CVE STALKER

CVE-2021-28476

CVSS
DESCRIPTIONHyper-V Remote Code Execution Vulnerability
HEAT SCORE724

WORDS

TWEETS

DATE TWEETS USER
2021-08-17 04:20:10CVE-2021-28476 Hyper-V Remote Code Execution Vulnerability https://t.co/NRko4giqA5 Vulnerability Notification: https://t.co/xhLrNnfyrO http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-28476 https://alerts.vulmon.com/?utm_source=twitter&utm_medium=social&utm_campaign=2102281&utm_content=3VulmonFeeds
2021-08-17 04:10:10"A Hyper-V attack is certainly a plausible explanation for the incident, as CVE-2021-28476 can crash hosts."ohhara_shiojiri
2021-08-12 03:40:03讛驻讬专爪讛, CVE-2021-28476, 讗驻砖专讛 诇转讜拽祝 讘注诇 诪讻讜谞讛 讜讬专讟讜讗诇讬转 讬讞讬讚讛, 诇讛砖转诇讟 注诇 砖专转 讛讜讜讬专讟讜讗诇讬讝爪讬讛, 讗砖专 诪讗讞住谉 诪讻讜谞讜转 讜讬专讟讜鈥 https://t.co/j4byD2KmPW https://twitter.com/i/web/status/1425661821655126018SharonChaiMatan
2021-08-10 14:20:07Ophir Harpaz de Guardicore Labs y Peleg Hadar de SafeBreach Labs identificaron la falla como CVE-2021-28476 con una鈥 https://t.co/GWhWFgKBrx https://twitter.com/i/web/status/1425097122983161858RulesBenitez
2021-07-31 11:30:03First details I've read about the Hyper-V vuln (CVE-2021-28476) that wasn't properly doing validation in the virtua鈥 https://t.co/Ue9XdzCS5g https://twitter.com/i/web/status/1421432382184300552antitree
2021-07-30 09:50:06Detalles t茅cnicos vulnerabilidad cr铆tica en Hyper-V permit铆a a los atacantes explotar Azure - CVE-2021-28476: CVSS鈥 https://t.co/LqS7c4X0Qk https://twitter.com/i/web/status/1421044143640436738elhackernet
2021-07-30 08:10:07Technical details are now available for a vulnerability (CVE-2021-28476; Score: 9.9/10) that affects Hyper-V, Micro鈥 https://t.co/7ULAArN0WB https://twitter.com/i/web/status/1421018912536227840TowardsCybersec
2021-07-30 07:00:07#Tracked as CVE-2021-28476, this critical flaw in #Microsoft Hyper-V, allows Arbitary Code Execution. #elitecisos鈥 https://t.co/m2Bn5T2OdE https://twitter.com/i/web/status/1421000970264223751elitecisos
2021-07-30 03:10:04Critical #Microsoft #HyperV vulnerability (CVE-2021-28476) could haunt orgs for a long time. #CyberSecurity,鈥 https://t.co/9Q9Vx6eh0a https://twitter.com/i/web/status/1420944249558810626twelvesec
2021-07-29 19:20:06Researchers Publish Details on Recent Critical Hyper-V Vulnerability.Tracked as CVE-2021-28476 with a CVSS score of鈥 https://t.co/p3Z4bKTvIV https://twitter.com/i/web/status/1420825683756916739Cybersec4u2
2021-07-29 18:40:08Researchers Publish Details on Recent Critical Hyper-V Vulnerabilit... (Securityweek) Tracked as CVE-2021-28476 wi鈥 https://t.co/IPnvBhVNEL https://twitter.com/i/web/status/1420816005060648960InfoSec_b
2021-07-29 12:40:09@ITguySoCal Congratulations CVE-2021-28476, outstanding work https://t.co/t2sToGkwQ7IndyForEvil
2021-07-29 05:30:31CVE-2021-28476 for Hyper-V vmswitch.sys https://t.co/QCQhc1S5BK https://twitter.com/bleepincomputer/status/1420376063973154821CasualSec
2021-07-29 02:30:09"Currently tracked as CVE-2021-28476, the security issue has a critical severity score of 9.9 out of 10."ohhara_shiojiri
