尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | VMware vCenter Server | vCenter Server 6.7 (embedded or external PSC) prior to 6.7u3f is affected by CVE-2020-3952 if it was upgraded from a previous release line such as 6.0 or 6.5. Clean installations of vCenter Server 6.7 (embedded or external PSC) are not affected. | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Vuln Check | https://github.com/commandermoon/CVE-2020-3952 | POC详情 |
| 2 | Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell | https://github.com/bb33bb/CVE-2020-3952 | POC详情 |
| 3 | Exploit for CVE-2020-3952 in vCenter 6.7 | https://github.com/guardicore/vmware_vcenter_cve_2020_3952 | POC详情 |
| 4 | VMWare vmdir missing access control exploit checker | https://github.com/gelim/CVE-2020-3952 | POC详情 |
| 5 | Exploit for CVE-2020-3952 in vCenter 6.7 https://www.guardicore.com/2020/04/pwning-vmware-vcenter-cve-2020-3952/ | https://github.com/Fa1c0n35/vmware_vcenter_cve_2020_3952 | POC详情 |
| 6 | Vuln Check | https://github.com/chronoloper/CVE-2020-3952 | POC详情 |
| 7 | Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-3952.yaml | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论