Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | VMware vCenter Server, VMware Cloud Foundation | VMware vCenter Server(7.x before 7.0 U2c and 6.7 before 6.7 U3o) and VMware Cloud Foundation (4.x before 4.3 and 3.x before 3.10.2.2) | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/1ZRR4H/CVE-2021-22005 | POC Details |
| 2 | None | https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activity | POC Details |
| 3 | CVE-2021-22005 | https://github.com/X1pe0/VMWare-CVE-Check | POC Details |
| 4 | CVE-2021-22005批量验证python脚本 | https://github.com/5gstudent/CVE-2021-22005- | POC Details |
| 5 | CVE-2021-22005_PoC | https://github.com/RedTeamExp/CVE-2021-22005_PoC | POC Details |
| 6 | None | https://github.com/rwincey/CVE-2021-22005 | POC Details |
| 7 | the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability | https://github.com/TaroballzChen/CVE-2021-22005-metasploit | POC Details |
| 8 | None | https://github.com/TiagoSergio/CVE-2021-22005 | POC Details |
| 9 | VMware vCenter Server任意文件上传漏洞 / Code By:Jun_sheng | https://github.com/Jun-5heng/CVE-2021-22005 | POC Details |
| 10 | None | https://github.com/shmilylty/cve-2021-22005-exp | POC Details |
| 11 | Clone from gist | https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py | POC Details |
| 12 | cve-2021-22005vcenter任意文件上传漏洞,可直接上传冰蝎 | https://github.com/InventorMAO/cve-2021-22005 | POC Details |
| 13 | None | https://github.com/tiagob0b/CVE-2021-22005 | POC Details |
| 14 | CVE-2021-22005 | https://github.com/Jeromeyoung/VMWare-CVE-Check | POC Details |
| 15 | VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-22005.yaml | POC Details |
| 16 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%91%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/VMware%20vCenter%20Server%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%20CVE-2021-22005.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet