尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1803 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1709 for 32-bit Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1709 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1903 for 32-bit Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1903 for x64-based Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1903 for ARM64-based Systems | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | |
| Microsoft | Windows Server, version 1903 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1507 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 1607 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* | |
| Microsoft | Windows 7 | 6.1.0 ~ publication | cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:* | |
| Microsoft | Windows 7 Service Pack 1 | 6.1.0 ~ publication | cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:* | |
| Microsoft | Windows 8.1 | 6.3.0 ~ publication | cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ publication | cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:* |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
未找到公开 POC。
登录以生成 AI POC| CVE-2020-1080 | 8.8 HIGH | Microsoft Windows Hyper-V 缓冲区错误漏洞 |
| CVE-2020-16898 | 8.8 HIGH | Microsoft Windows tcp/ip 安全漏洞 |
| CVE-2020-16911 | 8.8 HIGH | Microsoft Windows 图形设备接口 (GDI) 代码问题漏洞 |
| CVE-2020-16891 | 8.8 HIGH | Microsoft Windows Hyper-V 输入验证错误漏洞 |
| CVE-2020-16946 | 8.7 HIGH | Microsoft SharePoint Server 跨站脚本漏洞 |
| CVE-2020-16945 | 8.7 HIGH | Microsoft SharePoint Server 跨站脚本漏洞 |
| CVE-2020-16944 | 8.7 HIGH | Microsoft SharePoint 跨站脚本漏洞 |
| CVE-2020-16952 | 8.6 HIGH | Microsoft SharePoint 访问控制错误漏洞 |
| CVE-2020-16951 | 8.6 HIGH | Microsoft SharePoint 访问控制错误漏洞 |
| CVE-2020-16935 | 7.8 HIGH | Microsoft Windows 授权问题漏洞 |
| CVE-2020-16954 | 7.8 HIGH | Microsoft Office 缓冲区错误漏洞 |
| CVE-2020-16940 | 7.8 HIGH | Microsoft Windows 授权问题漏洞 |
| CVE-2020-16939 | 7.8 HIGH | Microsoft Windows 授权问题漏洞 |
| CVE-2020-16936 | 7.8 HIGH | Microsoft Windows 备份服务安全漏洞 |
| CVE-2020-16930 | 7.8 HIGH | Microsoft Excel 缓冲区错误漏洞 |
| CVE-2020-16929 | 7.8 HIGH | Microsoft Excel 资源管理错误漏洞 |
| CVE-2020-16928 | 7.8 HIGH | Microsoft Office 授权问题漏洞 |
| CVE-2020-16924 | 7.8 HIGH | Microsoft Windows Jet 数据库引擎缓冲区错误漏洞 |
| CVE-2020-16931 | 7.8 HIGH | Microsoft Excel 安全漏洞 |
| CVE-2020-16967 | 7.8 HIGH | Microsoft Windows 缓冲区错误漏洞 |
显示前 20 条,共 89 条。 查看全部 → →
暂无评论