Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.2237 | cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.2237 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.2237 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ 10.0.18363.1854 | cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 ~ 10.0.19041.1288 | cpe:2.3:o:microsoft:windows_10_21H1:10.0.19041.1288:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2022 | 10.0.0 ~ 10.0.20348.288 | cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ 10.0.19041.1288 | cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.1288 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19041.1288 | cpe:2.3:o:microsoft:windows_10_20H2:10.0.19041.1288:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1288 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1288:*:*:*:*:*:*:* | |
| Microsoft | Windows 11 version 21H2 | 10.0.0 ~ 10.0.22000.258 | cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.258:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 1507 | 10.0.0 ~ 10.0.10240.19086 | cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 1607 | 10.0.0 ~ 10.0.14393.4704 | cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ 10.0.14393.4704 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4704:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ 10.0.14393.4704 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4704:*:*:*:*:*:*:* | |
| Microsoft | Windows 7 | 6.1.0 ~ 6.1.7601.25740 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25740:sp1:*:*:*:*:x86:* | |
| Microsoft | Windows 7 Service Pack 1 | 6.1.0 ~ 6.1.7601.25740 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25740:sp1:*:*:*:*:x64:* | |
| Microsoft | Windows 8.1 | 6.3.0 ~ 6.3.9600.20144 | cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21251 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) | 6.0.0 ~ 6.0.6003.21251 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21251 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ 6.1.7601.25740 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25740:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ 6.1.7601.25740 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25740:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23490 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23490:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23490 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23490:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20144 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20144:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20144 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20144:*:*:*:*:*:x64:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE) | https://github.com/ly4k/CallbackHell | POC Details |
| 2 | windows 10 14393 LPE | https://github.com/KaLendsi/CVE-2021-40449-Exploit | POC Details |
| 3 | LPE exploit for a UAF in Windows (CVE-2021-40449). | https://github.com/hakivvi/CVE-2021-40449 | POC Details |
| 4 | Exploit for CVE-2021-40449 | https://github.com/Kristal-g/CVE-2021-40449_poc | POC Details |
| 5 | None | https://github.com/CppXL/cve-2021-40449-poc | POC Details |
| 6 | None | https://github.com/BL0odz/CVE-2021-40449-NtGdiResetDC-UAF | POC Details |
| 7 | Using CVE-2021-40449 to manual map kernel mode driver | https://github.com/SamuelTulach/voidmap | POC Details |
| 8 | None | https://github.com/toanthang1842002/CVE-2021-40449 | POC Details |
| 9 | Using CVE-2021-40449 to manual map kernel mode driver | https://github.com/SultanPLX/SamuelTulach_voidmap | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-26427 | 9.0 CRITICAL | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2021-36970 | 8.8 HIGH | Windows Print Spooler Spoofing Vulnerability |
| CVE-2021-41344 | 8.1 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2021-40487 | 8.1 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2021-40464 | 8.0 HIGH | Windows Nearby Sharing Elevation of Privilege Vulnerability |
| CVE-2021-41348 | 8.0 HIGH | Microsoft Exchange Server Elevation of Privilege Vulnerability |
| CVE-2021-40461 | 8.0 HIGH | Windows Hyper-V Remote Code Execution Vulnerability |
| CVE-2021-38672 | 8.0 HIGH | Windows Hyper-V Remote Code Execution Vulnerability |
| CVE-2021-40486 | 7.8 HIGH | Microsoft Word Remote Code Execution Vulnerability |
| CVE-2021-40485 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2021-40488 | 7.8 HIGH | Storage Spaces Controller Elevation of Privilege Vulnerability |
| CVE-2021-40480 | 7.8 HIGH | Microsoft Office Visio Remote Code Execution Vulnerability |
| CVE-2021-40479 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2021-40478 | 7.8 HIGH | Storage Spaces Controller Elevation of Privilege Vulnerability |
| CVE-2021-40477 | 7.8 HIGH | Windows Event Tracing Elevation of Privilege Vulnerability |
| CVE-2021-40474 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2021-40473 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2021-40443 | 7.8 HIGH | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
| CVE-2021-40462 | 7.8 HIGH | Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability |
| CVE-2021-40450 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
Showing top 20 of 71 CVEs. View all on vendor page → →
No comments yet