mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
58 lines
4.0 KiB
Markdown
58 lines
4.0 KiB
Markdown
### [CVE-2021-26414](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26414)
|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|
&color=blue)
|
|

|
|
&color=blue)
|
|

|
|
&color=blue)
|
|
&color=blue)
|
|

|
|

|
|
&color=blue)
|
|

|
|
&color=blue)
|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Windows DCOM Server Security Feature Bypass
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cve-scores
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Cybug-404/Task_3
|
|
- https://github.com/FDlucifer/Proxy-Attackchain
|
|
- https://github.com/Nels2/dcom_10036_Solver
|
|
- https://github.com/k0mi-tg/CVE-POC
|
|
- https://github.com/manas3c/CVE-POC
|
|
- https://github.com/n0-traces/cve_monitor
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/op7ic/DCOM-Audit
|
|
- https://github.com/otoriocyber/DCOM-HardeningTool
|
|
- https://github.com/whoforget/CVE-POC
|
|
- https://github.com/youwizard/CVE-POC
|
|
|