高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Microsoft | Windows 7 | 6.1.0 ~ 6.1.7601.25796 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25796:sp1:*:*:*:*:x86:* | |
| Microsoft | Windows 7 Service Pack 1 | 6.1.0 ~ 6.1.7601.25796 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25796:sp1:*:*:*:*:x64:* | |
| Microsoft | Windows 8.1 | 6.3.0 ~ 6.3.9600.20207 | cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20207:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ 6.1.7601.25796 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25796:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ 6.1.7601.25796 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25796:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23545 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23545:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23545 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23545:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20207 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20207:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20207 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20207:*:*:*:*:*:x64:* |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2021-42311 | 10.0 CRITICAL | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-42313 | 10.0 CRITICAL | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-43899 | 9.8 CRITICAL | Microsoft 4K Wireless Display Adapter Remote Code Execution Vulnerability |
| CVE-2021-43907 | 9.8 CRITICAL | Visual Studio Code WSL Extension Remote Code Execution Vulnerability |
| CVE-2021-43215 | 9.8 CRITICAL | iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution |
| CVE-2021-43905 | 9.6 CRITICAL | Microsoft Office app Remote Code Execution Vulnerability |
| CVE-2021-43882 | 9.0 CRITICAL | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-42315 | 8.8 HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-42314 | 8.8 HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-41365 | 8.8 HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-42309 | 8.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2021-43877 | 8.8 HIGH | ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability |
| CVE-2021-43217 | 8.1 HIGH | Windows Encrypting File System (EFS) Remote Code Execution Vulnerability |
| CVE-2021-42310 | 8.1 HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-42320 | 8.0 HIGH | Microsoft SharePoint Server Spoofing Vulnerability |
| CVE-2021-43226 | 7.8 HIGH | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
| CVE-2021-43223 | 7.8 HIGH | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability |
| CVE-2021-43229 | 7.8 HIGH | Windows NTFS Elevation of Privilege Vulnerability |
| CVE-2021-43232 | 7.8 HIGH | Windows Event Tracing Remote Code Execution Vulnerability |
| CVE-2021-43231 | 7.8 HIGH | Windows NTFS Elevation of Privilege Vulnerability |
Showing 20 of 67 CVEs. View all on vendor page →
まだコメントはありません