Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.17763.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows Server 2019 | 10.0.17763.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.17763.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 ~ 10.0.19043.1466 | - | |
| Microsoft | Windows Server 2022 | 10.0.20348.0 ~ 10.0.20348.469 | - | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.1466 | - | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1466 | - | |
| Microsoft | Windows 11 version 21H2 | 10.0.0 ~ 10.0.22000.434 | - | |
| Microsoft | Windows 10 Version 21H2 | 10.0.19043.0 ~ 10.0.19044.1466 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | cve-2022-21907 | https://github.com/corelight/cve-2022-21907 | POC Details |
| 2 | CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube. | https://github.com/mauricelambert/CVE-2022-21907 | POC Details |
| 3 | HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907 | https://github.com/ZZ-SOCMAP/CVE-2022-21907 | POC Details |
| 4 | CVE-2022-21907 | https://github.com/xiska62314/CVE-2022-21907 | POC Details |
| 5 | Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers | https://github.com/p0dalirius/CVE-2022-21907-http.sys | POC Details |
| 6 | CVE-2022-21907 Vulnerability PoC | https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC | POC Details |
| 7 | A REAL DoS exploit for CVE-2022-21907 | https://github.com/polakow/CVE-2022-21907 | POC Details |
| 8 | Repository containing nse script for vulnerability CVE-2022-21907. It is a component (IIS) vulnerability on Windows. It allows remote code execution. The vulnerability affects the kernel module http. sys, which handles most basic IIS operations. | https://github.com/gpiechnik2/nmap-CVE-2022-21907 | POC Details |
| 9 | An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash. | https://github.com/iveresk/cve-2022-21907-http.sys | POC Details |
| 10 | Multithread Golang application | https://github.com/iveresk/cve-2022-21907 | POC Details |
| 11 | POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability. | https://github.com/Malwareman007/CVE-2022-21907 | POC Details |
| 12 | PoC for CVE-2021-31166 and CVE-2022-21907 | https://github.com/0xmaximus/Home-Demolisher | POC Details |
| 13 | 2022 Spring Prof. 謝續平 | https://github.com/cassie0206/CVE-2022-21907 | POC Details |
| 14 | CVE-2022-21907漏洞RCE PoC | https://github.com/EzoomE/CVE-2022-21907-RCE | POC Details |
| 15 | None | https://github.com/asepsaepdin/CVE-2022-21907 | POC Details |
| 16 | Vulnerability in HTTP Protocol Stack Enabling Remote Code Execution and Potential System Crash. | https://github.com/kamal-marouane/CVE-2022-21907 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-21849 | 9.8 CRITICAL | Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerabilit |
| CVE-2022-21969 | 9.0 CRITICAL | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2022-21901 | 9.0 CRITICAL | Windows Hyper-V Elevation of Privilege Vulnerability |
| CVE-2022-21855 | 9.0 CRITICAL | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2022-21846 | 9.0 CRITICAL | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2022-21922 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2022-21840 | 8.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2022-21850 | 8.8 HIGH | Remote Desktop Client Remote Code Execution Vulnerability |
| CVE-2022-21851 | 8.8 HIGH | Remote Desktop Client Remote Code Execution Vulnerability |
| CVE-2022-21857 | 8.8 HIGH | Active Directory Domain Services Elevation of Privilege Vulnerability |
| CVE-2022-21920 | 8.8 HIGH | Windows Kerberos Elevation of Privilege Vulnerability |
| CVE-2022-21837 | 8.3 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2022-21893 | 8.0 HIGH | Remote Desktop Protocol Remote Code Execution Vulnerability |
| CVE-2022-21908 | 7.8 HIGH | Windows Installer Elevation of Privilege Vulnerability |
| CVE-2022-21884 | 7.8 HIGH | Local Security Authority Subsystem Service Elevation of Privilege Vulnerability |
| CVE-2022-21888 | 7.8 HIGH | Windows Modern Execution Server Remote Code Execution Vulnerability |
| CVE-2022-21898 | 7.8 HIGH | DirectX Graphics Kernel Remote Code Execution Vulnerability |
| CVE-2022-21897 | 7.8 HIGH | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
| CVE-2022-21902 | 7.8 HIGH | Windows DWM Core Library Elevation of Privilege Vulnerability |
| CVE-2022-21895 | 7.8 HIGH | Windows User Profile Service Elevation of Privilege Vulnerability |
Showing top 20 of 100 CVEs. View all on vendor page → →
No comments yet