{"uuid": "8a43d2f1-c1da-4d9a-8a99-2a4ea853b1ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3992", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1089", "content": "Successive / repetition\nCVE-2023-27532 : Veeam Backup and Replication\nPOC : https://github.com/horizon3ai/CVE-2023-27532\nPOC : https://github.com/sfewer-r7/CVE-2023-27532\nCVE-2023-32315 : Openfire\nPOC : https://github.com/tangxiaofeng7/CVE-2023-32315-Openfire-Bypass\nCVE-2021-21974 &amp; CVE-2020-3992: VMware ESXi OpenSLP\n1 : https://straightblast.medium.com/my-poc-walkthrough-for-cve-2021-21974-a266bcad14b9\n2 : https://blog.ovhcloud.com/ransomware-targeting-vmware-esxi/\n3 : https://www.zerodayinitiative.com/blog/2021/3/1/cve-2020-3992-amp-cve-2021-21974-pre-auth-remote-code-execution-in-vmware-esxi\nPOC : https://github.com/Shadow0ps/CVE-2021-21974\nPOC : https://github.com/straightblast/My-PoC-Exploits/blob/master/CVE-2021-21974.py", "creation_timestamp": "2024-05-09T11:31:16.000000Z"}