尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1803 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1709 for 32-bit Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1709 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1903 for 32-bit Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1903 for x64-based Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1903 for ARM64-based Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | |
| Microsoft | Windows Server, version 1903 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:* |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule | https://github.com/advanced-threat-research/CVE-2020-16898 | POC详情 |
| 2 | A network detection package for CVE-2020-16898 (Windows TCP/IP Remote Code Execution Vulnerability) | https://github.com/corelight/CVE-2020-16898 | POC详情 |
| 3 | Minor powershell script that checks for vulnerable interfaces. | https://github.com/Maliek/CVE-2020-16898_Check | POC详情 |
| 4 | HoneyPoC 2.0: Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898). | https://github.com/ZephrFish/CVE-2020-16898 | POC详情 |
| 5 | Detects CVE-2020-16898: "Bad Neighbor" | https://github.com/esnet-security/cve-2020-16898 | POC详情 |
| 6 | Zeek detection for CVE-2020-16898-"Bad Neighbor" | https://github.com/initconf/CVE-2020-16898-Bad-Neighbor | POC详情 |
| 7 | PoC Bad Neighbor BSOD exploit | https://github.com/Q1984/CVE-2020-16898 | POC详情 |
| 8 | PoC BSOD for CVE-2020-16898 (badneighbor) | https://github.com/0xeb-bp/cve-2020-16898 | POC详情 |
| 9 | PoC BSOD for CVE-2020-16898 | https://github.com/jiansiting/cve-2020-16898 | POC详情 |
| 10 | PowerShell Script Workaround for VCE-220-16898 Vulnerability | https://github.com/CPO-EH/CVE-2020-16898_Workaround | POC详情 |
| 11 | Check all Network Interfaces for CVE-2020-16898 Vulnerability | https://github.com/CPO-EH/CVE-2020-16898_Checker | POC详情 |
| 12 | None | https://github.com/momika233/CVE-2020-16898-exp | POC详情 |
| 13 | CVE-2020-16898 Windows TCP/IP远程代码执行漏洞 EXP&POC | https://github.com/komomon/CVE-2020-16898-EXP-POC | POC详情 |
| 14 | CVE-2020-16898 Windows TCP/IP远程代码执行漏洞 EXP&POC | https://github.com/komomon/CVE-2020-16898--EXP-POC | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论