关联漏洞
标题:
威睿 VMware ESXi 缓冲区错误漏洞
(CVE-2021-21974)
描述:Vmware VMware ESXi是美国威睿(Vmware)公司的一套可直接安装在物理服务器上的服务器虚拟化平台。 ESXi 存在安全漏洞,该漏洞源于同一网段的恶意行为者可以访问端口427,导致远程代码执行。以下产品及版本受到影响:7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG。
描述
ESXi EZ - A custom scanner that takes list of IPs either in JSON, CSV or individually and checks for infection CVE-2021-21974
介绍
# ESXi_ransomware_scanner
A program that scans IP addresses for signs of ESXi compromise by grabbing the ransom note from an html page and comparing the strings.
## Requirements
- python 3.x
- requests
- BeautifulSoup
- tqdm
- colorama
## Installation
Use the package manager pip to install the required packages.
```python
pip install requests
pip install bs4
pip install tqdm
pip install colorama
```
## Usage
Run the program with Python 3:
```python
python ESXi_EZ_Scanner.py
```
## Menu
The program will display the following menu:
## Scanning a single IP address
Select option 1 from the menu and enter the IP address you wish to scan. The program will then display a message indicating whether the IP address is infected or not.
## Scanning IP addresses from a CSV file
Select option 2 from the menu and enter the name of the CSV file. The file should contain a list of IP addresses, with one IP address per row. The program will then scan each IP address and display a message indicating whether each IP address is infected or not.
## Scanning IP addresses from a JSON file
Select option 3 from the menu and enter the name of the JSON file. The file should contain a list of IP addresses, with each IP address represented as a string in the list. The program will then scan each IP address and display a message indicating whether each IP address is infected or not.
## Contributing
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
文件快照
[4.0K] /data/pocs/f4124b7b0313c49f6a8ce48e2f708611a7bc3e68
├── [4.2K] main.py
└── [1.5K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。