尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ 10.0.19041.982 | cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.982:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.982 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.982:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.982 | cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.982:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.982 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.982:*:*:*:*:*:*:* |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. | https://github.com/0vercl0k/CVE-2021-31166 | POC详情 |
| 2 | PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash. | https://github.com/zha0gongz1/CVE-2021-31166 | POC详情 |
| 3 | Different rules to detect if CVE-2021-31166 is being exploited | https://github.com/mvlnetdev/CVE-2021-31166-detection-rules | POC详情 |
| 4 | HTTP Protocol Stack CVE-2021-31166 | https://github.com/corelight/CVE-2021-31166 | POC详情 |
| 5 | simple bash script for exploit CVE-2021-31166 | https://github.com/zecopro/CVE-2021-31166 | POC详情 |
| 6 | None | https://github.com/bgsilvait/WIn-CVE-2021-31166 | POC详情 |
| 7 | http.sys remote UAF to Leak Credential | https://github.com/Udyz/CVE-2021-31166 | POC详情 |
| 8 | Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166) | https://github.com/y0g3sh-99/CVE-2021-31166-Exploit | POC详情 |
| 9 | Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166 | https://github.com/antx-code/CVE-2021-31166 | POC详情 |
| 10 | Just a simple CVE-2021-31166 exploit tool | https://github.com/imikoYa/CVE-2021-31166-exploit | POC详情 |
| 11 | CVE-2021-31166: exploitation with Powershell, Python, Ruby, NMAP and Metasploit. | https://github.com/mauricelambert/CVE-2021-31166 | POC详情 |
| 12 | Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166 | https://github.com/ZZ-SOCMAP/CVE-2021-31166 | POC详情 |
| 13 | Just a simple CVE-2021-31166 exploit tool | https://github.com/iranzai/CVE-2021-31166-exploit | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论