CVE STALKER

CVE-2021-21974

CVSS
DESCRIPTIONOpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.
HEAT SCORE605

WORDS

TWEETS

DATE TWEETS USER
2021-06-08 21:40:23VMWare ESXi exploit for CVE-2021-21974 which is a heap overflow leading to remote code execution… https://t.co/wxNeyKVSF6 https://twitter.com/i/web/status/1402378043016941569blueteamsec1
2021-06-03 18:40:16🚨 NEW: CVE-2021-21974 🚨 OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.… https://t.co/CJUg7n1ZI1 https://twitter.com/i/web/status/1400520264526536710threatintelctr
2021-06-02 06:20:06[Imbauan Keamanan] Kerentanan Remote Code Execution pada VMWare CVE-2021-21974 Update informasi selengkapnya di: https://t.co/F1JK24yPDC https://idsirtii.or.id/peringatan/baca/351/imbauan-keamanan-kerentanan-remote-code-execution-pada-vmware-cve-2021-21974.htmlId_SIRTII
2021-05-28 05:30:06My-PoC-Exploits/CVE-2021-21974.py https://t.co/33d0kobc9H https://github.com/straightblast/My-PoC-Exploits/blob/master/CVE-2021-21974.pyTinolle
2021-05-27 23:10:26CVE-2021-21974 https://t.co/OqV4KipjTI #HarsiaInfo https://har-sia.info/CVE-2021-21974.htmlHar_sia
2021-05-27 03:11:10Trending News: My-PoC-Exploits/CVE-2021-21974.py at master · straightblast/My-PoC-Exploits · GitHub… https://t.co/ptNLeX1cpq https://twitter.com/i/web/status/1397751200955707392susession
2021-05-26 11:10:42Top story: My-PoC-Exploits/CVE-2021-21974.py at master · straightblast/My-PoC-Exploits · GitHub… https://t.co/zWsh8kWFrX https://twitter.com/i/web/status/1397509273681371136infowaropcenter
2021-05-26 09:10:54CVE-2020-3992 & CVE-2021-21974: Pre-Auth Remote Code Execution in VMware ESXi https://t.co/8jYx03E7w9 https://www.thezdi.com/blog/2021/3/1/cve-2020-3992-amp-cve-2021-21974-pre-auth-remote-code-execution-in-vmware-esxijedisct1
2021-05-26 09:10:52CVE-2021-21974 exploit https://t.co/5gJK1lNE8c https://github.com/straightblast/My-PoC-Exploits/blob/master/CVE-2021-21974.pyjedisct1
2021-05-26 07:51:36There is a public exploit for VMware ESXi CVE-2021-21974, a pre-auth RCE vulnerability from February. Write up:… https://t.co/vpCphHzvy0 https://twitter.com/i/web/status/1397459281084141568GossiTheDog
2021-05-26 02:31:12#VMWARE #ESXi OpenSLP heap-overflow CVE-2021-21974 walkthrough + poc https://t.co/xw79HlyrxB… https://t.co/pls6fF3N4f https://straightblast.medium.com/my-poc-walkthrough-for-cve-2021-21974-a266bcad14b9 https://twitter.com/i/web/status/1397378304471183362r3c0nst
2021-05-25 20:10:58CVE-2021-21974 PoC Exploit By: Johnny Yu (@staight_blast) https://t.co/q6NFjpoNvn https://github.com/straightblast/My-PoC-Exploits/blob/master/CVE-2021-21974.pylothos612
2021-05-25 18:30:26CVE-2021-21974 https://t.co/OqV4KipjTI #HarsiaInfo https://har-sia.info/CVE-2021-21974.htmlHar_sia
2021-05-25 10:30:05Alleged [unconfirmed] PoC Exploit for CVE-2021-21974 (ESXi RCE) has been shared on a popular paste site. "..heap-ov… https://t.co/bXGv9BQyZe https://twitter.com/i/web/status/1397136225983766532SOSIntel
2021-05-25 03:30:39Here is my RCE exploit code and writeup for (CVE-2021-21974) VMware ESXi OpenSLP heap-overflow discovered by… https://t.co/uMlSLJd1TG https://twitter.com/i/web/status/1397031145015898113straight_blast
