Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | VMware vCenter Server and VMware Cloud Foundation | VMware vCenter Server (7.x before 7.0 U2b, 6.7 before 6.7 U3n, 6.5 before 6.5 U3p) and VMware Cloud Foundation (4.x before 4.2.1, 3.x before 3.10.2.1) | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Multiple vulnerabilities in the vSphere Client (HTML5) were privately reported to VMware. Updates and workarounds are available to address these vulnerabilities in affected VMware products. | https://github.com/bigbroke/CVE-2021-21985 | POC Details |
| 2 | None | https://github.com/alt3kx/CVE-2021-21985_PoC | POC Details |
| 3 | CVE-2021-21985 Checker. | https://github.com/onSec-fr/CVE-2021-21985-Checker | POC Details |
| 4 | This script check the CVE-2021-21985 vulnerability and patch on vCenter Server. | https://github.com/mauricelambert/CVE-2021-21985 | POC Details |
| 5 | cve-2021-21985 exploit | https://github.com/xnianq/cve-2021-21985_exp | POC Details |
| 6 | CVE-2021-21985 vmware 6.7-9.8 RCE | https://github.com/daedalus/CVE-2021-21985 | POC Details |
| 7 | None | https://github.com/testanull/Project_CVE-2021-21985_PoC | POC Details |
| 8 | None | https://github.com/haiclover/CVE-2021-21985 | POC Details |
| 9 | cve-2021-21985 powershell poc | https://github.com/aristosMiliaressis/CVE-2021-21985 | POC Details |
| 10 | VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985) | https://github.com/sknux/CVE-2021-21985_PoC | POC Details |
| 11 | None | https://github.com/haidv35/CVE-2021-21985 | POC Details |
| 12 | The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-21985.yaml | POC Details |
| 13 | vmware vCenter unauth RCE cve-2021-21985 | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/vmware-vcenter-cve-2021-21985-rce.yml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet