尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows | 10 Version 1803 for 32-bit Systems | - | |
| Microsoft | Windows Server | version 1803 (Core Installation) | - | |
| Microsoft | Windows 10 Version 1903 for 32-bit Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1903 for x64-based Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1903 for ARM64-based Systems | unspecified | - | |
| Microsoft | Windows Server, version 1903 (Server Core installation) | unspecified | - | |
| Microsoft | Windows 10 Version 1909 for 32-bit Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1909 for x64-based Systems | unspecified | - | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | unspecified | - | |
| Microsoft | Windows 10 Version 1909 for ARM64-based Systems | unspecified | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Remote Code Execution Exploit | https://github.com/nissan-sudo/CVE-2020-0601 | POC详情 |
| 2 | Zeek package to detect CVE-2020-0601 | https://github.com/0xxon/cve-2020-0601 | POC详情 |
| 3 | A Windows Crypto Exploit | https://github.com/SherlockSec/CVE-2020-0601 | POC详情 |
| 4 | None | https://github.com/JPurrier/CVE-2020-0601 | POC详情 |
| 5 | Zeek package that uses OpenSSL to detect CVE-2020-0601 exploit attempts | https://github.com/0xxon/cve-2020-0601-plugin | POC详情 |
| 6 | PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll) | https://github.com/ly4k/CurveBall | POC详情 |
| 7 | A PoC for CVE-2020-0601 | https://github.com/kudelskisecurity/chainoffools | POC详情 |
| 8 | 😂An awesome curated list of repos for CVE-2020-0601. | https://github.com/RrUZi/Awesome-CVE-2020-0601 | POC详情 |
| 9 | Curated list of CVE-2020-0601 resources | https://github.com/BlueTeamSteve/CVE-2020-0601 | POC详情 |
| 10 | Proof of Concept for CVE-2020-0601 | https://github.com/saleemrashid/badecparams | POC详情 |
| 11 | C++ based utility to check if certificates are trying to exploit CVE-2020-0601 | https://github.com/0xxon/cve-2020-0601-utils | POC详情 |
| 12 | Powershell to patch CVE-2020-0601 . Complete security rollup for Windows 10 1507-1909 | https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell | POC详情 |
| 13 | None | https://github.com/MarkusZehnle/CVE-2020-0601 | POC详情 |
| 14 | CurveBall CVE exploitation | https://github.com/YoannDqr/CVE-2020-0601 | POC详情 |
| 15 | Perl version of recently published scripts to build ECC certificates with specific parameters re CVE-2020-0601 | https://github.com/thimelp/cve-2020-0601-Perl | POC详情 |
| 16 | Repo containing lua scripts and PCAP to find CVE-2020-0601 exploit attempts via network traffic | https://github.com/dlee35/curveball_lua | POC详情 |
| 17 | CurveBall (CVE-2020-0601) - PoC CVE-2020-0601, or commonly referred to as CurveBall, is a vulnerability in which the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. Attackers can supply hand-rolled generators, bypassing validation, antivirus & all non-protections. | https://github.com/IIICTECH/-CVE-2020-0601-ECC---EXPLOIT | POC详情 |
| 18 | None | https://github.com/Ash112121/CVE-2020-0601 | POC详情 |
| 19 | CVE-2020-0601 #curveball - Alternative Key Calculator | https://github.com/gentilkiwi/curveball | POC详情 |
| 20 | CVE-2020-0601: Windows CryptoAPI Vulnerability. (CurveBall/ChainOfFools) | https://github.com/Hans-MartinHannibalLauridsen/CurveBall | POC详情 |
| 21 | PoC for "CurveBall" CVE-2020-0601 | https://github.com/apodlosky/PoC_CurveBall | POC详情 |
| 22 | PoC for CVE-2020-0601 - CryptoAPI exploit | https://github.com/ioncodes/Curveball | POC详情 |
| 23 | proof of concept for CVE-2020-0601 | https://github.com/amlweems/gringotts | POC详情 |
| 24 | PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll) POC: https://github.com/ollypwn/CurveBall | https://github.com/yanghaoi/CVE-2020-0601 | POC详情 |
| 25 | Resources related to CurveBall (CVE-2020-0601) detection | https://github.com/talbeerysec/CurveBallDetection | POC详情 |
| 26 | PoC for CVE-2020-0601 vulnerability (Code Signing) | https://github.com/david4599/CurveballCertTool | POC详情 |
| 27 | 这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油! | https://github.com/eastmountyxz/CVE-2020-0601-EXP | POC详情 |
| 28 | 这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者,自己确实很菜,但希望坚持下去,一起加油! | https://github.com/eastmountyxz/CVE-2018-20250-WinRAR | POC详情 |
| 29 | CVE-2020-0601 proof of concept | https://github.com/gremwell/cve-2020-0601_poc | POC详情 |
| 30 | Materials for the second Rijeka secuity meetup. We will be discussing Microsoft cryptoapi vulnerability dubbed CurveBall (CVE-2020-0601) | https://github.com/bsides-rijeka/meetup-2-curveball | POC详情 |
| 31 | None | https://github.com/exploitblizzard/CVE-2020-0601-spoofkey | POC详情 |
| 32 | Implementing CVE-2020-0601 | https://github.com/ShayNehmad/twoplustwo | POC详情 |
| 33 | None | https://github.com/okanulkr/CurveBall-CVE-2020-0601-PoC | POC详情 |
| 34 | 2017-0021 | https://github.com/cimashiro/-Awesome-CVE-2020-0601- | POC详情 |
| 35 | simulation experiment of Curveball (CVE-2020-0601) attacks under ECQV implicit certificates with Windows-like verifiers | https://github.com/tyj956413282/curveball-plus | POC详情 |
| 36 | Demonstration of CVE-2020-0601 aka curveball. Based on the PoC's available at https://github.com/kudelskisecurity/chainoffools and https://github.com/ly4k/CurveBall | https://github.com/JoelBts/CVE-2020-0601_PoC | POC详情 |
| 37 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20CryptoAPI%20%E6%AC%BA%E9%AA%97%E6%BC%8F%E6%B4%9E%20CVE-2020-0601.md | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论