2021-05-24 23:50:17Here is my PoC and writeup for (CVE-2021-21974) ESXi OpenSLP heap-overflow discovered by @_wmliang_. Thank you agai… https://t.co/LhVhd3KkpZ https://twitter.com/i/web/status/1396975958398103557straight_blast
2021-04-22 22:10:04I finally implemented a PoC exploit for the OpenSLP heap overflow (CVE-2021-21974) in VMware ESXi 6.7.0. Thanks… https://t.co/Nfd3WtsAxK https://twitter.com/i/web/status/1385354874703945731straight_blast
2021-03-30 19:40:04CVE-2021-21974 OpenSLP as used in ESXi has a heap-overflow vulnerability... https://t.co/3DvYGue709 Don't wait v… https://t.co/p4SDLLi4PH http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-21974 https://twitter.com/i/web/status/1376980943844573191VulmonFeeds
2021-03-18 07:10:14[Imbauan Keamanan] Kerentanan Kritikal pada VMWare CVE-2021-21972 dan CVE-2021-21974. Update informasi selengkapny… https://t.co/ChW49vtd7g https://twitter.com/i/web/status/1372443859704107009Id_SIRTII
2021-03-12 06:50:51「VMware ESXi」上で事前認証によるリモートコード実行を行う脆弱性「CVE-2020-3992」および「CVE-2021-21974」の解説 https://t.co/JPaMLczt2n https://blog.trendmicro.co.jp/archives/27320jukubird
2021-03-11 22:40:26「VMware ESXi」上で事前認証によるリモートコード実行を行う脆弱性「CVE-2020-3992」および「CVE-2021-21974」の解説 - blog.trendmicro(2021/3/12) https://t.co/B0yO7bJfSx https://blog.trendmicro.co.jp/archives/27320spread_jp
2021-03-11 13:50:06トレンドマイクロ セキュリティブログ「VMware ESXi」上で事前認証によるリモートコード実行を行う脆弱性「CVE-2020-3992」および「CVE-2021-21974」の解説 https://t.co/BQYNZyNtQe https://blog.trendmicro.co.jp/archives/27320ohhara_shiojiri
2021-03-11 10:50:06「VMware ESXi」上で事前認証によるリモートコード実行を行う脆弱性「CVE-2020-3992」および「CVE-2021-21974」の解説 - トレンドマイクロ セキュリティブログ [… https://t.co/pwyPfpDh9T https://twitter.com/i/web/status/1369961341381877764securenews_web
2021-03-11 00:40:07「VMware ESXi」上で事前認証によるリモートコード実行を行う脆弱性「CVE-2020-3992」および「CVE-2021-21974」の解説 - https://t.co/Rus51ZOCJv #セキュリティ #サイバーセキュリティ #ニュース #脆弱性 https://go.shr.lc/2OK76eVHk0910Sec
2021-03-09 19:30:08Zero Day Initiative - CVE-2020-3992 & CVE-2021-21974: Pre-Auth Remo... (Zero Day Initiative) Last fall, I reported… https://t.co/1VrK4LzUqs https://twitter.com/i/web/status/1369367846116065281InfoSec_b
2021-03-08 14:00:04CVE-2020-3992 & CVE-2021-21974: Pre-Auth Remote Code Execution in VMware ESXi https://t.co/aUJZpWIAFs #CVE #ESXi https://www.zerodayinitiative.com/blog/2021/3/1/cve-2020-3992-amp-cve-2021-21974-pre-auth-remote-code-execution-in-vmware-esxiaxcheron
2021-03-04 18:02:08New post from https://t.co/9KYxtdZjkl (CVE-2021-21974 (cloud_foundation, esxi)) has been published on https://t.co/6Oj4MnpR1f http://www.sesin.at https://www.sesin.at/2021/03/04/cve-2021-21974-cloud_foundation-esxi/www_sesin_at
2021-03-04 17:44:46New post from https://t.co/uXvPWJy6tj (CVE-2021-21974 (cloud_foundation, esxi)) has been published on https://t.co/QSuWIRI0w5 http://www.sesin.at https://www.sesin.at/2021/03/04/cve-2021-21974-cloud_foundation-esxi/WolfgangSesin
2021-03-04 16:42:25🚨 NEW: CVE-2021-21974 🚨 OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.… https://t.co/0EF5fxW8s2 https://twitter.com/i/web/status/1367515121115947009threatintelctr
2021-03-03 19:10:15CVE-2020-3992 & CVE-2021-21974: Pre-Auth Remote Code Execution in #VMware #ESXi by @thezdi https://t.co/sq5rtpt3fP https://t.co/7ZvlA5KpOS https://www.zerodayinitiative.com/blog/2021/3/1/cve-2020-3992-amp-cve-2021-21974-pre-auth-remote-code-execution-in-vmware-esxiIrynaFesenko
