Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | Rocket.Chat server | Fixed in: 3.13.2, 3.12.4, 3.11.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1 | https://github.com/CsEnox/CVE-2021-22911 | POC Details |
| 2 | Full unauthenticated RCE proof of concept for Rocket.Chat 3.12.1 CVE-2021-22911 | https://github.com/optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911 | POC Details |
| 3 | Modifed ver of the original exploit to save some times on password reseting for unprivileged user | https://github.com/jayngng/CVE-2021-22911 | POC Details |
| 4 | exploit for CVE-2021-22911 in rust | https://github.com/ChrisPritchard/CVE-2021-22911-rust | POC Details |
| 5 | None | https://github.com/MrDottt/CVE-2021-22911 | POC Details |
| 6 | None | https://github.com/overgrowncarrot1/CVE-2021-22911 | POC Details |
| 7 | None | https://github.com/vlrhsgody/-vlrhsgody-RocketChat-CVE-2021-22911- | POC Details |
| 8 | None | https://github.com/vlrhsgody/CVE-2021-22911 | POC Details |
| 9 | some small changes to the code by CsEnox | https://github.com/Weisant/CVE-2021-22911-EXP | POC Details |
| 10 | None | https://github.com/yoohhuu/Rocket-Chat-3.12.1-PoC-CVE-2021-22911- | POC Details |
| 11 | Rocket.Chat 3.11, 3.12 and 3.13 contains a NoSQL injection vulnerability which allows unauthenticated access to an API endpoint. An attacker can possibly obtain sensitive information from a database, modify data, and/or execute unauthorized administrative operations in the context of the affected site. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-22911.yaml | POC Details |
| 12 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Rocket%20Chat%20MongoDB%20%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2021-22911.md | POC Details |
| 13 | https://github.com/vulhub/vulhub/blob/master/rocketchat/CVE-2021-22911/README.md | POC Details | |
| 14 | Updated exploit for CVE-2021-22911 (Rocket.Chat 3.12.1 - NoSQL Injection to RCE (Unauthenticated)) | https://github.com/octodi/CVE-2021-22911 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-22025 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2020-14329 | Red Hat Ansible 信息泄露漏洞 | |
| CVE-2020-10688 | Red Hat Resteasy 跨站脚本漏洞 | |
| CVE-2020-22033 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2020-22032 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2020-22016 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2020-22017 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2021-33394 | Devellion Cubecart 授权问题漏洞 | |
| CVE-2020-22022 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2020-22023 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2020-10697 | Red Hat Ansible 安全漏洞 | |
| CVE-2020-22027 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2020-22030 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2020-22029 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2020-22031 | FFmpeg 缓冲区错误漏洞 | |
| CVE-2021-27490 | Siemens Solid Edge 缓冲区错误漏洞 | |
| CVE-2021-27492 | Siemens Solid Edge 代码问题漏洞 | |
| CVE-2021-27488 | Siemens Solid Edge 缓冲区错误漏洞 | |
| CVE-2021-27496 | Siemens Solid Edge 安全漏洞 | |
| CVE-2021-27494 | Siemens Solid Edge 安全漏洞 |
Showing top 20 of 74 CVEs. View all on vendor page → →
No comments yet