The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.
- https://github.com/1ZRR4H/CVE-2021-22005
- https://github.com/5gstudent/CVE-2021-22005-
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/CHYbeta/Vuln100Topics20
- https://github.com/FDlucifer/firece-fish
- https://github.com/Jun-5heng/CVE-2021-22005
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/RedTeamExp/CVE-2021-22005_PoC
- https://github.com/TaroballzChen/CVE-2021-22005-metasploit
- https://github.com/TheTh1nk3r/exp_hub
- https://github.com/TiagoSergio/CVE-2021-22005
- https://github.com/Timirepo/CVE_Exploits
- https://github.com/Vulnmachines/VmWare-vCenter-vulnerability
- https://github.com/X1pe0/VMWare-CVE-Check
- https://github.com/hanc00l/some_pocsuite
- https://github.com/nday-ldgz/ZoomEye-dork
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activity
- https://github.com/r0ckysec/CVE-2021-22005
- https://github.com/r0eXpeR/supplier
- https://github.com/rwincey/CVE-2021-22005
- https://github.com/viksafe/Get-vSphereVersion
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-