2021-03-03 14:30:22#CVE CVE-2020-3992 & CVE-2021-21974: PRE-AUTH REMOTE CODE EXECUTION #REE IN #VMWARE #ESXI https://t.co/jChGlvlsYK https://www.thezdi.com/blog/2021/3/1/cve-2020-3992-amp-cve-2021-21974-pre-auth-remote-code-execution-in-vmware-esxigrant_consultin
2021-03-03 09:10:57CVE-2020-3992 & CVE-2021-21974: Pre-Auth Remote Code Execution in VMware ESXi https://t.co/kAejbvpz8U https://www.thezdi.com/blog/2021/3/1/cve-2020-3992-amp-cve-2021-21974-pre-auth-remote-code-execution-in-vmware-esxijukubird
2021-03-02 23:30:45“Zero Day Initiative — CVE-2020-3992 & CVE-2021-21974: Pre-Auth Remote Code Execution in VMware ESXi” https://t.co/Cuxz8eDSem https://htn.to/3DRM3yhbXZwaiha8
2021-03-02 16:40:56Zero Day Initiative | CVE-2020-3992 & CVE-2021-21974: Pre-Auth Remote Code Execution in VMware ESXi https://t.co/Hd8ScwBWX1 https://stpmvt.com/2PtXLZhStopMalvertisin
2021-03-02 16:21:10Zero Day Initiative — CVE-2020-3992 & CVE-2021-21974: Pre-Auth Remote Code Execution in VMware ESXi… https://t.co/QzHyThPG7G https://twitter.com/i/web/status/1366783576390455306mdgsecurity
2021-02-27 21:23:38.@arstechnica this story lists CVE-2021-21974 as the VMWare RCE bug when it is really CVE-2021-21972. Can you plea… https://t.co/XEHZzAM9dw https://twitter.com/i/web/status/1365771238354878468JGamblin
2021-02-27 21:20:31@baileycyber @arstechnica @dangoodin001 CVE-2021-21974 has not had any POC code released for it and you have to hav… https://t.co/K4FB23sebg https://twitter.com/i/web/status/1365773437705347077JGamblin
2021-02-26 17:20:09@VMware propose sa synthèse de cette alerte sur les vulnérabilités CVE-2021-21972, CVE-2021-21973, CVE-2021-21974 q… https://t.co/vUYHa2zHGc https://twitter.com/i/web/status/1365350107642810371CyberGEND
2021-02-26 16:40:33Code-execution flaw in VMware has a severity rating of 9.8 out of 10 #VMware #CVE-2021-21974 #CyberSecurity… https://t.co/2xdsXhrxJq https://twitter.com/i/web/status/1365339661321830402Sagacity_IT
2021-02-26 07:30:20CVE-2021-21974 - Code-Execution Flaw in VMware. Severity Rating 9.8 out of 10 Advisory: https://t.co/7zLmAis1R1 R… https://t.co/NW6L0f22t3 https://vmware.com/security/advisories/VMSA-2021-0002.html https://twitter.com/i/web/status/1365200994599112705CKsTechNews
2021-02-25 22:30:05New Code-execution flaw in #VMware has a severity rating of 9.8 out of 10 #CVE-2021-21974 #Vulnerability… https://t.co/IN4wqUOM5g https://twitter.com/i/web/status/1365066032507977729DijkmanRogier
2021-02-25 20:41:11🚨 NEW: CVE-2021-21974 🚨 OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.… https://t.co/9qgEgATfxb https://twitter.com/i/web/status/1365038582180827146threatintelctr
2021-02-25 18:31:11CVE-2021-21974 https://t.co/OqV4KipjTI #HarsiaInfo https://har-sia.info/CVE-2021-21974.htmlHar_sia
2021-02-25 09:01:33OpenSLP Service Port 427 heap-based overflow [CVE-2021-21974] A vulnerability classified as critical has been found… https://t.co/DYPDaX1p7M https://twitter.com/i/web/status/1364861301755965440threatmeter
2021-02-25 06:10:35New post from https://t.co/9KYxtdZjkl (OpenSLP Service Port 427 heap-based overflow [CVE-2021-21974]) has been publ… https://t.co/yfHySdlcFt http://www.sesin.at https://twitter.com/i/web/status/1364818828182626304www_sesin_at
