Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.2114 | cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.2114 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2114:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.2114 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2114:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ 10.0.18363.1734 | cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 ~ 10.0.19043.1165 | cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1165:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ 10.0.19041.1165 | cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1165:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.1165 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1165:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.1165 | cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1165:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1165 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1165:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1507 | 10.0.0 ~ 10.0.10240.19022 | cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 1607 | 10.0.0 ~ 10.0.14393.4583 | cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ 10.0.14393.4583 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4583:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ 10.0.14393.4583 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4583:*:*:*:*:*:*:* | |
| Microsoft | Windows 7 | 6.1.0 ~ 6.1.7601.25685 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25685:sp1:*:*:*:*:x86:* | |
| Microsoft | Windows 7 Service Pack 1 | 6.1.0 ~ 6.1.7601.25685 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25685:sp1:*:*:*:*:x64:* | |
| Microsoft | Windows 8.1 | 6.3.0 ~ 6.3.9600.20094 | cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20094:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21192 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) | 6.0.0 ~ 6.0.6003.21192 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21192 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ 6.1.7601.25685 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25685:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ 6.1.7601.25685 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25685:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23435 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23435:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23435 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23435:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20094 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20094:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20094 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20094:*:*:*:*:*:x64:* |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-26424 | 9.9 CRITICAL | Windows TCP/IP Remote Code Execution Vulnerability |
| CVE-2021-26432 | 9.8 CRITICAL | Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability |
| CVE-2021-36947 | 8.8 HIGH | Windows Print Spooler Remote Code Execution Vulnerability |
| CVE-2021-34535 | 8.8 HIGH | Remote Desktop Client Remote Code Execution Vulnerability |
| CVE-2021-36936 | 8.8 HIGH | Windows Print Spooler Remote Code Execution Vulnerability |
| CVE-2021-34524 | 8.1 HIGH | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability |
| CVE-2021-34537 | 7.8 HIGH | Windows Bluetooth Driver Elevation of Privilege Vulnerability |
| CVE-2021-36958 | 7.8 HIGH | Windows Print Spooler Remote Code Execution Vulnerability |
| CVE-2021-26431 | 7.8 HIGH | Windows Recovery Environment Agent Elevation of Privilege Vulnerability |
| CVE-2021-26425 | 7.8 HIGH | Windows Event Tracing Elevation of Privilege Vulnerability |
| CVE-2021-34471 | 7.8 HIGH | Microsoft Windows Defender Elevation of Privilege Vulnerability |
| CVE-2021-36948 | 7.8 HIGH | Windows Update Medic Service Elevation of Privilege Vulnerability |
| CVE-2021-34478 | 7.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2021-36927 | 7.8 HIGH | Windows Digital TV Tuner device registration application Elevation of Privilege Vulnerabil |
| CVE-2021-34484 | 7.8 HIGH | Windows User Profile Service Elevation of Privilege Vulnerability |
| CVE-2021-36937 | 7.8 HIGH | Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability |
| CVE-2021-34536 | 7.8 HIGH | Storage Spaces Controller Elevation of Privilege Vulnerability |
| CVE-2021-34486 | 7.8 HIGH | Windows Event Tracing Elevation of Privilege Vulnerability |
| CVE-2021-34533 | 7.8 HIGH | Windows Graphics Component Font Parsing Remote Code Execution Vulnerability |
| CVE-2021-34530 | 7.8 HIGH | Windows Graphics Component Remote Code Execution Vulnerability |
Showing top 20 of 45 CVEs. View all on vendor page → →
No comments yet