Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.2061 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.2061 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.1110 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1110 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1110:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ 10.0.14393.4530 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ 10.0.14393.4530 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21167 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) | 6.0.0 ~ 6.0.6003.21167 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21167 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ 6.1.7601.25661 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ 6.1.7601.25661 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23409 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23409 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20069 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20069 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:* |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-34458 | 9.9 CRITICAL | Windows Kernel Remote Code Execution Vulnerability |
| CVE-2021-34481 | 8.8 HIGH | Windows Print Spooler Remote Code Execution Vulnerability |
| CVE-2021-34450 | 8.5 HIGH | Windows Hyper-V Remote Code Execution Vulnerability |
| CVE-2021-34446 | 8.0 HIGH | Windows HTML Platforms Security Feature Bypass Vulnerability |
| CVE-2021-34452 | 7.8 HIGH | Microsoft Word Remote Code Execution Vulnerability |
| CVE-2021-34438 | 7.8 HIGH | Windows Font Driver Host Remote Code Execution Vulnerability |
| CVE-2021-34439 | 7.8 HIGH | Microsoft Windows Media Foundation Remote Code Execution Vulnerability |
| CVE-2021-34441 | 7.8 HIGH | Microsoft Windows Media Foundation Remote Code Execution Vulnerability |
| CVE-2021-34445 | 7.8 HIGH | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability |
| CVE-2021-34455 | 7.8 HIGH | Windows File History Service Elevation of Privilege Vulnerability |
| CVE-2021-34456 | 7.8 HIGH | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability |
| CVE-2021-34459 | 7.8 HIGH | Windows AppContainer Elevation Of Privilege Vulnerability |
| CVE-2021-34460 | 7.8 HIGH | Storage Spaces Controller Elevation of Privilege Vulnerability |
| CVE-2021-34461 | 7.8 HIGH | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability |
| CVE-2021-34464 | 7.8 HIGH | Microsoft Defender Remote Code Execution Vulnerability |
| CVE-2021-34467 | 7.1 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2021-34449 | 7.0 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2021-34462 | 7.0 HIGH | Windows AppX Deployment Extensions Elevation of Privilege Vulnerability |
| CVE-2021-34448 | 6.8 MEDIUM | Scripting Engine Memory Corruption Vulnerability |
| CVE-2021-34447 | 6.8 MEDIUM | Windows MSHTML Platform Remote Code Execution Vulnerability |
Showing top 20 of 27 CVEs. View all on vendor page → →
No comments yet