Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | 对CVE-2021-29505进行复现,并分析学了下Xstream反序列化过程 | https://github.com/MyBlackManba/CVE-2021-29505 | POC Details |
| 2 | XStream before 1.4.17 is susceptible to remote code execution. An attacker can execute commands of the host by manipulating the processed input stream, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-29505.yaml | POC Details |
| 3 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/XStream%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-29505.md | POC Details |
| 4 | https://github.com/vulhub/vulhub/blob/master/xstream/CVE-2021-29505/README.md | POC Details | |
| 5 | None | https://github.com/cuijiung/xstream-CVE-2021-29505 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet