Update CVE-2021-26295.yaml

patch-1
sandeep 2021-03-24 13:02:29 +05:30
parent f04bd785db
commit dbaf445933
1 changed files with 1 additions and 0 deletions

View File

@ -10,6 +10,7 @@ info:
# Note:- This is detection template, To perform deserializes do as below
# java.exe -jar .\ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn/ > mad.ot
# `cat mad.ot | hex` and replace in <cus-obj> along with the url in std-String value
# Exploit: https://github.com/yumusb/CVE-2021-26295-POC
requests:
- raw: