mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 03:02:30 +00:00
36 lines
1.5 KiB
Markdown
36 lines
1.5 KiB
Markdown
![]() |
### [CVE-2023-35078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35078)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/Blue-number/CVE-2023-35078
|
||
|
- https://github.com/Chocapikk/CVE-2023-35082
|
||
|
- https://github.com/LazyySec/CVE-2023-35078
|
||
|
- https://github.com/Ostorlab/KEV
|
||
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||
|
- https://github.com/ZonghaoLi777/githubTrending
|
||
|
- https://github.com/aneasystone/github-trending
|
||
|
- https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit
|
||
|
- https://github.com/getdrive/CVE-2023-35078
|
||
|
- https://github.com/getdrive/PoC
|
||
|
- https://github.com/iluaster/getdrive_PoC
|
||
|
- https://github.com/johe123qwe/github-trending
|
||
|
- https://github.com/lager1/CVE-2023-35078
|
||
|
- https://github.com/lazysec0x21/CVE-2023-35078
|
||
|
- https://github.com/netlas-io/netlas-dorks
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/raytheon0x21/CVE-2023-35078
|
||
|
- https://github.com/synfinner/CVE-2023-35078
|
||
|
- https://github.com/vchan-in/CVE-2023-35078-Exploit-POC
|
||
|
|