Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.2183 | cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.2183 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.2183 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ 10.0.18363.1801 | cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 ~ 10.0.19043.1237 | cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1237:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2022 | 10.0.0 ~ 10.0.20348.230 | cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ 10.0.19041.1237 | cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.1237 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.1237 | cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1237:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1237 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1237:*:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-38647 | 9.8 CRITICAL | Open Management Infrastructure Remote Code Execution Vulnerability |
| CVE-2021-36954 | 8.8 HIGH | Windows Bind Filter Driver Elevation of Privilege Vulnerability |
| CVE-2021-40444 | 8.8 HIGH | Microsoft MSHTML Remote Code Execution Vulnerability |
| CVE-2021-36965 | 8.8 HIGH | Windows WLAN AutoConfig Service Remote Code Execution Vulnerability |
| CVE-2021-26435 | 8.1 HIGH | Windows Scripting Engine Memory Corruption Vulnerability |
| CVE-2021-36967 | 8.0 HIGH | Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability |
| CVE-2021-38639 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2021-38626 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2021-38646 | 7.8 HIGH | Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability |
| CVE-2021-38648 | 7.8 HIGH | Open Management Infrastructure Elevation of Privilege Vulnerability |
| CVE-2021-38653 | 7.8 HIGH | Microsoft Office Visio Remote Code Execution Vulnerability |
| CVE-2021-38654 | 7.8 HIGH | Microsoft Office Visio Remote Code Execution Vulnerability |
| CVE-2021-38645 | 7.8 HIGH | Open Management Infrastructure Elevation of Privilege Vulnerability |
| CVE-2021-38658 | 7.8 HIGH | Microsoft Office Graphics Remote Code Execution Vulnerability |
| CVE-2021-38659 | 7.8 HIGH | Microsoft Office Graphics Remote Code Execution Vulnerability |
| CVE-2021-38633 | 7.8 HIGH | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
| CVE-2021-38660 | 7.8 HIGH | Microsoft Office Graphics Remote Code Execution Vulnerability |
| CVE-2021-38630 | 7.8 HIGH | Windows Event Tracing Elevation of Privilege Vulnerability |
| CVE-2021-38628 | 7.8 HIGH | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
| CVE-2021-38655 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
Showing top 20 of 61 CVEs. View all on vendor page → →
No comments yet