Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.17763.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows Server 2019 | 10.0.17763.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.17763.0 ~ 10.0.17763.2452 | - | |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 ~ 10.0.19043.1466 | - | |
| Microsoft | Windows Server 2022 | 10.0.20348.0 ~ 10.0.20348.469 | - | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.1466 | - | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1466 | - | |
| Microsoft | Windows 11 version 21H2 | 10.0.0 ~ 10.0.22000.434 | - | |
| Microsoft | Windows 10 Version 21H2 | 10.0.19043.0 ~ 10.0.19044.1466 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | cve-2022-21907 | https://github.com/corelight/cve-2022-21907 | POC Details |
| 2 | CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube. | https://github.com/mauricelambert/CVE-2022-21907 | POC Details |
| 3 | HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907 | https://github.com/ZZ-SOCMAP/CVE-2022-21907 | POC Details |
| 4 | CVE-2022-21907 | https://github.com/xiska62314/CVE-2022-21907 | POC Details |
| 5 | Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers | https://github.com/p0dalirius/CVE-2022-21907-http.sys | POC Details |
| 6 | CVE-2022-21907 Vulnerability PoC | https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC | POC Details |
| 7 | A REAL DoS exploit for CVE-2022-21907 | https://github.com/polakow/CVE-2022-21907 | POC Details |
| 8 | Repository containing nse script for vulnerability CVE-2022-21907. It is a component (IIS) vulnerability on Windows. It allows remote code execution. The vulnerability affects the kernel module http. sys, which handles most basic IIS operations. | https://github.com/gpiechnik2/nmap-CVE-2022-21907 | POC Details |
| 9 | An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash. | https://github.com/iveresk/cve-2022-21907-http.sys | POC Details |
| 10 | Multithread Golang application | https://github.com/iveresk/cve-2022-21907 | POC Details |
| 11 | POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability. | https://github.com/Malwareman007/CVE-2022-21907 | POC Details |
| 12 | PoC for CVE-2021-31166 and CVE-2022-21907 | https://github.com/0xmaximus/Home-Demolisher | POC Details |
| 13 | 2022 Spring Prof. 謝續平 | https://github.com/cassie0206/CVE-2022-21907 | POC Details |
| 14 | CVE-2022-21907漏洞RCE PoC | https://github.com/EzoomE/CVE-2022-21907-RCE | POC Details |
| 15 | None | https://github.com/asepsaepdin/CVE-2022-21907 | POC Details |
| 16 | Vulnerability in HTTP Protocol Stack Enabling Remote Code Execution and Potential System Crash. | https://github.com/kamal-marouane/CVE-2022-21907 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet