning-master
- https://github.com/YinWC/Security_Learning
- https://github.com/asw3asw/Web-Security-Learning
- https://github.com/catcher-mis/web-
- https://github.com/copperfieldd/Web-Security-Learning
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/gforresu/SpringPathTraversal
- https://github.com/hktalent/TOP
- https://github.com/ilmila/J2EEScan
- https://github.com/ilmila/springcss-cve-2014-3625
- https://github.com/jbmihoub/all-poc
- https://github.com/ronoski/j2ee-rscan
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/xfinest/Web-Security-Learning
- https://github.com/yEss5Lq/web_hack