Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Open Management Infrastructure | 16.0 ~ OMI Version 1.6.8-1 | cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:* | |
| Microsoft | System Center Operations Manager (SCOM) | 1.0.0 ~ OMI version: 1.6.8-1 | cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:* | |
| Microsoft | Azure Automation State Configuration, DSC Extension | 2.0.0 ~ DSC Agent versions: 2.71.1.25, 2.70.0.30, 3.0.0.3 | cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:* | |
| Microsoft | Azure Automation Update Management | 1.0.0 ~ OMS Agent for Linux GA v1.13.40-0 | cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:* | |
| Microsoft | Log Analytics Agent | 1.0.0 ~ OMS Agent for Linux GA v1.13.40-0 | cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:* | |
| Microsoft | Azure Diagnostics (LAD) | 3.0.0 ~ LAD v4.0.13 and LAD v3.0.135 | cpe:2.3:a:microsoft:azure_diagnostics:*:*:*:*:*:*:*:* | |
| Microsoft | Container Monitoring Solution | 1.0.0 ~ publication | cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:* | |
| Microsoft | Azure Security Center | 1.0.0 ~ OMS Agent for Linux GA v1.13.40-0 | cpe:2.3:a:microsoft:azure_security_center:*:*:*:*:*:*:*:* | |
| Microsoft | Azure Sentinel | 1.0.0 ~ OMS Agent for Linux GA v1.13.40-0 | cpe:2.3:a:microsoft:azure_sentinel:*:*:*:*:*:*:*:* | |
| Microsoft | Azure Stack Hub | 1.0.0 ~ Monitor, Update and Config Mgmnt 1.14.01 | cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2021-38647 AKA "OMIGOD" vulnerability in Windows OMI | https://github.com/corelight/CVE-2021-38647 | POC Details |
| 2 | CVE-2021-38647 POC for RCE | https://github.com/midoxnet/CVE-2021-38647 | POC Details |
| 3 | Proof on Concept Exploit for CVE-2021-38647 (OMIGOD) | https://github.com/horizon3ai/CVE-2021-38647 | POC Details |
| 4 | A PoC exploit for CVE-2021-38647 RCE in OMI | https://github.com/Immersive-Labs-Sec/cve-2021-38647 | POC Details |
| 5 | OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research team, specifically CVE-2021-38647. | https://github.com/marcosimioni/omigood | POC Details |
| 6 | A Vagrant VM test lab to learn about CVE-2021-38647 in the Open Management Infrastructure agent (aka "omigod"). | https://github.com/craig-m-unsw/omigod-lab | POC Details |
| 7 | OMIGod / CVE-2021-38647 POC and Demo environment | https://github.com/SimenBai/CVE-2021-38647-POC-and-Demo-environment | POC Details |
| 8 | CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD | https://github.com/AlteredSecurity/CVE-2021-38647 | POC Details |
| 9 | OMIGOD PoC | https://github.com/m1thryn/CVE-2021-38647 | POC Details |
| 10 | https://github.com/corelight/CVE-2021-38647 without the bloat | https://github.com/abousteif/cve-2021-38647 | POC Details |
| 11 | CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as root. | https://github.com/Vulnmachines/OMIGOD_cve-2021-38647 | POC Details |
| 12 | Quick and dirty CVE-2021-38647 (Omigod) exploit written in Go. | https://github.com/goofsec/omigod | POC Details |
| 13 | None | https://github.com/corelight/CVE-2021-38647-noimages | POC Details |
| 14 | Microsoft Open Management Infrastructure is susceptible to remote code execution (OMIGOD). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-38647.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-36965 | 8.8 HIGH | Windows WLAN AutoConfig Service Remote Code Execution Vulnerability |
| CVE-2021-40444 | 8.8 HIGH | Microsoft MSHTML Remote Code Execution Vulnerability |
| CVE-2021-36954 | 8.8 HIGH | Windows Bind Filter Driver Elevation of Privilege Vulnerability |
| CVE-2021-26435 | 8.1 HIGH | Windows Scripting Engine Memory Corruption Vulnerability |
| CVE-2021-36967 | 8.0 HIGH | Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability |
| CVE-2021-38628 | 7.8 HIGH | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
| CVE-2021-38626 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2021-38656 | 7.8 HIGH | Microsoft Word Remote Code Execution Vulnerability |
| CVE-2021-38630 | 7.8 HIGH | Windows Event Tracing Elevation of Privilege Vulnerability |
| CVE-2021-38655 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2021-38625 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2021-38633 | 7.8 HIGH | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
| CVE-2021-36975 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2021-38639 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2021-38648 | 7.8 HIGH | Open Management Infrastructure Elevation of Privilege Vulnerability |
| CVE-2021-38646 | 7.8 HIGH | Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability |
| CVE-2021-38645 | 7.8 HIGH | Open Management Infrastructure Elevation of Privilege Vulnerability |
| CVE-2021-38644 | 7.8 HIGH | Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability |
| CVE-2021-38653 | 7.8 HIGH | Microsoft Office Visio Remote Code Execution Vulnerability |
| CVE-2021-38654 | 7.8 HIGH | Microsoft Office Visio Remote Code Execution Vulnerability |
Showing top 20 of 61 CVEs. View all on vendor page → →
No comments yet