尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1803 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:* |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2021-1732 Exploit | https://github.com/KaLendsi/CVE-2021-1732-Exploit | POC详情 |
| 2 | CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 | https://github.com/k-k-k-k-k/CVE-2021-1732 | POC详情 |
| 3 | None | https://github.com/oneoy/CVE-2021-1732-Exploit | POC详情 |
| 4 | None | https://github.com/linuxdy/CVE-2021-1732_exp | POC详情 |
| 5 | CVE-2021-1732 poc & exp; tested on 20H2 | https://github.com/Pai-Po/CVE-2021-1732 | POC详情 |
| 6 | Read my blog for more info - | https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732 | POC详情 |
| 7 | None | https://github.com/BeneficialCode/CVE-2021-1732 | POC详情 |
| 8 | 对1909下windows版本的EXP进行分析,并对代码添加调试和注释 | https://github.com/ExploitCN/CVE-2021-1732-EXP- | POC详情 |
| 9 | None | https://github.com/r1l4-i3pur1l4/CVE-2021-1732 | POC详情 |
| 10 | CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 | https://github.com/fenalik/CVE-2021-1732 | POC详情 |
| 11 | CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 | https://github.com/4dp/CVE-2021-1732 | POC详情 |
| 12 | None | https://github.com/yangshifan-git/CVE-2021-1732 | POC详情 |
| 13 | None | https://github.com/asepsaepdin/CVE-2021-1732 | POC详情 |
| 14 | Compiled CVE-2021-1732(WIndows XP-10(till 20H1) LPE) | https://github.com/Sausageinforest/CVE-2021-1732 | POC详情 |
| 15 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20Win32k%20%E6%9C%AC%E5%9C%B0%E6%8F%90%E6%9D%83%E6%BC%8F%E6%B4%9E%20CVE-2021-1732.md | POC详情 |
| 16 | CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 | https://github.com/flyinbedxyz/CVE-2021-1732 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论