Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.2366 | cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2366:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.2366 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2366:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.2366 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2366:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ 10.0.18363.1977 | cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 ~ 10.0.19043.1415 | cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1415:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2022 | 10.0.0 ~ 10.0.20348.405 | cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.405:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ 10.0.19041.1415 | cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1415:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.1415 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1415:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.1415 | cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1415:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1415 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1415:*:*:*:*:*:*:* | |
| Microsoft | Windows 11 version 21H2 | 10.0.0 ~ 10.0.22000.376 | cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.376:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 21H2 | 10.0.0 ~ 10.0.19044.1415 | cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1415:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 1507 | 10.0.0 ~ 10.0.10240.19145 | cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19145:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 1607 | 10.0.0 ~ 10.0.14393.4825 | cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4825:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ 10.0.14393.4825 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4825:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ 10.0.14393.4825 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4825:*:*:*:*:*:*:* | |
| Microsoft | Windows 8.1 | 6.3.0 ~ 6.3.9600.20207 | cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20207:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23545 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23545:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23545 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23545:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20207 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20207:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20207 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20207:*:*:*:*:*:x64:* |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-42313 | 10.0 CRITICAL | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-42311 | 10.0 CRITICAL | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-43907 | 9.8 CRITICAL | Visual Studio Code WSL Extension Remote Code Execution Vulnerability |
| CVE-2021-43899 | 9.8 CRITICAL | Microsoft 4K Wireless Display Adapter Remote Code Execution Vulnerability |
| CVE-2021-43215 | 9.8 CRITICAL | iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution |
| CVE-2021-43905 | 9.6 CRITICAL | Microsoft Office app Remote Code Execution Vulnerability |
| CVE-2021-43882 | 9.0 CRITICAL | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-41365 | 8.8 HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-42309 | 8.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2021-43877 | 8.8 HIGH | ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability |
| CVE-2021-42315 | 8.8 HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-42314 | 8.8 HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-43217 | 8.1 HIGH | Windows Encrypting File System (EFS) Remote Code Execution Vulnerability |
| CVE-2021-42310 | 8.1 HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability |
| CVE-2021-42320 | 8.0 HIGH | Microsoft SharePoint Server Spoofing Vulnerability |
| CVE-2021-43234 | 7.8 HIGH | Windows Fax Service Remote Code Execution Vulnerability |
| CVE-2021-43223 | 7.8 HIGH | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability |
| CVE-2021-43229 | 7.8 HIGH | Windows NTFS Elevation of Privilege Vulnerability |
| CVE-2021-43230 | 7.8 HIGH | Windows NTFS Elevation of Privilege Vulnerability |
| CVE-2021-43231 | 7.8 HIGH | Windows NTFS Elevation of Privilege Vulnerability |
Showing top 20 of 67 CVEs. View all on vendor page → →
No comments yet