2021-02-25 06:10:27New post from https://t.co/uXvPWJy6tj (OpenSLP Service Port 427 heap-based overflow [CVE-2021-21974]) has been publ… https://t.co/SdmEmE3mGr http://www.sesin.at https://twitter.com/i/web/status/1364818831194079232WolfgangSesin
2021-02-24 23:31:09CVE-2021-21972, CVE-2021-21974: VMware vCenter Server and ESXI Vulnerabilities Alert: On February 23, 2021, VMware… https://t.co/5dNerCOEGd https://twitter.com/i/web/status/1364718261456150529morodog
2021-02-24 21:40:11Let the annals of the day show that CVE-2021-21974... has been granted the moniker Unconcealed Egret https://t.co/tRC9Y9Wvcw https://nvd.nist.gov/vuln/detail/CVE-2021-21974vulnonym
2021-02-24 21:11:54VMware ESXi and vCenter Server security vulnerabilities (CVE-2021-21972, CVE-2021-21973, CVE-2021-21974) https://t.co/PpTN5PYNQF https://systemtek.co.uk/2021/02/vmware-esxi-and-vcenter-server-security-vulnerabilities-cve-2021-21972-cve-2021-21973-cve-2021-21974/SystemTek_UK
2021-02-24 21:11:45VMware ESXi and vCenter Server security vulnerabilities (CVE-2021-21972, CVE-2021-21973, CVE-2021-21974) https://t.co/KNJfzbwz50 https://systemtek.co.uk/2021/02/vmware-esxi-and-vcenter-server-security-vulnerabilities-cve-2021-21972-cve-2021-21973-cve-2021-21974/6townstechteam
2021-02-24 20:21:27CVE Liste write "CVE-2021-21974" See full original article: https://t.co/pTbYYBdj6T All our feeds: https://t.co/EOLcNJGCHf https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21974 https://secnews.physaphae.frInfoSecPhysa
2021-02-24 20:01:33New post from https://t.co/uXvPWJy6tj (CVE-2021-21974) has been published on https://t.co/oI7ChOdhDw http://www.sesin.at https://www.sesin.at/2021/02/24/cve-2021-21974/WolfgangSesin
2021-02-24 20:01:20New post from https://t.co/9KYxtdZjkl (CVE-2021-21974) has been published on https://t.co/MV5J4hZZ8f http://www.sesin.at https://www.sesin.at/2021/02/24/cve-2021-21974/www_sesin_at
2021-02-24 19:30:08#News CVE-2021-21972, CVE-2021-21974: VMware vCenter Server and ESXI Vulnerabilities Alert: On February 23, 2021, V… https://t.co/5crmyYdkdv https://twitter.com/i/web/status/1364657737590800390morodog
2021-02-24 18:44:08CVE-2021-21974 https://t.co/OqV4KipjTI #HarsiaInfo https://har-sia.info/CVE-2021-21974.htmlHar_sia
2021-02-24 17:41:03🚨 NEW: CVE-2021-21974 🚨 OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.… https://t.co/NP1Gb6LSE5 https://twitter.com/i/web/status/1364630850416033800threatintelctr
2021-02-24 08:50:49Vmware kullananlar icin acil[1] yama vakti! CVE-2021-21972, CVE-2021-21973, CVE-2021-21974 Impacted Products VMware… https://t.co/knM0XfIxeZ https://twitter.com/i/web/status/1364496356086218753huzeyfeonal
2021-02-24 08:30:09CVE-2021-21972, CVE-2021-21974: VMware vCenter Server and ESXI Vulnerabilities Alert https://t.co/zZgmHDLiMa #info #news #tech https://meterpreter.org/cve-2021-21972-cve-2021-21974-vmware-vcenter-server-and-esxi-vulnerabilities-alert/the_yellow_fall
2021-02-23 19:30:13CVE-2021-21974 OpenSLP as used in ESXi has a heap-overflow vulnerability. VMware has evaluated the severity of thi… https://t.co/AahIbX8FKZ https://twitter.com/i/web/status/1364296288309764103VulmonFeeds