CVE-2022-21907

CRITICAL EXPLOITED

HTTP Protocol Stack - RCE

Title source: llm

Description

HTTP Protocol Stack Remote Code Execution Vulnerability

Exploits (19)

nomisec WORKING POC 363 stars
by ZZ-SOCMAP · dos
https://github.com/ZZ-SOCMAP/CVE-2022-21907
nomisec WORKING POC 129 stars
by polakow · dos
https://github.com/polakow/CVE-2022-21907
nomisec WORKING POC 83 stars
by p0dalirius · dos
https://github.com/p0dalirius/CVE-2022-21907-http.sys
nomisec WORKING POC 30 stars
by michelep · dos
https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC
nomisec WORKING POC 26 stars
by mauricelambert · poc
https://github.com/mauricelambert/CVE-2022-21907
nomisec WORKING POC 17 stars
by Malwareman007 · dos
https://github.com/Malwareman007/CVE-2022-21907
nomisec SCANNER 7 stars
by 0xmaximus · dos
https://github.com/0xmaximus/Home-Demolisher
nomisec WRITEUP 5 stars
by corelight · poc
https://github.com/corelight/cve-2022-21907
nomisec SCANNER 2 stars
by gpiechnik2 · poc
https://github.com/gpiechnik2/nmap-CVE-2022-21907
nomisec WORKING POC 1 stars
by iveresk · poc
https://github.com/iveresk/cve-2022-21907
nomisec WORKING POC 1 stars
by iveresk · poc
https://github.com/iveresk/cve-2022-21907-http.sys
nomisec WORKING POC 1 stars
by kamal-marouane · dos
https://github.com/kamal-marouane/CVE-2022-21907
nomisec WORKING POC
by EzoomE · remote
https://github.com/EzoomE/CVE-2022-21907-RCE
nomisec STUB
by xiska62314 · poc
https://github.com/xiska62314/CVE-2022-21907
nomisec WORKING POC
by asepsaepdin · dos
https://github.com/asepsaepdin/CVE-2022-21907
nomisec WORKING POC
by cassie0206 · poc
https://github.com/cassie0206/CVE-2022-21907
patchapalooza WORKING POC
by swarupsro · remote
https://gitlab.com/swarupsro/CVE-2022-21907
patchapalooza WORKING POC
by lutixiaya · poc
https://gitee.com/lutixiaya/cve-2022-21907
exploitdb WORKING POC
by nu11secur1ty · textremotewindows
https://www.exploit-db.com/exploits/51575

Scores

CVSS v3 9.8
EPSS 0.9189
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2024-05-07

Classification

Status published

Affected Products (17)

microsoft/windows_10
microsoft/windows_10
microsoft/windows_10
microsoft/windows_10
microsoft/windows_10
microsoft/windows_10
microsoft/windows_10
microsoft/windows_10
microsoft/windows_10
microsoft/windows_10
microsoft/windows_10
microsoft/windows_10
microsoft/windows_11
microsoft/windows_11
microsoft/windows_server
... and 2 more

Timeline

Published Jan 11, 2022
Tracked Since Feb 18, 2026