Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1803 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1709 for 32-bit Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1709 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1903 for 32-bit Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1903 for x64-based Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1903 for ARM64-based Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | |
| Microsoft | Windows Server, version 1903 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule | https://github.com/advanced-threat-research/CVE-2020-16898 | POC Details |
| 2 | A network detection package for CVE-2020-16898 (Windows TCP/IP Remote Code Execution Vulnerability) | https://github.com/corelight/CVE-2020-16898 | POC Details |
| 3 | Minor powershell script that checks for vulnerable interfaces. | https://github.com/Maliek/CVE-2020-16898_Check | POC Details |
| 4 | HoneyPoC 2.0: Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898). | https://github.com/ZephrFish/CVE-2020-16898 | POC Details |
| 5 | Detects CVE-2020-16898: "Bad Neighbor" | https://github.com/esnet-security/cve-2020-16898 | POC Details |
| 6 | Zeek detection for CVE-2020-16898-"Bad Neighbor" | https://github.com/initconf/CVE-2020-16898-Bad-Neighbor | POC Details |
| 7 | PoC Bad Neighbor BSOD exploit | https://github.com/Q1984/CVE-2020-16898 | POC Details |
| 8 | PoC BSOD for CVE-2020-16898 (badneighbor) | https://github.com/0xeb-bp/cve-2020-16898 | POC Details |
| 9 | PoC BSOD for CVE-2020-16898 | https://github.com/jiansiting/cve-2020-16898 | POC Details |
| 10 | PowerShell Script Workaround for VCE-220-16898 Vulnerability | https://github.com/CPO-EH/CVE-2020-16898_Workaround | POC Details |
| 11 | Check all Network Interfaces for CVE-2020-16898 Vulnerability | https://github.com/CPO-EH/CVE-2020-16898_Checker | POC Details |
| 12 | None | https://github.com/momika233/CVE-2020-16898-exp | POC Details |
| 13 | CVE-2020-16898 Windows TCP/IP远程代码执行漏洞 EXP&POC | https://github.com/komomon/CVE-2020-16898-EXP-POC | POC Details |
| 14 | CVE-2020-16898 Windows TCP/IP远程代码执行漏洞 EXP&POC | https://github.com/komomon/CVE-2020-16898--EXP-POC | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-1080 | 8.8 HIGH | Windows Hyper-V Elevation of Privilege Vulnerability |
| CVE-2020-16911 | 8.8 HIGH | GDI+ Remote Code Execution Vulnerability |
| CVE-2020-16891 | 8.8 HIGH | Windows Hyper-V Remote Code Execution Vulnerability |
| CVE-2020-16946 | 8.7 HIGH | Microsoft Office SharePoint XSS Vulnerability |
| CVE-2020-16945 | 8.7 HIGH | Microsoft Office SharePoint XSS Vulnerability |
| CVE-2020-16944 | 8.7 HIGH | Microsoft SharePoint Reflective XSS Vulnerability |
| CVE-2020-16952 | 8.6 HIGH | Microsoft SharePoint Remote Code Execution Vulnerability |
| CVE-2020-16951 | 8.6 HIGH | Microsoft SharePoint Remote Code Execution Vulnerability |
| CVE-2020-16931 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2020-16954 | 7.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2020-16939 | 7.8 HIGH | Group Policy Elevation of Privilege Vulnerability |
| CVE-2020-16936 | 7.8 HIGH | Windows Backup Service Elevation of Privilege Vulnerability |
| CVE-2020-16935 | 7.8 HIGH | Windows COM Server Elevation of Privilege Vulnerability |
| CVE-2020-16929 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2020-16928 | 7.8 HIGH | Microsoft Office Click-to-Run Elevation of Privilege Vulnerability |
| CVE-2020-16924 | 7.8 HIGH | Jet Database Engine Remote Code Execution Vulnerability |
| CVE-2020-16923 | 7.8 HIGH | Microsoft Graphics Components Remote Code Execution Vulnerability |
| CVE-2020-16930 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2020-16940 | 7.8 HIGH | Windows - User Profile Service Elevation of Privilege Vulnerability |
| CVE-2020-16957 | 7.8 HIGH | Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability |
Showing top 20 of 89 CVEs. View all on vendor page → →
No comments yet