尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | PoC for CVE-2018-15133 (Laravel unserialize vulnerability) | https://github.com/kozmic/laravel-poc-CVE-2018-15133 | POC详情 |
| 2 | Cette exploit en python va vous permettre de créer des listes de sites et les exploiter rapidement. | https://github.com/Bilelxdz/Laravel-CVE-2018-15133 | POC详情 |
| 3 | Laravel-PHP-Unit-RCE (CVE-2018-15133) Auto Exploiter and Shell Uploader | https://github.com/Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader | POC详情 |
| 4 | CVE-2018-15133 (Webased) | https://github.com/bukitbarisan/laravel-rce-cve-2018-15133 | POC详情 |
| 5 | An automated PoC for CVE 2018-15133 | https://github.com/AlienX2001/better-poc-for-CVE-2018-15133 | POC详情 |
| 6 | Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133) | https://github.com/aljavier/exploit_laravel_cve-2018-15133 | POC详情 |
| 7 | Laravel RCE exploit. CVE-2018-15133 | https://github.com/pwnedshell/Larascript | POC详情 |
| 8 | None | https://github.com/AzhariKun/CVE-2018-15133 | POC详情 |
| 9 | "Lavel Exploit CVE-2018-15133 is a powerful exploit that allows attackers to gain unauthorized access to vulnerable systems. This exploit was originally developed as part of a Capture The Flag (CTF) challenge and has since been used by security researchers and ethical hackers to identify and address vulnerabilities in web applications. | https://github.com/NatteeSetobol/CVE-2018-15133-Lavel-Expliot | POC详情 |
| 10 | None | https://github.com/0xSalle/cve-2018-15133 | POC详情 |
| 11 | None | https://github.com/yeahhbean/Laravel-CVE-2018-15133 | POC详情 |
| 12 | None | https://github.com/Loaxert/CVE-2018-15133-PoC | POC详情 |
| 13 | Reproducible Docker lab for CVE-2018-15133 (Laravel Framework token unserialize RCE) | https://github.com/flame-11/CVE-2018-15133-laravel-framework | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论