Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1903 for 32-bit Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1903 for x64-based Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1903 for ARM64-based Systems | unspecified | - | |
| Microsoft | Windows Server, version 1903 (Server Core installation) | unspecified | - | |
| Microsoft | Windows 10 Version 1909 for 32-bit Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1909 for x64-based Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1909 for ARM64-based Systems | unspecified | - | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | unspecified | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Ladon Scanner For Python, Large Network Penetration Scanner & Cobalt Strike, vulnerability / exploit / detection / MS17010/SmbGhost/CVE-2020-0796/CVE-2018-2894 | https://github.com/k8gege/PyLadon | POC Details |
| 2 | Weaponized PoC for SMBv3 TCP codec/compression vulnerability | https://github.com/Aekras1a/CVE-2020-0796-PoC | POC Details |
| 3 | CVE-2020-0796 Flaw Mitigation - Active Directory Administrative Templates | https://github.com/technion/DisableSMBCompression | POC Details |
| 4 | Powershell SMBv3 Compression checker | https://github.com/T13nn3s/CVE-2020-0796 | POC Details |
| 5 | Scanner for CVE-2020-0796 - SMBv3 RCE | https://github.com/ly4k/SMBGhost | POC Details |
| 6 | Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1) | https://github.com/joaozietolie/CVE-2020-0796-Checker | POC Details |
| 7 | Identifying and Mitigating the CVE-2020–0796 flaw in the fly | https://github.com/ButrintKomoni/cve-2020-0796 | POC Details |
| 8 | This project is used for scanning cve-2020-0796 SMB vulnerability | https://github.com/dickens88/cve-2020-0796-scanner | POC Details |
| 9 | None | https://github.com/kn6869610/CVE-2020-0796 | POC Details |
| 10 | This repository contains a test case for CVE-2020-0796 | https://github.com/awareseven/eternalghosttest | POC Details |
| 11 | CVE-2020-0796 SMBv3.1.1 Compression Capability Vulnerability Scanner | https://github.com/xax007/CVE-2020-0796-Scanner | POC Details |
| 12 | Scanners List - Microsoft Windows SMBv3 Remote Code Execution Vulnerability (CVE-2020-0796) | https://github.com/Dhoomralochana/Scanners-for-CVE-2020-0796-Testing | POC Details |
| 13 | Check system is vulnerable CVE-2020-0796 (SMB v3) | https://github.com/UraSecTeam/smbee | POC Details |
| 14 | SMBGhost (CVE-2020-0796) threaded scanner | https://github.com/netscylla/SMBGhost | POC Details |
| 15 | PoC for triggering buffer overflow via CVE-2020-0796 | https://github.com/eerykitty/CVE-2020-0796-PoC | POC Details |
| 16 | Scanner script to identify hosts vulnerable to CVE-2020-0796 | https://github.com/wneessen/SMBCompScan | POC Details |
| 17 | Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE | https://github.com/ioncodes/SMBGhost | POC Details |
| 18 | SMBv3 RCE vulnerability in SMBv3 | https://github.com/laolisafe/CVE-2020-0796 | POC Details |
| 19 | Multithread SMB scanner to check CVE-2020-0796 for SMB v3.11 | https://github.com/gabimarti/SMBScanner | POC Details |
| 20 | This script will apply the workaround for the vulnerability CVE-2020-0796 for the SMBv3 unauthenticated RCE | https://github.com/Almorabea/SMBGhost-WorkaroundApplier | POC Details |
| 21 | CVE-2020-0796 - Working PoC - 20200313 | https://github.com/vysecurity/CVE-2020-0796 | POC Details |
