Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/mzer0one/CVE-2020-7961-POC | POC Details |
| 2 | None | https://github.com/wcxxxxx/CVE-2020-7961 | POC Details |
| 3 | Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS) | https://github.com/thelostworldFree/CVE-2020-7961-payloads | POC Details |
| 4 | None | https://github.com/shacojx/LifeRCEJsonWSTool-POC-CVE-2020-7961-Gui | POC Details |
| 5 | Detect vulns liferay CVE-2020-7961 by Nattroc (EOG Team) | https://github.com/shacojx/GLiferay-CVE-2020-7961-golang | POC Details |
| 6 | POC-CVE-2020-7961-Token-iterate | https://github.com/shacojx/POC-CVE-2020-7961-Token-iterate | POC Details |
| 7 | CVE-2020–7961 Mass exploit for Script Kiddies | https://github.com/Udyz/CVE-2020-7961-Mass | POC Details |
| 8 | Exploit script for CVE-2020-7961 | https://github.com/ShutdownRepo/CVE-2020-7961 | POC Details |
| 9 | None | https://github.com/pashayogi/CVE-2020-7961-Mass | POC Details |
| 10 | None | https://github.com/manrop2702/CVE-2020-7961 | POC Details |
| 11 | None | https://github.com/NMinhTrung/LIFERAY-CVE-2020-7961 | POC Details |
| 12 | CVE-2020–7961 Mass exploit for Script Kiddies | https://github.com/CrackerCat/CVE-2020-7961-Mass | POC Details |
| 13 | A simple workflow that runs all liferay related nuclei templates on a given target. | https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/liferay-workflow.yaml | POC Details |
| 14 | Liferay login panel was detected, | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/exposed-panels/liferay-portal.yaml | POC Details |
| 15 | Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-7961.yaml | POC Details |
| 16 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/Liferay%20Portal%20CE%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-7961.md | POC Details |
| 17 | https://github.com/vulhub/vulhub/blob/master/liferay-portal/CVE-2020-7961/README.md | POC Details | |
| 18 | None | https://github.com/neverhavenamee/CVE-2020-7961 | POC Details |
| 19 | POC-CVE-2020-7961-Token-iterate | https://github.com/Alaa-abdulridha/POC-CVE-2020-7961-Token-iterate | POC Details |
| 20 | Detect vulns liferay CVE-2020-7961 by Nattroc (EOG Team) | https://github.com/Alaa-abdulridha/GLiferay-CVE-2020-7961-golang | POC Details |
No public POC found.
Login to generate AI POCNo comments yet