From dbaf44593323ee60fa06a49335b9dd2456d44817 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 24 Mar 2021 13:02:29 +0530 Subject: [PATCH] Update CVE-2021-26295.yaml --- cves/2021/CVE-2021-26295.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-26295.yaml b/cves/2021/CVE-2021-26295.yaml index aed35553ad..8cf8fc5e37 100644 --- a/cves/2021/CVE-2021-26295.yaml +++ b/cves/2021/CVE-2021-26295.yaml @@ -10,6 +10,7 @@ info: # Note:- This is detection template, To perform deserializes do as below # java.exe -jar .\ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn/ > mad.ot # `cat mad.ot | hex` and replace in along with the url in std-String value + # Exploit: https://github.com/yumusb/CVE-2021-26295-POC requests: - raw: