{"uuid": "d1d442b0-f91c-4755-a198-ea78a250f97d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8816", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/867", "content": "#exploit\n1. CVE-2020-8816:\nPi-hole RCE PoC\nhttps://natedotred.wordpress.com/2020/03/28/cve-2020-8816-pi-hole-remote-code-execution\n\n2. CVE-2020-7961:\nDeserialization of Untrusted Data in Liferay Portal &lt;7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSONWS\nhttps://github.com/mzer0one/CVE-2020-7961-POC\n]-&gt; Generator: https://gist.github.com/testanull/4f8a9305b5b57ab8e7f15bbb0fb93461\n]-&gt; Payload: https://gist.github.com/testanull/4bb77519acf2c8e919f8d9b015eda880\n]-&gt; Debug diary: https://m.facebook.com/notes/nguy%E1%BB%85n-ti%E1%BA%BFn-giang/cve-2020-7961-debug-diary-liferay-deserialization-part-5/2802738799840067", "creation_timestamp": "2024-10-18T16:42:40.000000Z"}