Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | Nginx Web Server, Nginx Plus | Nginx Web Server versions 0.6.18 thru 1.20.0 before 1.20.1, Nginx plus versions R13 thru R23 before R23 P1. Nginx plus version R24 before R24 P1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | nginx 1.15.10 patch against cve-2021-23017 (ingress version) | https://github.com/niandy/nginx-patch | POC Details |
| 2 | PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017 | https://github.com/M507/CVE-2021-23017-PoC | POC Details |
| 3 | None | https://github.com/lakshit1212/CVE-2021-23017-PoC | POC Details |
| 4 | None | https://github.com/ShivamDey/CVE-2021-23017 | POC Details |
| 5 | The issue only affects nginx if the "resolver" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to forge UDP packets from the DNS server. | https://github.com/z3usx01/CVE-2021-23017-POC | POC Details |
| 6 | None | https://github.com/lukwagoasuman/-home-lukewago-Downloads-CVE-2021-23017-Nginx-1.14 | POC Details |
| 7 | NGINX Security Hardening & Vulnerability Remediation Analysis of critical CVEs (CVE-2021-23017, HTTP/2 DoS flaws) in outdated NGINX versions, with actionable steps for mitigation: upgrades, HTTP/2 hardening, and patch automation. Includes Nessus scan validation and proactive monitoring strategies. | https://github.com/Cybervixy/Vulnerability-Management | POC Details |
| 8 | NGINX DNS Overflow Vulnerability Check - CVE-2021-23017 PoC | https://github.com/moften/CVE-2021-23017 | POC Details |
| 9 | vulnerability in NGINX servers (versions 0.6.18–1.20.0). The scripts aim to cause a Denial of Service (DoS) by sending malicious DNS responses, with enhancements to bypass firewalls. | https://github.com/6lj/EVIL-CVE-2021-23017-Update-2025 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-27748 | xdg-utils 安全漏洞 | |
| CVE-2020-26669 | Fastspot BigTree 跨站脚本漏洞 | |
| CVE-2020-26668 | Fastspot BigTree SQL注入漏洞 | |
| CVE-2021-31641 | CHIYU科技BF-630W 跨站脚本漏洞 | |
| CVE-2021-3412 | 3Scale 安全漏洞 | |
| CVE-2021-3516 | libxml2 资源管理错误漏洞 | |
| CVE-2021-20306 | Red Hat BPMN Editor 安全漏洞 | |
| CVE-2021-3515 | PostgreSQL 操作系统命令注入漏洞 | |
| CVE-2021-3495 | Kiali-operator 安全漏洞 | |
| CVE-2021-3543 | Red Hat, Inc. Nitro Enclaves内核驱动 资源管理错误漏洞 | |
| CVE-2020-26670 | Fastspot BigTree 操作系统命令注入漏洞 | |
| CVE-2021-23021 | F5 NGINX Controller 安全漏洞 | |
| CVE-2021-23020 | NGINX控制器 安全特征问题漏洞 | |
| CVE-2021-23019 | F5 NGINX Controller 安全漏洞 | |
| CVE-2021-23018 | Nginx 控制器 安全漏洞 | |
| CVE-2021-27828 | In4Velocity In4Suite ERP SQL注入漏洞 | |
| CVE-2021-25932 | Opennms Group OpenNMS 跨站脚本漏洞 | |
| CVE-2021-31684 | Github json-smart-v1 缓冲区错误漏洞 | |
| CVE-2021-32027 | PostgreSQL 输入验证错误漏洞 | |
| CVE-2021-3424 | Red Hat Single Sign-On 7安全漏洞 |
Showing top 20 of 38 CVEs. View all on vendor page → →
No comments yet