mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-28 17:22:02 +00:00
2.1 KiB
2.1 KiB
CVE-2021-21974
Description
OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.
POC
Reference
Github
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Awrrays/FrameVul
- https://github.com/CYBERTHREATANALYSIS/ESXi-Ransomware-Scanner-mi
- https://github.com/CYBERTHREATANALYSIS/ESXi_ransomware_scanner
- https://github.com/HynekPetrak/CVE-2019-5544_CVE-2020-3992
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/Shadow0ps/CVE-2021-21974
- https://github.com/WhooAmii/POC_to_review
- https://github.com/chosenonehacks/Red-Team-tools-and-usefull-links
- https://github.com/fardeen-ahmed/Bug-bounty-Writeups
- https://github.com/hateme021202/cve-2021-21974
- https://github.com/hktalent/TOP
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/karimhabush/cyberowl
- https://github.com/manas3c/CVE-POC
- https://github.com/n2x4/Feb2023-CVE-2021-21974-OSINT
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document
- https://github.com/soosmile/POC
- https://github.com/tom0li/collection-document
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve