### [CVE-2021-33742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33742) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201507&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201607&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201809&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201909&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%202004&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2020H2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2021H1&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%207%20Service%20Pack%201&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%207&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%208.1&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20%20Service%20Pack%202&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=10.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.3.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen) ### Description Windows MSHTML Platform Remote Code Execution Vulnerability ### POC #### Reference No PoCs from references. #### Github - https://github.com/Birdo1221/UserAG-Changer - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/pawan-shivarkar/pawan-shivarkar - https://github.com/yogsma/beacon23