### [CVE-2018-6981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6981) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20ESXi%2C%20VMware%20Workstation%2C%20and%20VMware%20Fusion&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=uninitialized%20stack%20memory&color=brighgreen) ### Description VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0xT11/CVE-POC - https://github.com/1o24er/RedTeam - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/Red-Team - https://github.com/Apri1y/Red-Team-links - https://github.com/Echocipher/Resource-list - https://github.com/Ondrik8/RED-Team - https://github.com/alisaesage/Disclosures - https://github.com/badd1e/Disclosures - https://github.com/dk47os3r/hongduiziliao - https://github.com/hasee2018/Safety-net-information - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hudunkey/Red-Team-links - https://github.com/john-80/-007 - https://github.com/landscape2024/RedTeam - https://github.com/lp008/Hack-readme - https://github.com/nobiusmallyu/kehai - https://github.com/siovador/vmxnet3Hunter - https://github.com/slimdaddy/RedTeam - https://github.com/svbjdbk123/- - https://github.com/twensoo/PersistentThreat - https://github.com/xiaoZ-hc/redtool - https://github.com/yut0u/RedTeam-BlackBox