| 22 | CVE-2020-0796 SMBGhost | https://github.com/marcinguy/CVE-2020-0796 | POC Details |
| 23 | Little scanner to know if a machine is runnig SMBv3 (possible vulnerability CVE-2020-0796) | https://github.com/BinaryShadow94/SMBv3.1.1-scan---CVE-2020-0796 | POC Details |
| 24 | Advanced scanner for CVE-2020-0796 - SMBv3 RCE | https://github.com/w1ld3r/SMBGhost_Scanner | POC Details |
| 25 | CVE-2020-0796 Python POC buffer overflow | https://github.com/wsfengfan/CVE-2020-0796 | POC Details |
| 26 | 基于asyncio(协程)的CVE-2020-0796 速度还是十分可观的,方便运维师傅们对内网做下快速检测。 | https://github.com/GuoKerS/aioScan_CVE-2020-0796 | POC Details |
| 27 | CVE-2020-0796-Scanner | https://github.com/jiansiting/CVE-2020-0796-Scanner | POC Details |
| 28 | An unauthenticated PoC for CVE-2020-0796 | https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC | POC Details |
| 29 | Lightweight PoC and Scanner for CVE-2020-0796 without authentication. | https://github.com/ran-sama/CVE-2020-0796 | POC Details |
| 30 | CVE-2020-0796_CoronaBlue_SMBGhost | https://github.com/sujitawake/smbghost | POC Details |
| 31 | Scanner for CVE-2020-0796 | https://github.com/julixsalas/CVE-2020-0796 | POC Details |
| 32 | CVE-2020-0796.SMBGhost_Crash_Poc | https://github.com/5l1v3r1/SMBGhost_Crash_Poc | POC Details |
| 33 | Lightweight PoC and Scanner for CVE-2020-0796 without authentication. | https://github.com/5l1v3r1/CVE-2020-0796-PoC-and-Scan | POC Details |
| 34 | DoS PoC for CVE-2020-0796 (SMBGhost) | https://github.com/cory-zajicek/CVE-2020-0796-DoS | POC Details |
| 35 | None | https://github.com/tripledd/cve-2020-0796-vuln | POC Details |
| 36 | CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost | https://github.com/danigargu/CVE-2020-0796 | POC Details |
| 37 | CVE-2020-0796 Local Privilege Escalation POC | https://github.com/jamf/CVE-2020-0796-LPE-POC | POC Details |
| 38 | SMBGHOST local privilege escalation | https://github.com/TinToSer/CVE-2020-0796-LPE | POC Details |
| 39 | Windows SMBv3 LPE exploit 已编译版 | https://github.com/f1tz/CVE-2020-0796-LPE-EXP | POC Details |
| 40 | Coronablue exploit | https://github.com/tango-j/CVE-2020-0796 | POC Details |
| 41 | None | https://github.com/jiansiting/CVE-2020-0796 | POC Details |
| 42 | 该资源为CVE-2020-0796漏洞复现,包括Python版本和C++版本。主要是集合了github大神们的资源,希望您喜欢~ | https://github.com/eastmountyxz/CVE-2020-0796-SMB | POC Details |
| 43 | CVE-2020-0796-EXP | https://github.com/LabDookhtegan/CVE-2020-0796-EXP | POC Details |
| 44 | Cobalt Strike AggressorScripts CVE-2020-0796 | https://github.com/Rvn0xsy/CVE_2020_0796_CNA | POC Details |
| 45 | CVE-2020-0796 (SMBGhost) LPE | https://github.com/0xeb-bp/cve-2020-0796 | POC Details |
| 46 | This tool helps scan large subnets for cve-2020-0796 vulnerable systems | https://github.com/intelliroot-tech/cve-2020-0796-Scanner | POC Details |
| 47 | CVE-2020-0796 Remote Code Execution POC | https://github.com/jamf/CVE-2020-0796-RCE-POC | POC Details |
| 48 | PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost) | https://github.com/thelostworldFree/CVE-2020-0796 | POC Details |
| 49 | None | https://github.com/section-c/CVE-2020-0796 | POC Details |
| 50 | SMBGhost CVE-2020-0796 | https://github.com/bacth0san96/SMBGhostScanner | POC Details |
| 51 | None | https://github.com/halsten/CVE-2020-0796 | POC Details |
| 52 | CVE-2020-0796 | https://github.com/ysyyrps123/CVE-2020-0796 | POC Details |
