Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | VMware vCenter Server | 7.x before 7.0 U1c | - | |
| - | VMware Cloud Foundation | 4.x before 4.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473 | https://github.com/psc4re/NSE-scripts | POC Details |
| 2 | None | https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC | POC Details |
| 3 | CVE-2021-21972 Exploit | https://github.com/NS-Sp4ce/CVE-2021-21972 | POC Details |
| 4 | None | https://github.com/yaunsky/CVE-2021-21972 | POC Details |
| 5 | Proof of Concept Exploit for vCenter CVE-2021-21972 | https://github.com/horizon3ai/CVE-2021-21972 | POC Details |
| 6 | A vulnerability scanner that detects CVE-2021-21972 vulnerabilities. | https://github.com/Osyanina/westone-CVE-2021-21972-scanner | POC Details |
| 7 | None | https://github.com/alt3kx/CVE-2021-21972 | POC Details |
| 8 | CVE-2021-21972 | https://github.com/milo2012/CVE-2021-21972 | POC Details |
| 9 | CVE-2021-21972 vCenter-6.5-7.0 RCE POC | https://github.com/Udyz/CVE-2021-21972 | POC Details |
| 10 | VMware vCenter 未授权RCE(CVE-2021-21972) | https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972 | POC Details |
| 11 | None | https://github.com/L-pin/CVE-2021-21972 | POC Details |
| 12 | VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本 | https://github.com/B1anda0/CVE-2021-21972 | POC Details |
| 13 | CVE-2021-21972 | https://github.com/renini/CVE-2021-21972 | POC Details |
| 14 | None | https://github.com/stevenp322/cve-2021-21972 | POC Details |
| 15 | Nmap script to check vulnerability CVE-2021-21972 | https://github.com/GuayoyoCyber/CVE-2021-21972 | POC Details |
| 16 | None | https://github.com/JMousqueton/Detect-CVE-2021-21972 | POC Details |
| 17 | VMware vCenter CVE-2021-21972 Tools | https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972 | POC Details |
| 18 | 漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell | https://github.com/Ma1Dong/vcenter_rce | POC Details |
| 19 | None | https://github.com/d3sh1n/cve-2021-21972 | POC Details |
| 20 | CVE-2021-21972 related vulnerability code | https://github.com/ByZain/CVE-2021-21972 | POC Details |
| 21 | CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script | https://github.com/TaroballzChen/CVE-2021-21972 | POC Details |
| 22 | None | https://github.com/password520/CVE-2021-21972 | POC Details |
| 23 | [CVE-2021-21972] VMware vSphere Client Unauthorized File Upload to Remote Code Execution (RCE) | https://github.com/murataydemir/CVE-2021-21972 | POC Details |
| 24 | POC exploit for CVE-2021-21972 | https://github.com/pettyhacks/vSphereyeeter | POC Details |
| 25 | None | https://github.com/haiclover/CVE-2021-21972 | POC Details |
| 26 | CVE-2021-21972 – ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ) | https://github.com/orangmuda/CVE-2021-21972 | POC Details |
| 27 | None | https://github.com/user16-et/cve-2021-21972_PoC | POC Details |
| 28 | None | https://github.com/haidv35/CVE-2021-21972 | POC Details |
| 29 | None | https://github.com/ZTK-009/CVE-2021-21972 | POC Details |
| 30 | CVE-2021-21972 vCenter-6.5-7.0 RCE POC | https://github.com/TAI-REx/CVE-2021-21972 | POC Details |
| 31 | VMware vCenter vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-21972.yaml | POC Details |
| 32 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%91%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/VMware%20vCenter%20Server%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-21972.md | POC Details |
| 33 | Looking at current high-impact vulnerabilities, let's use the VMware vCenter Server CVE-2021-21972 (CVSS 9.8) as our base. This is a publicly known RCE with patches available, perfect for demonstrating CTT enhancements. | https://github.com/SimoesCTT/CTT-enhanced-VMware-vCenter | POC Details |
No public POC found.
Login to generate AI POCNo comments yet