尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.17763.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows Server 2019 | 10.0.17763.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.17763.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ 10.0.18363.2037 | - | |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 ~ 10.0.19043.1466 | - | |
| Microsoft | Windows Server 2022 | 10.0.20348.0 ~ 10.0.20348.469 | - | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.1466 | - | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1466 | - | |
| Microsoft | Windows 11 version 21H2 | 10.0.0 ~ 10.0.22000.434 | - | |
| Microsoft | Windows 10 Version 21H2 | 10.0.19043.0 ~ 10.0.19044.1466 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | win32k LPE | https://github.com/KaLendsi/CVE-2022-21882 | POC详情 |
| 2 | CVE-2022-21882 | https://github.com/David-Honisch/CVE-2022-21882 | POC详情 |
| 3 | None | https://github.com/L4ys/CVE-2022-21882 | POC详情 |
| 4 | lpe poc for cve-2022-21882 | https://github.com/sailay1996/cve-2022-21882-poc | POC详情 |
| 5 | None | https://github.com/r1l4-i3pur1l4/CVE-2022-21882 | POC详情 |
| 6 | None | https://github.com/dishfwk/CVE-2022-21882 | POC详情 |
| 7 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20Win32k%20%E5%86%85%E6%A0%B8%E6%8F%90%E6%9D%83%E6%BC%8F%E6%B4%9E%20CVE-2022-21882.md | POC详情 |
未找到公开 POC。
登录以生成 AI POC| CVE-2022-21907 | 9.8 CRITICAL | Microsoft Windows 安全漏洞 |
| CVE-2022-21849 | 9.8 CRITICAL | Microsoft Windows IKE Extension安全漏洞 |
| CVE-2022-21901 | 9.0 CRITICAL | Microsoft Hyper-V 权限许可和访问控制问题漏洞 |
| CVE-2022-21855 | 9.0 CRITICAL | Microsoft Exchange Server 安全漏洞 |
| CVE-2022-21846 | 9.0 CRITICAL | Microsoft Exchange Server 代码注入漏洞 |
| CVE-2022-21969 | 9.0 CRITICAL | Microsoft Exchange Server 安全漏洞 |
| CVE-2022-21920 | 8.8 HIGH | Microsoft Windows Kerberos 安全漏洞 |
| CVE-2022-21840 | 8.8 HIGH | Microsoft Office 代码注入漏洞 |
| CVE-2022-21922 | 8.8 HIGH | Microsoft Windows Remote Procedure Call Runtime 缓冲区错误漏洞 |
| CVE-2022-21850 | 8.8 HIGH | Microsoft Windows Remote Desktop Protocol缓冲区错误漏洞 |
| CVE-2022-21851 | 8.8 HIGH | Microsoft Windows Remote Desktop Protocol 缓冲区错误漏洞 |
| CVE-2022-21857 | 8.8 HIGH | Microsoft Windows Active Directory权限许可和访问控制问题漏洞 |
| CVE-2022-21837 | 8.3 HIGH | Microsoft SharePoint代码注入漏洞 |
| CVE-2022-21893 | 8.0 HIGH | Windows Remote Desktop Protocol安全漏洞 |
| CVE-2022-21897 | 7.8 HIGH | Microsoft Windows Common Log File System Driver缓冲区错误漏洞 |
| CVE-2022-21914 | 7.8 HIGH | Microsoft Windows Remote Access Connection Manager 权限许可和访问控制问题漏洞 |
| CVE-2022-21908 | 7.8 HIGH | Microsoft Windows Installer 安全漏洞 |
| CVE-2022-21910 | 7.8 HIGH | Microsoft Windows 安全漏洞 |
| CVE-2022-21912 | 7.8 HIGH | Microsoft Windows DirectX 安全漏洞 |
| CVE-2022-21917 | 7.8 HIGH | Microsoft HEVC Video Extensions 缓冲区错误漏洞 |
显示前 20 条,共 100 条。 查看全部 → →
暂无评论