| 53 | CVE-2020-0796-exp | https://github.com/ysyyrps123/CVE-2020-0796-exp | POC Details |
| 54 | SMBv3 Ghost (CVE-2020-0796) Vulnerability | https://github.com/exp-sky/CVE-2020-0796 | POC Details |
| 55 | SMBGhost (CVE-2020-0796) Automate Exploitation and Detection | https://github.com/Barriuso/SMBGhost_AutomateExploitation | POC Details |
| 56 | 批量测试CVE-2020-0796 - SMBv3 RCE | https://github.com/1060275195/SMBGhost | POC Details |
| 57 | This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework | https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module | POC Details |
| 58 | SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner | https://github.com/jamf/SMBGhost-SMBleed-scanner | POC Details |
| 59 | CVE-2020-0796. Smbghost Local Privilege Escalation | https://github.com/5l1v3r1/smbghost-5 | POC Details |
| 60 | None | https://github.com/rsmudge/CVE-2020-0796-BOF | POC Details |
| 61 | To crash Windows-10 easily | https://github.com/codewithpradhan/SMBGhost-CVE-2020-0796- | POC Details |
| 62 | CVE-2020-0796-POC | https://github.com/AaronCaiii/CVE-2020-0796-POC | POC Details |
| 63 | None | https://github.com/datntsec/CVE-2020-0796 | POC Details |
| 64 | None | https://github.com/MasterSploit/LPE---CVE-2020-0796 | POC Details |
| 65 | None | https://github.com/1stPeak/CVE-2020-0796-Scanner | POC Details |
| 66 | None | https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker | POC Details |
| 67 | None | https://github.com/Opensitoo/cve-2020-0796 | POC Details |
| 68 | Remote Code Execution POC for CVE-2020-0796 | https://github.com/orangmuda/CVE-2020-0796 | POC Details |
| 69 | None | https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC | POC Details |
| 70 | 批量扫描CVE-2020-0796 | https://github.com/F6JO/CVE-2020-0796-Batch-scanning | POC Details |
| 71 | None | https://github.com/lisinan988/CVE-2020-0796-exp | POC Details |
| 72 | CVE-2020-0796 - a wormable SMBv3 vulnerability. | https://github.com/5l1v3r1/CVE-2020-0796-PoC-3 | POC Details |
| 73 | Multithreaded Scanner for CVE-2020-0796 - SMBv3 RCE | https://github.com/5l1v3r1/SMBGhosts | POC Details |
| 74 | Description of Exploit SMBGhost CVE-2020-0796 | https://github.com/vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796- | POC Details |
| 75 | CVE-2020-0796 explanation and researching vulnerability for term porject CENG325 | https://github.com/arzuozkan/CVE-2020-0796 | POC Details |
| 76 | CVE-2020-0796 | https://github.com/SEHandler/CVE-2020-0796 | POC Details |
| 77 | CVE-2020-0796-利用工具 | https://github.com/TweatherQ/CVE-2020-0796 | POC Details |
| 78 | windows 10 SMB vulnerability | https://github.com/krizzz07/CVE-2020-0796 | POC Details |
| 79 | cve-2020-0796利用工具集 | https://github.com/OldDream666/cve-2020-0796 | POC Details |
| 80 | CVE-2020-0796 SMB Ghost vulnerability detection and mitigation | https://github.com/heeloo123/CVE-2020-0796 | POC Details |
| 81 | WindowsProtocolTestSuites is to trigger BSoD, and full exploit poc. | https://github.com/Ajomix/CVE-2020-0796 | POC Details |
| 82 | None | https://github.com/Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC | POC Details |
| 83 | None | https://github.com/hungdnvp/POC-CVE-2020-0796 | POC Details |
| 84 | This script will help you to scan for smbGhost vulnerability(CVE-2020-0796) | https://github.com/AdamSonov/smbGhostCVE-2020-0796 | POC Details |
| 85 | Weaponized PoC for SMBv3 TCP codec/compression vulnerability | https://github.com/0x25bit/CVE-2020-0796-PoC | POC Details |
