Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for CVE-2021-3129 | https://github.com/ambionics/laravel-exploits | POC Details |
| 2 | Laravel debug rce | https://github.com/SNCKER/CVE-2021-3129 | POC Details |
| 3 | None | https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP | POC Details |
| 4 | None | https://github.com/crisprss/Laravel_CVE-2021-3129_EXP | POC Details |
| 5 | Exploit for CVE-2021-3129 | https://github.com/nth347/CVE-2021-3129_exploit | POC Details |
| 6 | None | https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129 | POC Details |
| 7 | Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129) | https://github.com/zhzyker/CVE-2021-3129 | POC Details |
| 8 | CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞 | https://github.com/simonlee-hello/CVE-2021-3129 | POC Details |
| 9 | None | https://github.com/idea-oss/laravel-CVE-2021-3129-EXP | POC Details |
| 10 | PoC for CVE-2021-3129 (Laravel) | https://github.com/knqyf263/CVE-2021-3129 | POC Details |
| 11 | Add revert shell | https://github.com/cuongtop4598/CVE-2021-3129-Script | POC Details |
| 12 | Laravel RCE (CVE-2021-3129) | https://github.com/joshuavanderpoll/CVE-2021-3129 | POC Details |
| 13 | CVE-2021-3129 POC | https://github.com/shadowabi/Laravel-CVE-2021-3129 | POC Details |
| 14 | Unauthenticated RCE in Laravel Debug Mode <8.4.2 | https://github.com/JacobEbben/CVE-2021-3129 | POC Details |
| 15 | Laravel debug mode - Remote Code Execution (RCE) | https://github.com/hupe1980/CVE-2021-3129 | POC Details |
| 16 | CVE-2021-3129-Laravel Debug mode | https://github.com/0nion1/CVE-2021-3129 | POC Details |
| 17 | CVE-2021-3129 Exploit Checker By ./MrMad | https://github.com/MadExploits/Laravel-debug-Checker | POC Details |
| 18 | Laravel Debug mode RCE漏洞(CVE-2021-3129)poc / exp | https://github.com/ajisai-babu/CVE-2021-3129-exp | POC Details |
| 19 | Laravel RCE CVE-2021-3129 | https://github.com/keyuan15/CVE-2021-3129 | POC Details |
| 20 | None | https://github.com/qaisarafridi/cve-2021-3129 | POC Details |
| 21 | None | https://github.com/Zoo1sondv/CVE-2021-3129 | POC Details |
| 22 | Laravel RCE (CVE-2021-3129) | https://github.com/miko550/CVE-2021-3129 | POC Details |
| 23 | CVE-2021-3129 | Laravel Debug Mode Vulnerability | https://github.com/withmasday/CVE-2021-3129 | POC Details |
| 24 | None | https://github.com/banyaksepuh/Mass-CVE-2021-3129-Scanner | POC Details |
| 25 | None | https://github.com/Axianke/CVE-2021-3129 | POC Details |
| 26 | A exploit script for CVE-2021-3129 | https://github.com/cc3305/CVE-2021-3129 | POC Details |
| 27 | CVE-2021-3129 | Laravel Debug Mode Vulnerability | https://github.com/wmasday/CVE-2021-3129 | POC Details |
| 28 | Laravel Debug Mode and Payload | https://github.com/piperpwn/CVE-2021-3129- | POC Details |
| 29 | CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞 | https://github.com/Y0s9/CVE-2021-3129 | POC Details |
| 30 | CVE-2021-3129 Laravel Ignition RCE Exploit | https://github.com/0x0d3ad/CVE-2021-3129 | POC Details |
| 31 | None | https://github.com/GodOfServer/CVE-2021-3129 | POC Details |
| 32 | Modified version of laravel ignition RCE (CVE-2021-3129) exploit script for Hour of Hack Session-4 | https://github.com/Prabesh01/hoh4 | POC Details |
| 33 | ## About The script has been made for exploiting the Laravel RCE (CVE-2021-3129) vulnerability.<br> This script allows you to write/execute commands on a website running <b>Laravel <= v8.4.2</b>, that has "APP_DEBUG" set to "true" in its ".env" file. | https://github.com/lukwagoasuman/CVE-2021-3129---Laravel-RCE | POC Details |
| 34 | Laravel Debug Mode and Payload | https://github.com/piperpwn/CVE-2021-3129-piperpwn | POC Details |
| 35 | Laravel version 8.4.2 and before with Ignition before 2.5.2 allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-3129.yaml | POC Details |
| 36 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Laravel%20%E5%B0%8F%E4%BA%8E%208.4.2%20Debug%E6%A8%A1%E5%BC%8F%20_ignition%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-3129.md | POC Details |
| 37 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Laravel%20Ignition%202.5.1%20%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-3129.md | POC Details |
| 38 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/laravel-cve-2021-3129.yml | POC Details |
| 39 | https://github.com/vulhub/vulhub/blob/master/laravel/CVE-2021-3129/README.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet