高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| - | VMware vCenter Server | 7.x before 7.0 U1c | - | |
| - | VMware Cloud Foundation | 4.x before 4.2 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473 | https://github.com/psc4re/NSE-scripts | POC詳細 |
| 2 | None | https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC | POC詳細 |
| 3 | CVE-2021-21972 Exploit | https://github.com/NS-Sp4ce/CVE-2021-21972 | POC詳細 |
| 4 | None | https://github.com/yaunsky/CVE-2021-21972 | POC詳細 |
| 5 | Proof of Concept Exploit for vCenter CVE-2021-21972 | https://github.com/horizon3ai/CVE-2021-21972 | POC詳細 |
| 6 | A vulnerability scanner that detects CVE-2021-21972 vulnerabilities. | https://github.com/Osyanina/westone-CVE-2021-21972-scanner | POC詳細 |
| 7 | None | https://github.com/alt3kx/CVE-2021-21972 | POC詳細 |
| 8 | CVE-2021-21972 | https://github.com/milo2012/CVE-2021-21972 | POC詳細 |
| 9 | CVE-2021-21972 vCenter-6.5-7.0 RCE POC | https://github.com/Udyz/CVE-2021-21972 | POC詳細 |
| 10 | VMware vCenter 未授权RCE(CVE-2021-21972) | https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972 | POC詳細 |
| 11 | None | https://github.com/L-pin/CVE-2021-21972 | POC詳細 |
| 12 | VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本 | https://github.com/B1anda0/CVE-2021-21972 | POC詳細 |
| 13 | CVE-2021-21972 | https://github.com/renini/CVE-2021-21972 | POC詳細 |
| 14 | None | https://github.com/stevenp322/cve-2021-21972 | POC詳細 |
| 15 | Nmap script to check vulnerability CVE-2021-21972 | https://github.com/GuayoyoCyber/CVE-2021-21972 | POC詳細 |
| 16 | None | https://github.com/JMousqueton/Detect-CVE-2021-21972 | POC詳細 |
| 17 | VMware vCenter CVE-2021-21972 Tools | https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972 | POC詳細 |
| 18 | 漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell | https://github.com/Ma1Dong/vcenter_rce | POC詳細 |
| 19 | None | https://github.com/d3sh1n/cve-2021-21972 | POC詳細 |
| 20 | CVE-2021-21972 related vulnerability code | https://github.com/ByZain/CVE-2021-21972 | POC詳細 |
| 21 | CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script | https://github.com/TaroballzChen/CVE-2021-21972 | POC詳細 |
| 22 | None | https://github.com/password520/CVE-2021-21972 | POC詳細 |
| 23 | [CVE-2021-21972] VMware vSphere Client Unauthorized File Upload to Remote Code Execution (RCE) | https://github.com/murataydemir/CVE-2021-21972 | POC詳細 |
| 24 | POC exploit for CVE-2021-21972 | https://github.com/pettyhacks/vSphereyeeter | POC詳細 |
| 25 | None | https://github.com/haiclover/CVE-2021-21972 | POC詳細 |
| 26 | CVE-2021-21972 – ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ) | https://github.com/orangmuda/CVE-2021-21972 | POC詳細 |
| 27 | None | https://github.com/user16-et/cve-2021-21972_PoC | POC詳細 |
| 28 | None | https://github.com/haidv35/CVE-2021-21972 | POC詳細 |
| 29 | None | https://github.com/ZTK-009/CVE-2021-21972 | POC詳細 |
| 30 | CVE-2021-21972 vCenter-6.5-7.0 RCE POC | https://github.com/TAI-REx/CVE-2021-21972 | POC詳細 |
| 31 | VMware vCenter vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-21972.yaml | POC詳細 |
| 32 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%91%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/VMware%20vCenter%20Server%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-21972.md | POC詳細 |
| 33 | Looking at current high-impact vulnerabilities, let's use the VMware vCenter Server CVE-2021-21972 (CVSS 9.8) as our base. This is a publicly known RCE with patches available, perfect for demonstrating CTT enhancements. | https://github.com/SimoesCTT/CTT-enhanced-VMware-vCenter | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2020-11987 | Apache Batik 代码问题漏洞 | |
| CVE-2021-27645 | GNU C Library和glibc 资源管理错误漏洞 | |
| CVE-2020-12702 | eWeLink mobile application 加密问题漏洞 | |
| CVE-2021-3355 | LightCMS v跨站脚本漏洞 | |
| CVE-2020-28599 | Torsten Paul Openscad 缓冲区错误漏洞 | |
| CVE-2021-22667 | Advantech BB-ESWGP506-2SFP-T 信任管理问题漏洞 | |
| CVE-2021-21973 | VMware vCenter Server 代码问题漏洞 | |
| CVE-2021-21974 | 威睿 VMware ESXi 缓冲区错误漏洞 | |
| CVE-2020-11988 | Apache XmlGraphics Commons 代码问题漏洞 |
まだコメントはありません