Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1803 | 10.0.0 ~ 10.0.17134.2207 | cpe:2.3:o:microsoft:windows_10_1803:10.0.17134.2207:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.1935 | cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.1935 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1935:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.1935 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1935:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ 10.0.18363.1556 | cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1556:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | 10.0.0 ~ 10.0.18363.1556 | cpe:2.3:o:microsoft:windows_server_1909:10.0.18363.1556:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ 10.0.19041.982 | cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.982:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.982 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.982:*:*:*:*:*:*:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.982 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.982:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1507 | 10.0.0 ~ 10.0.10240.18931 | cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18931:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 1607 | 10.0.0 ~ 10.0.14393.4401 | cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4401:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ 10.0.14393.4401 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4401:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ 10.0.14393.4401 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4401:*:*:*:*:*:*:* | |
| Microsoft | Windows 7 Service Pack 1 | 6.1.0 ~ 6.1.7601.24597 | cpe:2.3:o:microsoft:windows_7:6.1.7601.24597:sp1:*:*:*:*:x64:* | |
| Microsoft | Windows 8.1 | 6.3.0 ~ 6.3.9600.20017 | cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20017:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21117 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) | 6.0.0 ~ 6.0.6003.21117 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ 6.1.7601.24597 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.24597:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ 6.1.7601.24597 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.24597:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23347 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23347:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23347 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23347:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20017 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20017:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20017 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20017:*:*:*:*:*:x64:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys. | https://github.com/0vercl0k/CVE-2021-28476 | POC Details |
| 2 | None | https://github.com/bluefrostsecurity/CVE-2021-28476 | POC Details |
| 3 | tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476. | https://github.com/LaCeeKa/CVE-2021-28476-tools-env | POC Details |
| 4 | CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM | https://github.com/australeo/CVE-2021-28476 | POC Details |
| 5 | PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys. | https://github.com/2273852279qqs/0vercl0k | POC Details |
| 6 | PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys. | https://github.com/dengyang123x/0vercl0k | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-31166 | 9.8 CRITICAL | HTTP Protocol Stack Remote Code Execution Vulnerability |
| CVE-2021-28474 | 8.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2021-28455 | 8.8 HIGH | Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vul |
| CVE-2021-31181 | 8.8 HIGH | Microsoft SharePoint Remote Code Execution Vulnerability |
| CVE-2021-31194 | 8.8 HIGH | OLE Automation Remote Code Execution Vulnerability |
| CVE-2021-27068 | 8.8 HIGH | Visual Studio Remote Code Execution Vulnerability |
| CVE-2021-31208 | 7.8 HIGH | Windows Container Manager Service Elevation of Privilege Vulnerability |
| CVE-2021-31165 | 7.8 HIGH | Windows Container Manager Service Elevation of Privilege Vulnerability |
| CVE-2021-31168 | 7.8 HIGH | Windows Container Manager Service Elevation of Privilege Vulnerability |
| CVE-2021-31170 | 7.8 HIGH | Windows Graphics Component Elevation of Privilege Vulnerability |
| CVE-2021-31169 | 7.8 HIGH | Windows Container Manager Service Elevation of Privilege Vulnerability |
| CVE-2021-31211 | 7.8 HIGH | Visual Studio Code Remote Code Execution Vulnerability |
| CVE-2021-28465 | 7.8 HIGH | Web Media Extensions Remote Code Execution Vulnerability |
| CVE-2021-31180 | 7.8 HIGH | Microsoft Office Graphics Remote Code Execution Vulnerability |
| CVE-2021-31214 | 7.8 HIGH | Visual Studio Code Remote Code Execution Vulnerability |
| CVE-2021-31179 | 7.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2021-31177 | 7.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2021-31175 | 7.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2021-31176 | 7.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2021-31187 | 7.8 HIGH | Windows WalletService Elevation of Privilege Vulnerability |
Showing top 20 of 52 CVEs. View all on vendor page → →
No comments yet