Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | VMware vCenter Server and VMware Cloud Foundation | VMware vCenter Server (7.x before 7.0 U2b, 6.7 before 6.7 U3n, 6.5 before 6.5 U3p) and VMware Cloud Foundation (4.x before 4.2.1, 3.x before 3.10.2.1) | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Multiple vulnerabilities in the vSphere Client (HTML5) were privately reported to VMware. Updates and workarounds are available to address these vulnerabilities in affected VMware products. | https://github.com/bigbroke/CVE-2021-21985 | POC Details |
| 2 | None | https://github.com/alt3kx/CVE-2021-21985_PoC | POC Details |
| 3 | CVE-2021-21985 Checker. | https://github.com/onSec-fr/CVE-2021-21985-Checker | POC Details |
| 4 | This script check the CVE-2021-21985 vulnerability and patch on vCenter Server. | https://github.com/mauricelambert/CVE-2021-21985 | POC Details |
| 5 | cve-2021-21985 exploit | https://github.com/xnianq/cve-2021-21985_exp | POC Details |
| 6 | CVE-2021-21985 vmware 6.7-9.8 RCE | https://github.com/daedalus/CVE-2021-21985 | POC Details |
| 7 | None | https://github.com/testanull/Project_CVE-2021-21985_PoC | POC Details |
| 8 | None | https://github.com/haiclover/CVE-2021-21985 | POC Details |
| 9 | cve-2021-21985 powershell poc | https://github.com/aristosMiliaressis/CVE-2021-21985 | POC Details |
| 10 | VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985) | https://github.com/sknux/CVE-2021-21985_PoC | POC Details |
| 11 | None | https://github.com/haidv35/CVE-2021-21985 | POC Details |
| 12 | The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-21985.yaml | POC Details |
| 13 | vmware vCenter unauth RCE cve-2021-21985 | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/vmware-vcenter-cve-2021-21985-rce.yml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-29252 | 5.4 MEDIUM | RSA Archer 跨站脚本漏洞 |
| CVE-2021-29253 | 5.1 MEDIUM | RSA Archer 安全漏洞 |
| CVE-2021-22746 | Triconex Model 3009 MP 代码问题漏洞 | |
| CVE-2021-22731 | Schneider Electric 授权问题漏洞 | |
| CVE-2021-22732 | Schneider Electric homeLYnk和spaceLYnk 安全漏洞 | |
| CVE-2021-22736 | Schneider Electric homeLYnk和spaceLYnk 路径遍历漏洞 | |
| CVE-2021-22734 | Schneider Electric spaceLYnk和homeLYnk 数据伪造问题漏洞 | |
| CVE-2021-22735 | Schneider Electric homeLYnk和spaceLYnk 数据伪造问题漏洞 | |
| CVE-2021-22733 | Schneider Electric homeLYnk和spaceLYnk 安全漏洞 | |
| CVE-2021-22743 | Triconex Model 3009 MP 代码问题漏洞 | |
| CVE-2021-22744 | Triconex Model 3009 MP 代码问题漏洞 | |
| CVE-2021-22745 | Triconex Model 3009 MP 代码问题漏洞 | |
| CVE-2021-22741 | Schneider Electric EcoStruxure Geo SCADA Expert 安全漏洞 | |
| CVE-2021-22747 | Triconex Model 3009 MP 代码问题漏洞 | |
| CVE-2020-22021 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2021-25643 | Couchbase Server 安全漏洞 | |
| CVE-2020-22024 | FFmpeg 安全漏洞 | |
| CVE-2020-22026 | FFmpeg 安全漏洞 | |
| CVE-2021-3548 | dmg2img 缓冲区错误漏洞 | |
| CVE-2020-22028 | FFmpeg 安全漏洞 |
Showing top 20 of 92 CVEs. View all on vendor page → →
No comments yet