mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
7.3 KiB
7.3 KiB
CVE-2025-33073
Description
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
POC
Reference
- https://www.vicarius.io/vsociety/posts/cve-2025-33073-detection-script-improper-access-control-in-windows-smb-affects-microsoft-products
- https://www.vicarius.io/vsociety/posts/cve-2025-33073-mitigation-script-improper-access-control-in-windows-smb-affects-microsoft-products
Github
- https://github.com/0xMarcio/cve
- https://github.com/Andromeda254/cve
- https://github.com/DakshRocks21/EH_Assignment_Materials
- https://github.com/GhostTroops/TOP
- https://github.com/JFR-C/Windows-Penetration-Testing
- https://github.com/Jean-Francois-C/Windows-Penetration-Testing
- https://github.com/OleFredrik1/remoteKrbRelayx
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/Shamhus/Detecting-ADCS-Attacks
- https://github.com/afkfr0mkeyb0ard/CustomKaliSetup
- https://github.com/cve-2025-33073/Avisador
- https://github.com/cve-2025-33073/Backdoor
- https://github.com/cve-2025-33073/CataArquivos
- https://github.com/cve-2025-33073/ConsumindoAPIGoogleGemini
- https://github.com/cve-2025-33073/ContaBanco
- https://github.com/cve-2025-33073/Digitador
- https://github.com/cve-2025-33073/DrRoboTinic
- https://github.com/cve-2025-33073/EstoqueStore
- https://github.com/cve-2025-33073/Ferra
- https://github.com/cve-2025-33073/FiveMGTA5Aprovador
- https://github.com/cve-2025-33073/Horas
- https://github.com/cve-2025-33073/JDKSenhas
- https://github.com/cve-2025-33073/JoJoCafeMYSQL
- https://github.com/cve-2025-33073/ListarIPs
- https://github.com/cve-2025-33073/MemoriaCripto
- https://github.com/cve-2025-33073/Mexe
- https://github.com/cve-2025-33073/NazareTedesco
- https://github.com/cve-2025-33073/RecebimentoEspiao
- https://github.com/cve-2025-33073/SeguidoresTwitterUsandoAPIdoTwitter
- https://github.com/cve-2025-33073/ServicoSystemD
- https://github.com/cve-2025-33073/Shell
- https://github.com/cve-2025-33073/UsurpadoraDeHoras
- https://github.com/cve-2025-33073/cmd
- https://github.com/cve-2025-33073/cmd2
- https://github.com/cve-2025-33073/cve-2025-33073
- https://github.com/cve-2025-33073/javanunes
- https://github.com/cve-2025-33073/pythonPromptFile
- https://github.com/cve-2025-33073/reselinux
- https://github.com/cve-2025-33073/telegrampobot1976
- https://github.com/cve-2025-33073/vermut
- https://github.com/cve-2025-33073/vermut-java
- https://github.com/lineeralgebra/My-Favorite-Boxes
- https://github.com/marc-ko/daily-trending-repo
- https://github.com/matejsmycka/CVE-2025-33073-checker
- https://github.com/mbanyamer/-Windows-11-SMB-Client-RCE-Privilege-Escalation-Exploit-Using-DNS-Poisoning-NTLM-Relay-RPC-Coercion
- https://github.com/mverschu/CVE-2025-33073
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/obscura-cert/CVE-2025-33073
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/sleepasleepzzz/CVE-2025-33073
- https://github.com/tanjiti/sec_profile
- https://github.com/yembors64632/cve_monitor_Public