2021-07-28 21:40:19鐝惧湪CVE-2021-28476銇ㄣ仐銇﹁拷璺°仌銈屻仸銇勩倠銈汇偔銉ャ儶銉嗐偅鍟忛銇噸澶у害銈广偝銈€伅銆10鐐规簚鐐逛腑9.9鐐广仹銇欍傘儜銉冦儊銇岄仼鐢ㄣ仌銈屻仸銇勩仾銇勩優銈枫兂銇ф偑鐢ㄣ仚銈嬨仺銆併儧銈广儓銇偗銉┿儍銈枫儱锛堛偟銉笺儞銈规嫆鍚︼級銈勪换鎰忋伄銈炽兗銉夈伄瀹熻銇屽彲鑳姐伀銇倠銇熴倎銆佸婊呯殑銇奖闊裤倰涓庛亪銈嬪彲鑳芥с亴銇傘倞銇俱仚foxbook
2021-07-28 20:20:30New Critical Vulnerability (9.9 out of 10) in Microsoft Hyper-V (CVE-2021-28476) Attacker requires 1) access to a g鈥 https://t.co/1uYff6mgdY https://twitter.com/i/web/status/1420477603664732161ITguySoCal
2021-07-28 16:10:27@OphirHarpaz I read your research on CVE-2021-28476 (CVSS 9.9!!!, Scary stuff). I thought it should be labeled als鈥 https://t.co/jcbKA2NmAM https://twitter.com/i/web/status/1420414542828523522sbesser
2021-07-28 15:20:05Critical 9.9 Vulnerability in Hyper-V Allowed Attackers to Exploit Azure CVE-2021-28476: https://t.co/WoJt6m1jEt鈥 https://t.co/HG7bOT0MJc https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28476 https://twitter.com/i/web/status/1420402993518743554CKsTechNews
2021-07-28 13:40:11CVE-2021-28476, vulnerability that affect Hyper-v: the security issue has a critical severity score of 9.9 out of 1鈥 https://t.co/OGtyjHfX0Y https://twitter.com/i/web/status/1420377890575863812SBenato
2021-07-28 13:40:09CVE-2021-28476 is a Hyper-V Remote Code Execution vulnerability with a CVSS score of 9.9/10, patched in May 2021.鈥 https://t.co/CkVFDuOVDt https://twitter.com/i/web/status/1420378366159597571serghei
2021-07-14 19:50:21Microsoft Hyper-V vmswitch.sys Proof Of Concept: This is a proof of concept for CVE-2021-28476 ("Hyper-V Remote Cod鈥 https://t.co/qSHGTEtTiH https://twitter.com/i/web/status/1415395711999365123shah_sheikh
2021-07-14 19:50:19Microsoft Hyper-V vmswitch.sys Proof Of Concept: This is a proof of concept for CVE-2021-28476 ("Hyper-V Remote Cod鈥 https://t.co/w9RFxZxGcY https://twitter.com/i/web/status/1415395828932386817cipherstorm
2021-07-14 17:40:39馃毃 NEW: CVE-2021-28476 馃毃 Hyper-V Remote Code Execution Vulnerability Severity: CRITICAL https://t.co/7jdTUniyFB https://nvd.nist.gov/vuln/detail/CVE-2021-28476threatintelctr
2021-06-19 10:30:13CVE-2021-28476: a guest-to-host "Microsoft Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys proof of co鈥 https://t.co/Wq9WCdxZhl https://twitter.com/i/web/status/1406195935928098817Nihilisme10
2021-06-18 16:50:20CVE-2021-28476: a guest-to-host "Microsoft Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys proof of co鈥 https://t.co/69qwWLjDLY https://twitter.com/i/web/status/1405928683555020803blueteamsec1
2021-06-11 12:20:07If you did not patch yet the Hyper-V Remote Code Execution Vulnerability - CVE-2021-28476 then consider doing it AS鈥 https://t.co/3dWqJg2N56 https://twitter.com/i/web/status/1403325697343504386vFeed_IO
2021-06-11 12:20:05If you did not patch yet the Hyper-V Remote Code Execution Vulnerability - CVE-2021-28476 then consider doing it AS鈥 https://t.co/irpypvokcT https://twitter.com/i/web/status/1403325783691644935ToolsWatch
2021-06-06 15:10:38CVE-2021-28476 https://t.co/6J57UU6UCV #HarsiaInfo https://har-sia.info/CVE-2021-28476.htmlHar_sia
