{"vulnerability": "CVE-2021-22015", "sightings": [{"uuid": "52380d18-c218-47cd-b0b8-bab36e63c2ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22015", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "de15e8eb-7cdc-47ef-84dc-19e9617206de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22015", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:34.000000Z"}, {"uuid": "c4446052-d3d5-4cee-a7b5-15e45eaf9190", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22015", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/vcenter_java_wrapper_vmon_priv_esc.rb", "content": "", "creation_timestamp": "2022-12-05T15:55:47.000000Z"}, {"uuid": "2f6cf854-0875-4b8e-af94-5340bf677667", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22015", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/618", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter\nURL\uff1ahttps://github.com/PenteraIO/vScalation---CVE-2021-22015", "creation_timestamp": "2021-09-30T07:19:54.000000Z"}, {"uuid": "f3bd7c6e-432a-453a-b1b0-601a1d32650a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22015", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/619", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter\nURL\uff1ahttps://github.com/PenteraIO/vScalation-CVE-2021-22015", "creation_timestamp": "2021-09-30T07:28:29.000000Z"}, {"uuid": "6858190e-e470-47db-84c6-0d764577c331", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22015", "type": "published-proof-of-concept", "source": "https://t.me/hackingshadow/2758", "content": "#TheShadowArmy\n\n#exploit\nCVE-2022-42823:\n1. Apple Safari JavaScriptCore Inspector Type Confusion\nhttps://ssd-disclosure.com/apple-safari-javascriptcore-inspector-type-confusion\n\n2. CVE-2021-22015:\nVMware vCenter vScalation Privilege Escalation\nhttps://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html\n\n_-_-_-_-_-_- \u269cJOIN NOW \u269c -_-_-_-_-_-_\n \u274d\u274d\u274d \u2756 @HackingShadow \u2756 \u274d\u274d\u274d", "creation_timestamp": "2022-12-19T04:09:21.000000Z"}, {"uuid": "e9616b4f-2589-4fbb-ab05-b613c5c43874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22015", "type": "seen", "source": "https://t.me/cibsecurity/29287", "content": "\u203c CVE-2021-22015 \u203c\n\nThe vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-23T16:29:51.000000Z"}, {"uuid": "ccd9ee0d-cb66-47f4-ba08-77e31b81dc27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22015", "type": "published-proof-of-concept", "source": "Telegram/fAsd61VO3nPW5U0SuKoSPAdef0FfXWDE7emr3khswYTjwg", "content": "", "creation_timestamp": "2021-10-06T16:01:08.000000Z"}, {"uuid": "5e21f439-3533-40f3-9ca2-2dcb6c3f0aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22015", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1859", "content": "#exploit\nCVE-2022-42823:\n1. Apple Safari JavaScriptCore Inspector Type Confusion\nhttps://ssd-disclosure.com/apple-safari-javascriptcore-inspector-type-confusion\n\n2. CVE-2021-22015:\nVMware vCenter vScalation Privilege Escalation\nhttps://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html", "creation_timestamp": "2022-12-19T04:09:20.000000Z"}, {"uuid": "8395569b-ebd1-4297-b273-b003fd0f7c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22015", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7387", "content": "#exploit\nCVE-2022-42823:\n1. Apple Safari JavaScriptCore Inspector Type Confusion\nhttps://ssd-disclosure.com/apple-safari-javascriptcore-inspector-type-confusion\n\n2. CVE-2021-22015:\nVMware vCenter vScalation Privilege Escalation\nhttps://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html", "creation_timestamp": "2022-12-19T11:00:22.000000Z"}]}