Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | VMware View Planner | VMware View Planner 4.x prior to 4.6 Security Patch 1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2021-21978 exp | https://github.com/GreyOrder/CVE-2021-21978 | POC Details |
| 2 | CVE-2021-21978 EXP | https://github.com/me1ons/CVE-2021-21978 | POC Details |
| 3 | 带回显版本的漏洞利用脚本 | https://github.com/skytina/CVE-2021-21978 | POC Details |
| 4 | VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability due to improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-21978.yaml | POC Details |
| 5 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/VMware%20View%20Planner%20%E6%9C%AA%E6%8E%88%E6%9D%83RCE%20CVE-2021-21978.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet