Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows Server | 2019 | - | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | unspecified | - | |
| Microsoft | Windows Server, version 1903 (Server Core installation) | unspecified | - | |
| Microsoft | Windows Server, version 2004 (Server Core installation) | unspecified | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019. | https://github.com/ZephrFish/CVE-2020-1350_HoneyPoC | POC Details |
| 2 | None | https://github.com/mr-r3b00t/CVE-2020-1350 | POC Details |
| 3 | Fake exploit tool, designed to rickroll users attempting to actually exploit. | https://github.com/zoomerxsec/Fake_CVE-2020-1350 | POC Details |
| 4 | This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service | https://github.com/T13nn3s/CVE-2020-1350 | POC Details |
| 5 | Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed) | https://github.com/corelight/SIGRed | POC Details |
| 6 | Windows registry mitigation response to CVE-2020-1350 | https://github.com/jmaddington/dRMM-CVE-2020-1350-response | POC Details |
| 7 | A denial-of-service proof-of-concept for CVE-2020-1350 | https://github.com/maxpl0it/CVE-2020-1350-DoS | POC Details |
| 8 | Denial of Service PoC for CVE-2020-1350 (SIGRed) | https://github.com/captainGeech42/CVE-2020-1350 | POC Details |
| 9 | CVE-2020-1350 Proof-of-Concept | https://github.com/connormcgarr/CVE-2020-1350 | POC Details |
| 10 | Scanner and Mitigator for CVE 2020-1350 | https://github.com/graph-inc/CVE-2020-1350 | POC Details |
| 11 | DNS Vulnerability - CVE-2020-1350 | https://github.com/CVEmaster/CVE-2020-1350 | POC Details |
| 12 | A powershell script to deploy the registry mitigation key for CVE-2020-1350 | https://github.com/gdwnet/cve-2020-1350 | POC Details |
| 13 | A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence. | https://github.com/simeononsecurity/CVE-2020-1350-Fix | POC Details |
| 14 | Comprueba si su servidor DNS es vulnerable a la ejecución remota de código. | https://github.com/5l1v3r1/CVE-2020-1350-checker.ps1 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-1336 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2020-1429 | Microsoft Windows Error Reporting Manager 安全漏洞 | |
| CVE-2020-1430 | Microsoft Windows UPnP 安全漏洞 | |
| CVE-2020-1428 | Microsoft Windows Network Connections Service 安全漏洞 | |
| CVE-2020-1427 | Microsoft Windows Network Connections Service 安全漏洞 | |
| CVE-2020-1426 | Microsoft Windows Kernel 信息泄露漏洞 | |
| CVE-2020-1424 | Microsoft Windows Update Stack 安全漏洞 | |
| CVE-2020-1423 | Microsoft Windows Subsystem for Linux 安全漏洞 | |
| CVE-2020-1422 | Microsoft Windows Runtime 安全漏洞 | |
| CVE-2020-1421 | Microsoft Windows 安全漏洞 | |
| CVE-2020-1420 | Microsoft Windows Error Reporting 信息泄露漏洞 | |
| CVE-2020-1419 | Microsoft Windows Kernel 缓冲区错误漏洞 | |
| CVE-2020-1418 | Microsoft Windows Diagnostics Execution Service 输入验证错误漏洞 | |
| CVE-2020-1416 | Microsoft Visual Studio和Visual Studio Code 安全漏洞 | |
| CVE-2020-1415 | Microsoft Windows Runtime 安全漏洞 | |
| CVE-2020-1414 | Microsoft Windows Runtime 安全漏洞 | |
| CVE-2020-1413 | Microsoft Windows Runtime 安全漏洞 | |
| CVE-2020-1403 | Microsoft Internet Explorer VBScript Engine 缓冲区错误漏洞 | |
| CVE-2020-1402 | Microsoft Windows ActiveX Installer Service 安全漏洞 | |
| CVE-2020-1401 | Microsoft Jet Database Engine 缓冲区错误漏洞 |
Showing top 20 of 123 CVEs. View all on vendor page → →
No comments yet