Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.2183 | cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.2183 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.2183 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ 10.0.18363.1801 | cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 ~ 10.0.19043.1237 | cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1237:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2022 | 10.0.0 ~ 10.0.20348.230 | cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ 10.0.19041.1237 | cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.1237 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.1237 | cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1237:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1237 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1237:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1507 | 10.0.0 ~ 10.0.10240.19060 | cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19060:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 1607 | 10.0.0 ~ 10.0.14393.4651 | cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ 10.0.14393.4651 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4651:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ 10.0.14393.4651 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4651:*:*:*:*:*:*:* | |
| Microsoft | Windows 7 | 6.1.0 ~ 6.1.7601.25712 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x86:* | |
| Microsoft | Windows 7 Service Pack 1 | 6.1.0 ~ 6.1.7601.25712 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x64:* | |
| Microsoft | Windows 8.1 | 6.3.0 ~ 6.3.9600.20120 | cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20120:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21218 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) | 6.0.0 ~ 6.0.6003.21218 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21218 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ 6.1.7601.25712 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25712:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ 6.1.7601.25712 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25712:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23462 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23462:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23462 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23462:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20120 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20120:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20120 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20120:*:*:*:*:*:x64:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444 | https://github.com/ozergoker/CVE-2021-40444 | POC Details |
| 2 | CVE-2021-40444 POC | https://github.com/DarkSprings/CVE-2021-40444 | POC Details |
| 3 | None | https://github.com/rfcxv/CVE-2021-40444-POC | POC Details |
| 4 | 根据已知样本反编译代码 | https://github.com/bambooqj/CVE-2021-40444_EXP_JS | POC Details |
| 5 | None | https://github.com/Immersive-Labs-Sec/cve-2021-40444-analysis | POC Details |
| 6 | None | https://github.com/vysecurity/CVE-2021-40444 | POC Details |
| 7 | CVE-2021-40444 Sample | https://github.com/Udyz/CVE-2021-40444-Sample | POC Details |
| 8 | CVE-2021-40444 PoC | https://github.com/lockedbyte/CVE-2021-40444 | POC Details |
| 9 | None | https://github.com/fengjixuchui/CVE-2021-40444-docx-Generate | POC Details |
| 10 | None | https://github.com/KnoooW/CVE-2021-40444-docx-Generate | POC Details |
| 11 | A malicious .cab creation tool for CVE-2021-40444 | https://github.com/mansk1es/Caboom | POC Details |
| 12 | Reverse engineering the "A Letter Before Court 4.docx" malicious files exploting cve-2021-40444 | https://github.com/jamesrep/cve-2021-40444 | POC Details |
| 13 | None | https://github.com/W1kyri3/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx | POC Details |
| 14 | This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit | https://github.com/aslitsecurity/CVE-2021-40444_builders | POC Details |
| 15 | POC for CVE-2021-40444 | https://github.com/khoaduynu/CVE-2021-40444 | POC Details |
| 16 | Malicious document builder for CVE-2021-40444 | https://github.com/Jeromeyoung/MSHTMHell | POC Details |
| 17 | None | https://github.com/k8gege/CVE-2021-40444 | POC Details |
| 18 | CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit | https://github.com/klezVirus/CVE-2021-40444 | POC Details |
