mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
136 lines
6.5 KiB
Markdown
136 lines
6.5 KiB
Markdown
### [CVE-2021-1732](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1732)
|
|

|
|

|
|

|
|

|
|

|
|
&color=blue)
|
|

|
|

|
|

|
|
&color=blue)
|
|

|
|

|
|
|
|
### Description
|
|
|
|
Windows Win32k Elevation of Privilege Vulnerability
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/161880/Win32k-ConsoleControl-Offset-Confusion.html
|
|
- http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html
|
|
|
|
#### Github
|
|
- https://github.com/0day404/vulnerability-poc
|
|
- https://github.com/20142995/sectool
|
|
- https://github.com/3th1c4l-t0n1/awesome-csirt
|
|
- https://github.com/4dp/CVE-2021-1732
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ASR511-OO7/windows-kernel-exploits
|
|
- https://github.com/Al1ex/WindowsElevation
|
|
- https://github.com/ArrestX/--POC
|
|
- https://github.com/Ascotbe/Kernelhub
|
|
- https://github.com/B0nfee/CVE-2022-21882
|
|
- https://github.com/BeneficialCode/CVE-2021-1732
|
|
- https://github.com/CVEDB/PoC-List
|
|
- https://github.com/CVEDB/awesome-cve-repo
|
|
- https://github.com/CVEDB/top
|
|
- https://github.com/Challengers-win/Sec-Interview-ai
|
|
- https://github.com/ClassBluer/Exploit_Tools
|
|
- https://github.com/Cruxer8Mech/Idk
|
|
- https://github.com/CyberMonitor/somethingweneed
|
|
- https://github.com/David-Honisch/CVE-2022-21882
|
|
- https://github.com/EdgeSecurityTeam/Vulnerability
|
|
- https://github.com/ExploitCN/CVE-2021-1732-EXP-
|
|
- https://github.com/GhostTroops/TOP
|
|
- https://github.com/JERRY123S/all-poc
|
|
- https://github.com/Jkrasher/WindowsThreatResearch_JKrasher
|
|
- https://github.com/KaLendsi/CVE-2021-1732-Exploit
|
|
- https://github.com/KaLendsi/CVE-2022-21882
|
|
- https://github.com/KayCHENvip/vulnerability-poc
|
|
- https://github.com/LegendSaber/exp_x64
|
|
- https://github.com/Miraitowa70/POC-Notes
|
|
- https://github.com/Mr-xn/Penetration_Testing_POC
|
|
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/Pai-Po/CVE-2021-1732
|
|
- https://github.com/ReJimp/Kernel_Exploit
|
|
- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories
|
|
- https://github.com/SYRTI/POC_to_review
|
|
- https://github.com/Sausageinforest/CVE-2021-1732
|
|
- https://github.com/SecWiki/windows-kernel-exploits
|
|
- https://github.com/SexyBeast233/SecBooks
|
|
- https://github.com/SofianeHamlaoui/Conti-Clear
|
|
- https://github.com/Spacial/awesome-csirt
|
|
- https://github.com/Threekiii/Awesome-POC
|
|
- https://github.com/TrojanAZhen/Self_Back
|
|
- https://github.com/WhooAmii/POC_to_review
|
|
- https://github.com/XiaomingX/awesome-poc-for-red-team
|
|
- https://github.com/YOunGWebER/cve_2021_1732
|
|
- https://github.com/YangSirrr/YangsirStudyPlan
|
|
- https://github.com/albinjoshy03/windows-kernel-exploits
|
|
- https://github.com/alian87/windows-kernel-exploits
|
|
- https://github.com/asepsaepdin/CVE-2021-1732
|
|
- https://github.com/asr511/windows-kernel-exploits
|
|
- https://github.com/bhassani/Recent-CVE
|
|
- https://github.com/brimstone/stars
|
|
- https://github.com/cyberanand1337x/bug-bounty-2022
|
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
|
- https://github.com/demilson/Windows
|
|
- https://github.com/developer3000S/PoC-in-GitHub
|
|
- https://github.com/dishfwk/CVE-2022-21882
|
|
- https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732
|
|
- https://github.com/fei9747/WindowsElevation
|
|
- https://github.com/fenalik/CVE-2021-1732
|
|
- https://github.com/fenasal/CVE-2021-1732
|
|
- https://github.com/hktalent/TOP
|
|
- https://github.com/hktalent/bug-bounty
|
|
- https://github.com/hugefiver/mystars
|
|
- https://github.com/huike007/penetration_poc
|
|
- https://github.com/huisetiankong478/penetration_poc
|
|
- https://github.com/iGen1us/Windows-Kernal-CVE
|
|
- https://github.com/jbmihoub/all-poc
|
|
- https://github.com/jessica0f0116/cve_2022_21882-cve_2021_1732
|
|
- https://github.com/joydo/CVE-Writeups
|
|
- https://github.com/k-k-k-k-k/CVE-2021-1732
|
|
- https://github.com/k0imet/CVE-POCs
|
|
- https://github.com/k0mi-tg/CVE-POC
|
|
- https://github.com/linuxdy/CVE-2021-1732_exp
|
|
- https://github.com/lions2012/Penetration_Testing_POC
|
|
- https://github.com/ltfafei/my_POC
|
|
- https://github.com/lyshark/Windows-exploits
|
|
- https://github.com/manas3c/CVE-POC
|
|
- https://github.com/mishmashclone/SecWiki-windows-kernel-exploits
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/oneoy/CVE-2021-1732-Exploit
|
|
- https://github.com/paramint/windows-kernel-exploits
|
|
- https://github.com/pawan-shivarkar/pawan-shivarkar
|
|
- https://github.com/r1l4-i3pur1l4/CVE-2021-1732
|
|
- https://github.com/r1l4-i3pur1l4/CVE-2022-21882
|
|
- https://github.com/r2bet/CVE-2021-1732
|
|
- https://github.com/ratw/CVE-2021-1732
|
|
- https://github.com/reph0r/Poc-Exp-Tools
|
|
- https://github.com/reph0r/Shooting-Range
|
|
- https://github.com/reph0r/poc-exp
|
|
- https://github.com/reph0r/poc-exp-tools
|
|
- https://github.com/salutdamour/Kernel_Exploit
|
|
- https://github.com/shanshanerxi/Red-blue-confrontation
|
|
- https://github.com/soosmile/POC
|
|
- https://github.com/taielab/awesome-hacking-lists
|
|
- https://github.com/trhacknon/Pocingit
|
|
- https://github.com/tzwlhack/Vulnerability
|
|
- https://github.com/weeka10/-hktalent-TOP
|
|
- https://github.com/whoforget/CVE-POC
|
|
- https://github.com/win32kdie/Kernel_Exploit
|
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
|
- https://github.com/yangshifan-git/CVE-2021-1732
|
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
|
- https://github.com/yisan1/hh
|
|
- https://github.com/youwizard/CVE-POC
|
|
- https://github.com/zecool/cve
|
|
|