mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 11:06:19 +00:00
4.6 KiB
4.6 KiB
CVE-2020-1350
Description
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.
POC
Reference
- http://packetstormsecurity.com/files/158484/SIGRed-Windows-DNS-Denial-Of-Service.html
- http://packetstormsecurity.com/files/158484/SIGRed-Windows-DNS-Denial-Of-Service.html
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/20142995/sectool
- https://github.com/2lambda123/diaphora
- https://github.com/5l1v3r1/CVE-2020-1350-checker.ps1
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEmaster/CVE-2020-1350
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/Cruxer8Mech/Idk
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/EvilAnne/2020-Read-article
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Plazmaz/CVE-2020-1350-poc
- https://github.com/Secuora-Org/CVE-2020-1350-checker.ps1
- https://github.com/SexyBeast233/SecBooks
- https://github.com/T13nn3s/CVE-2020-1350
- https://github.com/TheCyberViking/Insider_Threat_Bait
- https://github.com/TrinityCryptx/OSCP-Resources
- https://github.com/Tyro-Shan/gongkaishouji
- https://github.com/WinMin/Protocol-Vul
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/ZephrFish/CVE-2020-1350_HoneyPoC
- https://github.com/ZephrFish/CVE-2020-16898
- https://github.com/ZephrFish/CVE-2021-22893_HoneyPoC2
- https://github.com/ZephrFish/CVE-2021-28480_HoneyPoC3
- https://github.com/adarshshetty1/content
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/bhdresh/SnortRules
- https://github.com/captainGeech42/CVE-2020-1350
- https://github.com/chef/windows-dns-SIGRed
- https://github.com/chompie1337/SIGRed_RCE_PoC
- https://github.com/connormcgarr/CVE-2020-1350
- https://github.com/corelight/SIGRed
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dnif/content
- https://github.com/dtomic-ftnt/solution-pack-ips-alert-triage
- https://github.com/fortinet-fortisoar/solution-pack-ips-alert-triage
- https://github.com/gdwnet/cve-2020-1350
- https://github.com/graph-inc/CVE-2020-1350
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/huike007/penetration_poc
- https://github.com/iamramahibrah/NSE-Scripts
- https://github.com/jmaddington/dRMM-CVE-2020-1350-response
- https://github.com/joxeankoret/diaphora
- https://github.com/joydo/2020ReadingLists
- https://github.com/kileadams1/Project-Management-Range-Lab
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/maxpl0it/CVE-2020-1350-DoS
- https://github.com/mr-r3b00t/CVE-2020-1350
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/psc4re/NSE-scripts
- https://github.com/rudraimmunefi/source-code-review
- https://github.com/rudrapwn/source-code-review
- https://github.com/simeononsecurity/CVE-2020-1350-Fix
- https://github.com/soosmile/POC
- https://github.com/tinkersec/cve-2020-1350
- https://github.com/tobor88/PowerShell-Blue-Team
- https://github.com/tolgadevsec/Awesome-Deception
- https://github.com/tzwlhack/Vulnerability
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji
- https://github.com/zoomerxsec/Fake_CVE-2020-1350