高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | None | https://github.com/mzer0one/CVE-2020-7961-POC | POC詳細 |
| 2 | None | https://github.com/wcxxxxx/CVE-2020-7961 | POC詳細 |
| 3 | Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS) | https://github.com/thelostworldFree/CVE-2020-7961-payloads | POC詳細 |
| 4 | None | https://github.com/shacojx/LifeRCEJsonWSTool-POC-CVE-2020-7961-Gui | POC詳細 |
| 5 | Detect vulns liferay CVE-2020-7961 by Nattroc (EOG Team) | https://github.com/shacojx/GLiferay-CVE-2020-7961-golang | POC詳細 |
| 6 | POC-CVE-2020-7961-Token-iterate | https://github.com/shacojx/POC-CVE-2020-7961-Token-iterate | POC詳細 |
| 7 | CVE-2020–7961 Mass exploit for Script Kiddies | https://github.com/Udyz/CVE-2020-7961-Mass | POC詳細 |
| 8 | Exploit script for CVE-2020-7961 | https://github.com/ShutdownRepo/CVE-2020-7961 | POC詳細 |
| 9 | None | https://github.com/pashayogi/CVE-2020-7961-Mass | POC詳細 |
| 10 | None | https://github.com/manrop2702/CVE-2020-7961 | POC詳細 |
| 11 | None | https://github.com/NMinhTrung/LIFERAY-CVE-2020-7961 | POC詳細 |
| 12 | CVE-2020–7961 Mass exploit for Script Kiddies | https://github.com/CrackerCat/CVE-2020-7961-Mass | POC詳細 |
| 13 | A simple workflow that runs all liferay related nuclei templates on a given target. | https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/liferay-workflow.yaml | POC詳細 |
| 14 | Liferay login panel was detected, | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/exposed-panels/liferay-portal.yaml | POC詳細 |
| 15 | Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-7961.yaml | POC詳細 |
| 16 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/Liferay%20Portal%20CE%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-7961.md | POC詳細 |
| 17 | https://github.com/vulhub/vulhub/blob/master/liferay-portal/CVE-2020-7961/README.md | POC詳細 | |
| 18 | None | https://github.com/neverhavenamee/CVE-2020-7961 | POC詳細 |
| 19 | POC-CVE-2020-7961-Token-iterate | https://github.com/Alaa-abdulridha/POC-CVE-2020-7961-Token-iterate | POC詳細 |
| 20 | Detect vulns liferay CVE-2020-7961 by Nattroc (EOG Team) | https://github.com/Alaa-abdulridha/GLiferay-CVE-2020-7961-golang | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2020-10682 | CMS Made Simple Filemanager 代码问题漏洞 | |
| CVE-2018-20334 | ASUS ASUSWRT 操作系统命令注入漏洞 | |
| CVE-2019-19025 | Cloud Native Computing Foundation Harbor 跨站请求伪造漏洞 | |
| CVE-2018-20333 | ASUSWRT 信息泄露漏洞 | |
| CVE-2019-18782 | SalesAgility SuiteCRM 安全漏洞 | |
| CVE-2019-18785 | SalesAgility SuiteCRM 安全漏洞 | |
| CVE-2018-20335 | ASUSWRT 输入验证错误漏洞 | |
| CVE-2019-19486 | Centreon 路径遍历漏洞 | |
| CVE-2019-19484 | Centreon 输入验证错误漏洞 | |
| CVE-2020-10681 | CMS Made Simple 跨站脚本漏洞 | |
| CVE-2019-19487 | Centreon 操作系统命令注入漏洞 | |
| CVE-2020-10597 | Delta Electronics Industrial Automation DOPSoft 缓冲区错误漏洞 | |
| CVE-2020-1862 | Huawei CampusInsight和ManageOne 资源管理错误漏洞 | |
| CVE-2020-1795 | Huawei Mate 20和Mate 30 Pro 安全漏洞 | |
| CVE-2020-1878 | Huawei OxfordS-AN00A 授权问题漏洞 | |
| CVE-2020-1796 | Huawei Mate 20和Mate 30 Pro 安全漏洞 | |
| CVE-2020-1793 | Huawei Mate 20和Mate 30 Pro 授权问题漏洞 | |
| CVE-2020-1864 | Huawei Secospace AntiDDoS8000 授权问题漏洞 | |
| CVE-2020-1794 | Huawei Mate 20和Mate 30 Pro 授权问题漏洞 | |
| CVE-2020-1879 | 多款Huawei产品安全漏洞 |
Showing 20 of 56 CVEs. View all on vendor page →
まだコメントはありません