| 86 | This repository contains detailed documentation and code related to the exploitation, detection, and mitigation of two significant vulnerabilities: CVE-2020-0796 (SMBGhost) and Print Spooler. | https://github.com/z3ena/Exploiting-and-Mitigating-CVE-2020-0796-SMBGhost-and-Print-Spooler-Vulnerabilities | POC Details |
| 87 | WindowsProtocolTestSuites is to trigger BSoD, and full exploit poc. | https://github.com/dungnm24/CVE-2020-0796 | POC Details |
| 88 | None | https://github.com/Kaizzzo1/CVE-2020-0796 | POC Details |
| 89 | None | https://github.com/monjheta/CVE-2020-0796 | POC Details |
| 90 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20SMB%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-0796.md | POC Details |
| 91 | A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2020/CVE-2020-0796.yaml | POC Details |
| 92 | None | https://github.com/madanokr001/CVE-2020-0796 | POC Details |
| 93 | None | https://github.com/tdevworks/CVE-2020-0796-SMBGhost-Exploit-Demo | POC Details |
| 94 | None | https://github.com/maqeel-git/CVE-2020-0796 | POC Details |
| 95 | None | https://github.com/cybermads/CVE-2020-0796 | POC Details |
| 96 | None | https://github.com/esmwaSpyware/DoS-PoC-for-CVE-2020-0796-SMBGhost- | POC Details |
| 97 | None | https://github.com/bsec404/CVE-2020-0796 | POC Details |
| 98 | CVE-2020-0796 (SMBGhost) is a critical RCE vulnerability in Windows 10 SMBv3 protocol. It allows attackers to execute code remotely via crafted SMB packets, making it wormable. Affects Windows 10 v1903/v1909 and Server 2019. Exploit targets srv2.sys via buffer overflow | https://github.com/Jagadeesh7532/-CVE-2020-0796-SMBGhost-Windows-10-SMBv3-Remote-Code-Execution-Vulnerability | POC Details |
| 99 | None | https://github.com/nyambiblaise/Microsoft-Windows-SMBGhost-Vulnerability-Checker---CVE-2020-0796---SMBv3-RCE | POC Details |
| 100 | None | https://github.com/thai1012/cve-2020-0796 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-0811 | Microsoft ChakraCore和Edge 缓冲区错误漏洞 | |
| CVE-2020-0791 | Microsoft Windows Graphics Component 缓冲区错误漏洞 | |
| CVE-2020-0795 | Microsoft Business Productivity Servers、SharePoint Enterprise Server和SharePoint Foundation | |
| CVE-2020-0798 | Microsoft Windows Installer 安全漏洞 | |
| CVE-2020-0797 | Microsoft Windows Work Folder Service 安全漏洞 | |
| CVE-2020-0800 | Microsoft Windows Work Folder Service 安全漏洞 | |
| CVE-2020-0799 | Microsoft Windows Kernel 安全漏洞 | |
| CVE-2020-0802 | Microsoft Windows Network Connections Service 安全漏洞 | |
| CVE-2020-0801 | Microsoft Windows Media Foundation 缓冲区错误漏洞 | |
| CVE-2020-0804 | Microsoft Windows Network Connections Service 安全漏洞 | |
| CVE-2020-0803 | Microsoft Windows Network Connections Service 安全漏洞 | |
| CVE-2020-0807 | Microsoft Windows Media Foundation 缓冲区错误漏洞 | |
| CVE-2020-0806 | Microsoft Windows Error Reporting 安全漏洞 | |
| CVE-2020-0809 | Microsoft Windows Media Foundation 缓冲区错误漏洞 | |
| CVE-2020-0808 | Microsoft Windows Provisioning Runtime 安全漏洞 | |
| CVE-2020-0825 | Microsoft ChakraCore和Edge 缓冲区错误漏洞 | |
| CVE-2020-0816 | Microsoft Edge 缓冲区错误漏洞 | |
| CVE-2020-0823 | Microsoft Edge和ChakraCore 缓冲区错误漏洞 | |
| CVE-2020-0822 | Microsoft Windows 安全漏洞 | |
| CVE-2020-0819 | Microsoft Windows Device Setup Manager 安全漏洞 |
Showing top 20 of 116 CVEs. View all on vendor page → →
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.