Update CVE-2021-26295.yaml
parent
f04bd785db
commit
dbaf445933
|
@ -10,6 +10,7 @@ info:
|
|||
# Note:- This is detection template, To perform deserializes do as below
|
||||
# java.exe -jar .\ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn/ > mad.ot
|
||||
# `cat mad.ot | hex` and replace in <cus-obj> along with the url in std-String value
|
||||
# Exploit: https://github.com/yumusb/CVE-2021-26295-POC
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
|
Loading…
Reference in New Issue