Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1803 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2021-1732 Exploit | https://github.com/KaLendsi/CVE-2021-1732-Exploit | POC Details |
| 2 | CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 | https://github.com/k-k-k-k-k/CVE-2021-1732 | POC Details |
| 3 | None | https://github.com/oneoy/CVE-2021-1732-Exploit | POC Details |
| 4 | None | https://github.com/linuxdy/CVE-2021-1732_exp | POC Details |
| 5 | CVE-2021-1732 poc & exp; tested on 20H2 | https://github.com/Pai-Po/CVE-2021-1732 | POC Details |
| 6 | Read my blog for more info - | https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732 | POC Details |
| 7 | None | https://github.com/BeneficialCode/CVE-2021-1732 | POC Details |
| 8 | 对1909下windows版本的EXP进行分析,并对代码添加调试和注释 | https://github.com/ExploitCN/CVE-2021-1732-EXP- | POC Details |
| 9 | None | https://github.com/r1l4-i3pur1l4/CVE-2021-1732 | POC Details |
| 10 | CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 | https://github.com/fenalik/CVE-2021-1732 | POC Details |
| 11 | CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 | https://github.com/4dp/CVE-2021-1732 | POC Details |
| 12 | None | https://github.com/yangshifan-git/CVE-2021-1732 | POC Details |
| 13 | None | https://github.com/asepsaepdin/CVE-2021-1732 | POC Details |
| 14 | Compiled CVE-2021-1732(WIndows XP-10(till 20H1) LPE) | https://github.com/Sausageinforest/CVE-2021-1732 | POC Details |
| 15 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20Win32k%20%E6%9C%AC%E5%9C%B0%E6%8F%90%E6%9D%83%E6%BC%8F%E6%B4%9E%20CVE-2021-1732.md | POC Details |
| 16 | CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 | https://github.com/flyinbedxyz/CVE-2021-1732 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-24077 | 9.8 CRITICAL | Windows Fax Service Remote Code Execution Vulnerability |
| CVE-2021-24078 | 9.8 CRITICAL | Windows DNS Server Remote Code Execution Vulnerability |
| CVE-2021-24074 | 9.8 CRITICAL | Windows TCP/IP Remote Code Execution Vulnerability |
| CVE-2021-24094 | 9.8 CRITICAL | Windows TCP/IP Remote Code Execution Vulnerability |
| CVE-2021-24088 | 8.8 HIGH | Windows Local Spooler Remote Code Execution Vulnerability |
| CVE-2021-24066 | 8.8 HIGH | Microsoft SharePoint Remote Code Execution Vulnerability |
| CVE-2021-24093 | 8.8 HIGH | Windows Graphics Component Remote Code Execution Vulnerability |
| CVE-2021-24072 | 8.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2021-1728 | 8.8 HIGH | System Center Operations Manager Elevation of Privilege Vulnerability |
| CVE-2020-17162 | 8.8 HIGH | Microsoft Windows Security Feature Bypass Vulnerability |
| CVE-2021-24105 | 8.4 HIGH | Package Managers Configurations Remote Code Execution Vulnerability |
| CVE-2021-1722 | 8.1 HIGH | Windows Fax Service Remote Code Execution Vulnerability |
| CVE-2021-26701 | 8.1 HIGH | .NET Core Remote Code Execution Vulnerability |
| CVE-2021-24112 | 8.1 HIGH | .NET Core Remote Code Execution Vulnerability |
| CVE-2021-1726 | 8.0 HIGH | Microsoft SharePoint Server Spoofing Vulnerability |
| CVE-2021-24083 | 7.8 HIGH | Windows Address Book Remote Code Execution Vulnerability |
| CVE-2021-26700 | 7.8 HIGH | Visual Studio Code npm-script Extension Remote Code Execution Vulnerability |
| CVE-2021-25195 | 7.8 HIGH | Windows PKU2U Elevation of Privilege Vulnerability |
| CVE-2021-24103 | 7.8 HIGH | Windows Event Tracing Elevation of Privilege Vulnerability |
| CVE-2021-24091 | 7.8 HIGH | Windows Camera Codec Pack Remote Code Execution Vulnerability |
Showing top 20 of 58 CVEs. View all on vendor page → →
No comments yet