cve/2020/CVE-2020-0609.md

66 lines
2.9 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-0609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0609)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brighgreen)
### Description
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0610.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Archi73ct/CVE-2020-0609
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CnHack3r/Penetration_PoC
2024-05-27 13:12:02 +00:00
- https://github.com/Cruxer8Mech/Idk
2024-05-25 21:48:12 +02:00
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/GhostTroops/TOP
- https://github.com/JERRY123S/all-poc
- https://github.com/MalwareTech/RDGScanner
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Sh0ckFR/Infosec-Useful-Stuff
- https://github.com/SofianeHamlaoui/Conti-Clear
2024-06-07 04:52:01 +00:00
- https://github.com/Tyro-Shan/gongkaishouji
2024-05-25 21:48:12 +02:00
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
2024-05-27 13:12:02 +00:00
- https://github.com/ZTK-009/Penetration_PoC
2024-05-25 21:48:12 +02:00
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/deut-erium/inter-iit-netsec
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/ioncodes/BlueGate
- https://github.com/ioncodes/ioncodes
- https://github.com/jbmihoub/all-poc
- https://github.com/k0imet/CVE-POCs
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lnick2023/nicenice
- https://github.com/ly4k/BlueGate
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ruppde/rdg_scanner_cve-2020-0609
- https://github.com/ruppde/scan_CVE-2020-29583
- https://github.com/soosmile/POC
- https://github.com/stalker3343/diplom
- https://github.com/trganda/starrlist
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji