Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | .NET Core 2.1 | 2.1 ~ publication | cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:* | |
| Microsoft | .NET Core 3.1 | 3.1 ~ publication | cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:* | |
| Microsoft | .NET 5.0 | 5.0.0 ~ publication | cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* | |
| Microsoft | Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) | 16.0 ~ publication | cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | 15.9.0 ~ publication | cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:* | |
| Microsoft | Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) | 16.0.0 ~ publication | cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Visual Studio 2019 for Mac | 8.0.0 ~ publication | cpe:2.3:a:microsoft:visual_studio_2019:-:*:*:*:*:macos:*:* | |
| Microsoft | Microsoft Visual Studio 2019 version 16.8 (includes 16.0 - 16.7) | 16.0 ~ publication | cpe:2.3:a:microsoft:visual_studio_2019:16.8:*:*:*:*:*:*:* | |
| Microsoft | Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) | 15.0.0 ~ publication | cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:* | |
| Microsoft | PowerShell Core 7.1 | 7.1.0 ~ publication | cpe:2.3:a:microsoft:powershell_core:*:*:*:*:*:*:*:* | |
| Microsoft | PowerShell Core 7.0 | 7.0.0 ~ publication | cpe:2.3:a:microsoft:powershell_core:*:*:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-24074 | 9.8 CRITICAL | Windows TCP/IP Remote Code Execution Vulnerability |
| CVE-2021-24077 | 9.8 CRITICAL | Windows Fax Service Remote Code Execution Vulnerability |
| CVE-2021-24078 | 9.8 CRITICAL | Windows DNS Server Remote Code Execution Vulnerability |
| CVE-2021-24094 | 9.8 CRITICAL | Windows TCP/IP Remote Code Execution Vulnerability |
| CVE-2021-24072 | 8.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2021-24066 | 8.8 HIGH | Microsoft SharePoint Remote Code Execution Vulnerability |
| CVE-2021-24093 | 8.8 HIGH | Windows Graphics Component Remote Code Execution Vulnerability |
| CVE-2021-24088 | 8.8 HIGH | Windows Local Spooler Remote Code Execution Vulnerability |
| CVE-2021-1728 | 8.8 HIGH | System Center Operations Manager Elevation of Privilege Vulnerability |
| CVE-2020-17162 | 8.8 HIGH | Microsoft Windows Security Feature Bypass Vulnerability |
| CVE-2021-24105 | 8.4 HIGH | Package Managers Configurations Remote Code Execution Vulnerability |
| CVE-2021-24112 | 8.1 HIGH | .NET Core Remote Code Execution Vulnerability |
| CVE-2021-1722 | 8.1 HIGH | Windows Fax Service Remote Code Execution Vulnerability |
| CVE-2021-1726 | 8.0 HIGH | Microsoft SharePoint Server Spoofing Vulnerability |
| CVE-2021-24069 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2021-24083 | 7.8 HIGH | Windows Address Book Remote Code Execution Vulnerability |
| CVE-2021-24081 | 7.8 HIGH | Microsoft Windows Codecs Library Remote Code Execution Vulnerability |
| CVE-2021-24092 | 7.8 HIGH | Microsoft Defender Elevation of Privilege Vulnerability |
| CVE-2021-24102 | 7.8 HIGH | Windows Event Tracing Elevation of Privilege Vulnerability |
| CVE-2021-24096 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
Showing top 20 of 58 CVEs. View all on vendor page → →
No comments yet