高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | Exploit for CVE-2021-3129 | https://github.com/ambionics/laravel-exploits | POC詳細 |
| 2 | Laravel debug rce | https://github.com/SNCKER/CVE-2021-3129 | POC詳細 |
| 3 | None | https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP | POC詳細 |
| 4 | None | https://github.com/crisprss/Laravel_CVE-2021-3129_EXP | POC詳細 |
| 5 | Exploit for CVE-2021-3129 | https://github.com/nth347/CVE-2021-3129_exploit | POC詳細 |
| 6 | None | https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129 | POC詳細 |
| 7 | Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129) | https://github.com/zhzyker/CVE-2021-3129 | POC詳細 |
| 8 | CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞 | https://github.com/simonlee-hello/CVE-2021-3129 | POC詳細 |
| 9 | None | https://github.com/idea-oss/laravel-CVE-2021-3129-EXP | POC詳細 |
| 10 | PoC for CVE-2021-3129 (Laravel) | https://github.com/knqyf263/CVE-2021-3129 | POC詳細 |
| 11 | Add revert shell | https://github.com/cuongtop4598/CVE-2021-3129-Script | POC詳細 |
| 12 | Laravel RCE (CVE-2021-3129) | https://github.com/joshuavanderpoll/CVE-2021-3129 | POC詳細 |
| 13 | CVE-2021-3129 POC | https://github.com/shadowabi/Laravel-CVE-2021-3129 | POC詳細 |
| 14 | Unauthenticated RCE in Laravel Debug Mode <8.4.2 | https://github.com/JacobEbben/CVE-2021-3129 | POC詳細 |
| 15 | Laravel debug mode - Remote Code Execution (RCE) | https://github.com/hupe1980/CVE-2021-3129 | POC詳細 |
| 16 | CVE-2021-3129-Laravel Debug mode | https://github.com/0nion1/CVE-2021-3129 | POC詳細 |
| 17 | CVE-2021-3129 Exploit Checker By ./MrMad | https://github.com/MadExploits/Laravel-debug-Checker | POC詳細 |
| 18 | Laravel Debug mode RCE漏洞(CVE-2021-3129)poc / exp | https://github.com/ajisai-babu/CVE-2021-3129-exp | POC詳細 |
| 19 | Laravel RCE CVE-2021-3129 | https://github.com/keyuan15/CVE-2021-3129 | POC詳細 |
| 20 | None | https://github.com/qaisarafridi/cve-2021-3129 | POC詳細 |
| 21 | None | https://github.com/Zoo1sondv/CVE-2021-3129 | POC詳細 |
| 22 | Laravel RCE (CVE-2021-3129) | https://github.com/miko550/CVE-2021-3129 | POC詳細 |
| 23 | CVE-2021-3129 | Laravel Debug Mode Vulnerability | https://github.com/withmasday/CVE-2021-3129 | POC詳細 |
| 24 | None | https://github.com/banyaksepuh/Mass-CVE-2021-3129-Scanner | POC詳細 |
| 25 | None | https://github.com/Axianke/CVE-2021-3129 | POC詳細 |
| 26 | A exploit script for CVE-2021-3129 | https://github.com/cc3305/CVE-2021-3129 | POC詳細 |
| 27 | CVE-2021-3129 | Laravel Debug Mode Vulnerability | https://github.com/wmasday/CVE-2021-3129 | POC詳細 |
| 28 | Laravel Debug Mode and Payload | https://github.com/piperpwn/CVE-2021-3129- | POC詳細 |
| 29 | CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞 | https://github.com/Y0s9/CVE-2021-3129 | POC詳細 |
| 30 | CVE-2021-3129 Laravel Ignition RCE Exploit | https://github.com/0x0d3ad/CVE-2021-3129 | POC詳細 |
| 31 | None | https://github.com/GodOfServer/CVE-2021-3129 | POC詳細 |
| 32 | Modified version of laravel ignition RCE (CVE-2021-3129) exploit script for Hour of Hack Session-4 | https://github.com/Prabesh01/hoh4 | POC詳細 |
| 33 | ## About The script has been made for exploiting the Laravel RCE (CVE-2021-3129) vulnerability.<br> This script allows you to write/execute commands on a website running <b>Laravel <= v8.4.2</b>, that has "APP_DEBUG" set to "true" in its ".env" file. | https://github.com/lukwagoasuman/CVE-2021-3129---Laravel-RCE | POC詳細 |
| 34 | Laravel Debug Mode and Payload | https://github.com/piperpwn/CVE-2021-3129-piperpwn | POC詳細 |
| 35 | Laravel version 8.4.2 and before with Ignition before 2.5.2 allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-3129.yaml | POC詳細 |
| 36 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Laravel%20%E5%B0%8F%E4%BA%8E%208.4.2%20Debug%E6%A8%A1%E5%BC%8F%20_ignition%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-3129.md | POC詳細 |
| 37 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Laravel%20Ignition%202.5.1%20%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-3129.md | POC詳細 |
| 38 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/laravel-cve-2021-3129.yml | POC詳細 |
| 39 | https://github.com/vulhub/vulhub/blob/master/laravel/CVE-2021-3129/README.md | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2020-35459 | Clusterlabs Crmsh 安全漏洞 | |
| CVE-2021-23927 | Open-xchange OX App Suite 代码问题漏洞 | |
| CVE-2021-23928 | Open-xchange OX App Suite 跨站脚本漏洞 | |
| CVE-2021-23929 | Open-xchange OX App Suite 跨站脚本漏洞 | |
| CVE-2021-23930 | Open-xchange OX App Suite 跨站脚本漏洞 | |
| CVE-2021-23931 | Open-xchange OX App Suite 跨站脚本漏洞 | |
| CVE-2021-23932 | Open-xchange OX App Suite 跨站脚本漏洞 | |
| CVE-2021-23933 | Open-xchange OX App Suite 跨站脚本漏洞 | |
| CVE-2021-23934 | Open-xchange OX App Suite 跨站脚本漏洞 | |
| CVE-2021-23935 | Open-xchange OX App Suite 跨站脚本漏洞 | |
| CVE-2021-23936 | Open-xchange OX App Suite 跨站脚本漏洞 | |
| CVE-2020-36190 | RailsAdmin 跨站脚本漏洞 | |
| CVE-2021-3134 | 北京坤豆 Mubu 授权问题漏洞 | |
| CVE-2021-3133 | WordPress Elementor Contact Form DB plugin 跨站请求伪造漏洞 | |
| CVE-2020-13116 | Opentext Carbonite 跨站脚本漏洞 | |
| CVE-2020-25657 | m2crypto 安全漏洞 | |
| CVE-2020-27637 | R Cran 路径遍历漏洞 | |
| CVE-2020-14274 | HCL Commerce 信息泄露漏洞 | |
| CVE-2020-14275 | HCL Commerce 安全漏洞 | |
| CVE-2020-35458 | ClusterLabs Hawk 代码注入漏洞 |
Showing 20 of 32 CVEs. View all on vendor page →
まだコメントはありません