2021-06-06 11:42:19GitHub Trending Archive, 04 Jun 2021, C. fenwii/OpenHarmony, 0vercl0k/CVE-2021-28476, FreeRTOS/FreeRTOS-Kernel, ope鈥 https://t.co/k75XTuXhDz https://twitter.com/i/web/status/1401501642269204487motakasoft
2021-06-05 15:40:28PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.鈥 https://t.co/lbPF2Q0BlY https://twitter.com/i/web/status/1401200396450869251ptracesecurity
2021-06-05 11:40:30GitHub Trending Archive, 03 Jun 2021, C. 0vercl0k/CVE-2021-28476, nrfconnect/sdk-nrf, FreeRTOS/FreeRTOS-Kernel, Sch鈥 https://t.co/c3CJuFwcf7 https://twitter.com/i/web/status/1401139255737425921motakasoft
2021-06-02 22:10:09PoC f眉r Hyper-V-Schwachstelle (CVE-2021-28476) in vmswitch.sys https://t.co/6xFS7sAKUu #Sicherheit #Virtualisierung Borns IT- & Windows-Blog https://www.borncity.com/blog/2021/06/03/poc-fr-hyper-v-schwachstelle-in-vmswitch-sys-cve-2021-28476/etguenni
2021-06-02 22:10:08PoC for Hyper-V vulnerability (CVE-2021-28476) in vmswitch.sys https://t.co/qLZhRwkof5 #Security #Virtualisierung B鈥 https://t.co/Ogtx1TR8mx https://borncity.com/win/?p=20122 https://twitter.com/i/web/status/1400211128727265287etguenni
2021-06-02 15:20:14Cool as always @bluefrostsec has released the advisory with details and PoC for CVE-2021-28476 including a few 鈥渂on鈥 https://t.co/umQAODYrKj https://twitter.com/i/web/status/1400108824481128449ergot86
2021-06-02 10:10:060vercl0k/CVE-2021-28476 PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vms鈥 https://t.co/PoA5hGltgU https://twitter.com/i/web/status/1400031104732516354035recon
2021-06-02 06:10:11PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.鈥 https://t.co/FURAtsgs3d https://twitter.com/i/web/status/1399970062304378884ptracesecurity
2021-06-01 23:40:05CVE-2021-28476 POC: "Microsoft Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys. https://t.co/x3fDyTmBwL https://github.com/0vercl0k/CVE-2021-28476JGamblin
2021-06-01 16:20:12CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sy鈥 https://t.co/OKrlJ9t7UK https://twitter.com/i/web/status/1399761223974019072JekiCode
2021-06-01 15:10:31CVE-2021-28476 https://t.co/6J57UU6UCV #HarsiaInfo https://har-sia.info/CVE-2021-28476.htmlHar_sia
2021-06-01 13:10:04Top story: GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution鈥 https://t.co/3MzDOBOgaB https://twitter.com/i/web/status/1399714667216388099infowaropcenter
2021-06-01 13:00:05CVE-2021-28476 kodlu Microsoft Hyper-V RCE zafiyeti i莽in PoC yay谋mland谋 yamalar谋 yapmayanlar谋 ilgin莽 saatler bekley鈥 https://t.co/SdexzKKQoe https://twitter.com/i/web/status/1399711452307591170mertcangokgoz
2021-06-01 11:30:06GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerabili鈥 https://t.co/3pAa8zC4OQ https://twitter.com/i/web/status/1399688177833725954Securityblog
2021-06-01 09:50:04CVE-2021-28476: a guest-to-host "Microsoft Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys PoC鈥 https://t.co/4Hcye5d2lh https://twitter.com/i/web/status/1399663424938852356cyber_advising
2021-06-01 09:40:09#ITSecurity #ITSec GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Ex鈥 https://t.co/ZsbIImlhSy https://twitter.com/i/web/status/1399660201083555844Pentest101MX
