{"uuid": "ae92e083-1f7b-47fa-9327-fbf743139f81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21972", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2782", "content": "#Red_Team_Tactics\n1. Rootkit Arsenal Guacamole\n// An attempt to restore and adapt to modern Win10 version the Rootkit Arsenal original code sampls. All projects have been ported to x64 and tested on latest Win10 (2004-19041.746)\nhttps://github.com/uf0o/rootkit-arsenal-guacamole\n\n2. CVE-2021-21972 (1-day):\nThe vSphere Client (HTML5) contains a RCE vulnerability in a vCenter Server plugin (PoCs)\nhttps://swarm.ptsecurity.com/unauth-rce-vmware/#more-2477\n]-&gt; https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC\n]-&gt; https://github.com/NS-Sp4ce/CVE-2021-21972\n]-&gt; https://github.com/yaunsky/CVE-2021-21972\n]-&gt; PoC for Unix VCSA:\nhttps://github.com/yaunsky/CVE-2021-21972\n\n3. A solid XSS payload that bypasses Imperva WAF\nclick", "creation_timestamp": "2023-02-21T10:55:48.000000Z"}