| 19 | CVE-2021-40444 - Custom CAB templates from MakeCAB | https://github.com/Udyz/CVE-2021-40444-CAB | POC Details |
| 20 | Modified code so that we don´t need to rely on CAB archives | https://github.com/Edubr2020/CVE-2021-40444--CABless | POC Details |
| 21 | CVE 2021 40444 Windows Exploit services.dll | https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives | POC Details |
| 22 | This docx exploit uses res files inside Microsoft .docx file to execute malicious files. This exploit is related to CVE-2021-40444 | https://github.com/LazarusReborn/Docx-Exploit-2021 | POC Details |
| 23 | None | https://github.com/H0j3n/CVE-2021-40444 | POC Details |
| 24 | None | https://github.com/metehangenel/MSHTML-CVE-2021-40444 | POC Details |
| 25 | TIC4301 Project - CVE-2021-40444 | https://github.com/Jeromeyoung/TIC4301_Project | POC Details |
| 26 | None | https://github.com/TiagoSergio/CVE-2021-40444 | POC Details |
| 27 | An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework. | https://github.com/wh00datz/CVE-2021-40444-POC | POC Details |
| 28 | Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444. | https://github.com/Zeop-CyberSec/word_mshtml | POC Details |
| 29 | None | https://github.com/Alexcot25051999/CVE-2021-40444 | POC Details |
| 30 | None | https://github.com/lisinan988/CVE-2021-40444-exp | POC Details |
| 31 | CVE-2021-40444 | https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit | POC Details |
| 32 | Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit | https://github.com/MRacumen/CVE-2021-40444 | POC Details |
| 33 | None | https://github.com/RedLeavesChilde/CVE-2021-40444 | POC Details |
| 34 | None | https://github.com/nvchungkma/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution- | POC Details |
| 35 | None | https://github.com/hqdat809/CVE-2021-40444 | POC Details |
| 36 | None | https://github.com/tiagob0b/CVE-2021-40444 | POC Details |
| 37 | An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework. | https://github.com/kagura-maru/CVE-2021-40444-POC | POC Details |
| 38 | For learning purpose did a complete analysis on CVE-2021-40444 POC (proof of concept) | https://github.com/skitkat/CVE-2021-40444-POC | POC Details |
| 39 | CVE-2021-40444 Sample | https://github.com/k4k4/CVE-2021-40444-Sample | POC Details |
| 40 | CVE-2021-40444 - Custom CAB templates from MakeCAB | https://github.com/Phuong39/CVE-2021-40444-CAB | POC Details |
| 41 | This repository contains scripts and resources for exploiting the Follina CVE and CVE-2021-40444 vulnerabilities in Microsoft Office. The scripts generate malicious document files that can execute arbitrary code on the target system. | https://github.com/basim-ahmad/Follina-CVE-and-CVE-2021-40444 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-38647 | 9.8 CRITICAL | Open Management Infrastructure Remote Code Execution Vulnerability |
| CVE-2021-36965 | 8.8 HIGH | Windows WLAN AutoConfig Service Remote Code Execution Vulnerability |
| CVE-2021-36954 | 8.8 HIGH | Windows Bind Filter Driver Elevation of Privilege Vulnerability |
| CVE-2021-26435 | 8.1 HIGH | Windows Scripting Engine Memory Corruption Vulnerability |
| CVE-2021-36967 | 8.0 HIGH | Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability |
| CVE-2021-38625 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2021-38626 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2021-38628 | 7.8 HIGH | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
| CVE-2021-38655 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2021-38630 | 7.8 HIGH | Windows Event Tracing Elevation of Privilege Vulnerability |
| CVE-2021-38656 | 7.8 HIGH | Microsoft Word Remote Code Execution Vulnerability |
| CVE-2021-38654 | 7.8 HIGH | Microsoft Office Visio Remote Code Execution Vulnerability |
| CVE-2021-36975 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2021-38639 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2021-38648 | 7.8 HIGH | Open Management Infrastructure Elevation of Privilege Vulnerability |
| CVE-2021-38646 | 7.8 HIGH | Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability |
| CVE-2021-38645 | 7.8 HIGH | Open Management Infrastructure Elevation of Privilege Vulnerability |
| CVE-2021-38644 | 7.8 HIGH | Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability |
| CVE-2021-38653 | 7.8 HIGH | Microsoft Office Visio Remote Code Execution Vulnerability |
| CVE-2021-26434 | 7.8 HIGH | Visual Studio Elevation of Privilege Vulnerability |
Showing top 20 of 61 CVEs. View all on vendor page → →
No comments yet