Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ 10.0.19041.982 | cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.982:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.982 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.982:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.982 | cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.982:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.982 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.982:*:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. | https://github.com/0vercl0k/CVE-2021-31166 | POC Details |
| 2 | PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash. | https://github.com/zha0gongz1/CVE-2021-31166 | POC Details |
| 3 | Different rules to detect if CVE-2021-31166 is being exploited | https://github.com/mvlnetdev/CVE-2021-31166-detection-rules | POC Details |
| 4 | HTTP Protocol Stack CVE-2021-31166 | https://github.com/corelight/CVE-2021-31166 | POC Details |
| 5 | simple bash script for exploit CVE-2021-31166 | https://github.com/zecopro/CVE-2021-31166 | POC Details |
| 6 | None | https://github.com/bgsilvait/WIn-CVE-2021-31166 | POC Details |
| 7 | http.sys remote UAF to Leak Credential | https://github.com/Udyz/CVE-2021-31166 | POC Details |
| 8 | Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166) | https://github.com/y0g3sh-99/CVE-2021-31166-Exploit | POC Details |
| 9 | Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166 | https://github.com/antx-code/CVE-2021-31166 | POC Details |
| 10 | Just a simple CVE-2021-31166 exploit tool | https://github.com/imikoYa/CVE-2021-31166-exploit | POC Details |
| 11 | CVE-2021-31166: exploitation with Powershell, Python, Ruby, NMAP and Metasploit. | https://github.com/mauricelambert/CVE-2021-31166 | POC Details |
| 12 | Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166 | https://github.com/ZZ-SOCMAP/CVE-2021-31166 | POC Details |
| 13 | Just a simple CVE-2021-31166 exploit tool | https://github.com/iranzai/CVE-2021-31166-exploit | POC Details |
No public POC found.
Login to generate AI POCNo comments yet