2021-06-01 09:20:05Trending News: GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execut鈥 https://t.co/DaHmpQTXJI https://twitter.com/i/web/status/1399656305934094348susession
2021-06-01 07:30:07Top story: GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution鈥 https://t.co/sqEaJ9Svif https://twitter.com/i/web/status/1399627344533413893r45c4l
2021-06-01 07:20:06Top story: GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution鈥 https://t.co/3EzFK5tCzW https://twitter.com/i/web/status/1399626113412894725Ynys_Prydein
2021-06-01 07:10:12#security :: GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Executi鈥 https://t.co/4Zz1VEalA4 https://twitter.com/i/web/status/1399622107571658754seclabor
2021-06-01 06:30:09CVE-2021-28476 Microsoft Hyper-V 閬犵▼浠g⒓鍩疯婕忔礊 https://t.co/YdlKOQMrfy https://www.pwnwiki.org/index.php?title=CVE-2021-28476_Microsoft_Hyper-V_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9Epwnwikiorg
2021-06-01 06:30:05PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys. https://t.co/zpWs26fswf https://github.com/0vercl0k/CVE-2021-28476MDX_0x0
2021-06-01 05:10:06#Security readings: GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code E鈥 https://t.co/qj1MsDgFiV https://twitter.com/i/web/status/1399592150489313282LinuxSec
2021-06-01 03:30:07#Cybersecurity #InfoSec #hacking GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V鈥 https://t.co/2lG3gn5ohh https://twitter.com/i/web/status/1399567177498382340SritaKaren
2021-06-01 02:00:07cve-2021-28476 - PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulne... https://t.co/BMfzqSfcPh https://github.com/0vercl0k/cve-2021-28476oss_clang
2021-06-01 01:40:03CVE-2021-28476 (Hyper-V 銇 VMBus 鍑︾悊绯汇仹銇 RCE) 銇 PoC. BHUSA 2021 銇с伄鐧鸿〃銈傝銈忋倢銈嬨仢銇嗐仹銇欍 https://t.co/guSepJOEPY https://twitter.com/0vercl0k/status/1399475341601607685mimura1133
2021-06-01 00:10:07CVE-2021-28476 Hyper-V Remote Code Execution Vulnerability https://t.co/NRko4giqA5 Vulnerability Alert Subscript鈥 https://t.co/vN99qHuarb http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-28476 https://twitter.com/i/web/status/1399516883108442118VulmonFeeds
2021-05-31 23:30:10#H3xen GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vul鈥 https://t.co/cOpb8apla4 https://twitter.com/i/web/status/1399506507105030146H3xenSec
2021-05-31 21:20:07I built a PoC for CVE-2021-28476, a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys:鈥 https://t.co/NAUr5RTkVs https://twitter.com/i/web/status/13994753416016076850vercl0k
2021-05-14 14:30:20New post from https://t.co/uXvPWJy6tj (CVE-2021-28476 (windows_10, windows_7, windows_8.1, windows_server_2008, win鈥 https://t.co/F2PnpYlasz http://www.sesin.at https://twitter.com/i/web/status/1393209574946181126WolfgangSesin
2021-05-14 14:30:14New post from https://t.co/9KYxtdZjkl (CVE-2021-28476 (windows_10, windows_7, windows_8.1, windows_server_2008, win鈥 https://t.co/3csvS8OKqH http://www.sesin.at https://twitter.com/i/web/status/1393209591912189955www_sesin_at
