mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-08-13 03:17:26 +00:00
add CVE-2021-21972
This commit is contained in:
parent
32ac9b3516
commit
40b5f6b63a
@ -275,7 +275,7 @@
|
||||
- [CVE-2020-1472: NetLogon特权提升漏洞(接管域控制器)](https://github.com/VoidSec/CVE-2020-1472)|[CVE-2020-1472 .NET版本的,可以编译成独立EXE文件,可以尝试webshell执行](https://github.com/nccgroup/nccfsas/tree/main/Tools/SharpZeroLogon/SharpZeroLogon)|[同类型脚本](https://github.com/SecuraBV/CVE-2020-1472)|[同类型脚本二](https://github.com/dirkjanm/CVE-2020-1472)|[同类型脚本三](https://github.com/risksense/zerologon)|[同类型脚本4](https://github.com/bb00/zer0dump)
|
||||
- [awesome-browser-exploit-浏览器漏洞集合](https://github.com/Escapingbug/awesome-browser-exploit)
|
||||
- [【Linux提权】CVE-2021-3156-SUDO缓冲区溢出漏洞](https://github.com/blasty/CVE-2021-3156)
|
||||
- [[CVE-2021-21972-任意文件上传](https://github.com/NS-Sp4ce/CVE-2021-21972)](https://github.com/NS-Sp4ce/CVE-2021-21972)|[CVE-2021-21972-vCenter-6.5-7.0-RCE-POC](https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC)
|
||||
- [CVE-2021-21972-任意文件上传](https://github.com/NS-Sp4ce/CVE-2021-21972)|[CVE-2021-21972-vCenter-6.5-7.0-RCE-POC](https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC)|[CVE-2021-21972](https://github.com/yaunsky/CVE-2021-21972)
|
||||
|
||||
|
||||
## <span id="head7"> tools-小工具集版本合</span>
|
||||
|
Loading…
x
Reference in New Issue
Block a user