Added |
CVSS V2 |
|
NIST (AV:N/AC:L/Au:N/C:C/I:C/A:C)
|
Added |
CWE |
|
NIST NVD-CWE-noinfo
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*
*cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*
*cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*
*cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*
*cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*
*cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*
*cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*
*cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*
*cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*
*cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*
*cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*
*cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*
*cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*
*cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*
*cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/165566/HTTP-Protocol-Stack-Denial-Of-Service-Remote-Code-Execution.html No Types Assigned
|
http://packetstormsecurity.com/files/165566/HTTP-Protocol-Stack-Denial-Of-Service-Remote-Code-Execution.html Exploit, Third Party Advisory
|
Changed |
Reference Type |
https://github.com/nu11secur1ty/Windows10Exploits/tree/master/2022/CVE-2022-21907 No Types Assigned
|
https://github.com/nu11secur1ty/Windows10Exploits/tree/master/2022/CVE-2022-21907 Exploit, Third Party Advisory
|
Changed |
Reference Type |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21907 No Types Assigned
|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21907 Mitigation, Patch, Vendor Advisory
|
Changed |
Reference Type |
https://www.nu11secur1ty.com/2022/01/cve-2022-21907.html No Types Assigned
|
https://www.nu11secur1ty.com/2022/01/cve-2022-21907.html Exploit, Third Party Advisory
|