2021-05-14 14:10:11馃毃 NEW: CVE-2021-28476 馃毃 Hyper-V Remote Code Execution Vulnerability Severity: CRITICAL https://t.co/7jdTUniyFB https://nvd.nist.gov/vuln/detail/CVE-2021-28476threatintelctr
2021-05-14 02:40:14New post from https://t.co/9KYxtdZjkl (CVE-2021-28476) has been published on https://t.co/NmuuyMbYOA http://www.sesin.at https://www.sesin.at/2021/05/14/cve-2021-28476/www_sesin_at
2021-05-14 02:40:13New post from https://t.co/uXvPWJy6tj (CVE-2021-28476) has been published on https://t.co/iD61hwHxaa http://www.sesin.at https://www.sesin.at/2021/05/14/cve-2021-28476/WolfgangSesin
2021-05-12 18:30:10CVE-2021-28476 https://t.co/khv8nWN8CA #HarsiaInfo https://har-sia.info/CVE-2021-28476.htmlHar_sia
2021-05-12 08:20:03Multiple Vulnerabilities on Microsoft Products Published! CVE-2021-28476 - CVSS: 9.9 CVE-2021-31181 - CVSS: 8.8 CV鈥 https://t.co/7lBVCuXWZn https://twitter.com/i/web/status/1392392789699276800ThreatMonIT
2021-05-12 06:50:03鏈棩閰嶄俊銇 Windows Update 銇 銇撱伄 CVE-2021-28476 銇欢銇屽惈銇俱倢銇︺亜銈嬨倝銇椼亜銆 PoC瑾伩銇熴亜..! 锛圡SRC 銇岃⿻渚°仐銇 CVSS 3.0 Base Score 銇 9.9 銇ㄣ伄銇撱仺銇с仚銇屻併仢鈥 https://t.co/tDVUyZGLuu https://twitter.com/i/web/status/1392371149829394432mimura1133
2021-05-12 02:30:16銉°儮鈶 CVE-2021-28476 Hyper-V銇甊CE銆侼W绲岀敱銇с偛銈广儓VM->銉涖偣銉堛伄鏀绘拑銇屽彲鑳斤紙銉︺兗銈躲兗鎿嶄綔銇仐锛塁VSS 9.9銆傚崝瑾跨殑銇剢寮辨у牨鍛娿儣銉偘銉┿儬銇у牨鍛娿仌銈屻仸銇︺併儧銈广儓銇窪oS銇屻偡銉娿儶銈仺銇椼仸銇湁鍔涖仹銇欍亴銈烩 https://t.co/xnCowwFDD1 https://twitter.com/i/web/status/1392303877895065601EurekaBerry
2021-05-11 23:00:06I declare CVE-2021-28476 to be named Crowded Cicada https://t.co/oVm6W8N53T https://nvd.nist.gov/vuln/detail/CVE-2021-28476vulnonym
2021-05-11 21:40:12CVE-2021-28476 Hyper-V Remote Code Execution Vulnerability https://t.co/NRko4giqA5 http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-28476VulmonFeeds
2021-05-11 21:20:04CVE Liste write "CVE-2021-28476" See full original article: https://t.co/i63yHP8KCT All our feeds: https://t.co/EOLcNJGCHf https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28476 https://secnews.physaphae.frInfoSecPhysa
2021-05-11 20:50:45CVE-2021-28476 Hyper-V Remote Code Execution Vulnerability https://t.co/RTivI2nVHO https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28476CVEnew
2021-05-11 20:30:04My first ever research bug was fixed today and I'm super proud of it: CVE-2021-28476 Hyper-V鈥 https://t.co/xOHONDgbqg https://twitter.com/i/web/status/1392215145196130307australeo
2021-05-11 19:40:23馃毃 NEW: CVE-2021-28476 馃毃 Hyper-V Remote Code Execution Vulnerability Severity: [object Object] https://t.co/7jdTUniyFB https://nvd.nist.gov/vuln/detail/CVE-2021-28476threatintelctr
2021-05-11 19:20:06CVE-2021-28476 : Hyper-V Remote Code Execution Vulnerability... https://t.co/u6wRagVL8J https://cve.report/CVE-2021-28476CVEreport
2021-05-11 17:10:42CVSS 9.9! The vulnerability we (+@OphirHarpaz) found, CVE-2021-28476 (Hyper-V RCE), was patched today! Our researc鈥 https://t.co/k8E9Ooogsg https://twitter.com/i/web/status/1392163013910745093peleghd
2021-05-11 17:00:06The vulnerability we (+@OphirHarpaz) found, CVE-2021-28476 (Hyper-V RCE), was patched today! Our research, fuzzer鈥 https://t.co/h0vHEnxdga https://twitter.com/i/web/status/1392162020393463810peleghd