尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows Server | 2019 | - | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | unspecified | - | |
| Microsoft | Windows Server, version 1903 (Server Core installation) | unspecified | - | |
| Microsoft | Windows Server, version 2004 (Server Core installation) | unspecified | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019. | https://github.com/ZephrFish/CVE-2020-1350_HoneyPoC | POC详情 |
| 2 | None | https://github.com/mr-r3b00t/CVE-2020-1350 | POC详情 |
| 3 | Fake exploit tool, designed to rickroll users attempting to actually exploit. | https://github.com/zoomerxsec/Fake_CVE-2020-1350 | POC详情 |
| 4 | This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service | https://github.com/T13nn3s/CVE-2020-1350 | POC详情 |
| 5 | Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed) | https://github.com/corelight/SIGRed | POC详情 |
| 6 | Windows registry mitigation response to CVE-2020-1350 | https://github.com/jmaddington/dRMM-CVE-2020-1350-response | POC详情 |
| 7 | A denial-of-service proof-of-concept for CVE-2020-1350 | https://github.com/maxpl0it/CVE-2020-1350-DoS | POC详情 |
| 8 | Denial of Service PoC for CVE-2020-1350 (SIGRed) | https://github.com/captainGeech42/CVE-2020-1350 | POC详情 |
| 9 | CVE-2020-1350 Proof-of-Concept | https://github.com/connormcgarr/CVE-2020-1350 | POC详情 |
| 10 | Scanner and Mitigator for CVE 2020-1350 | https://github.com/graph-inc/CVE-2020-1350 | POC详情 |
| 11 | DNS Vulnerability - CVE-2020-1350 | https://github.com/CVEmaster/CVE-2020-1350 | POC详情 |
| 12 | A powershell script to deploy the registry mitigation key for CVE-2020-1350 | https://github.com/gdwnet/cve-2020-1350 | POC详情 |
| 13 | A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence. | https://github.com/simeononsecurity/CVE-2020-1350-Fix | POC详情 |
| 14 | Comprueba si su servidor DNS es vulnerable a la ejecución remota de código. | https://github.com/5l1v3r1/CVE-2020-1350-checker.ps1 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论