Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Ivanti | Endpoint Manager Mobile | 11.10 ~ 11.10 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC | https://github.com/vchan-in/CVE-2023-35078-Exploit-POC | POC Details |
| 2 | Proof of concept script to check if the site is vulnerable to CVE-2023-35078 | https://github.com/lager1/CVE-2023-35078 | POC Details |
| 3 | Tools to scanner & exploit cve-2023-35078 | https://github.com/lazysec0x21/CVE-2023-35078 | POC Details |
| 4 | Easy and non-intrusive script to check for CVE-2023-35078 | https://github.com/synfinner/CVE-2023-35078 | POC Details |
| 5 | Nmap script to exploit CVE-2023-35078 - Mobile Iron Core | https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit | POC Details |
| 6 | Ivanti Endpoint Manager Mobile (EPMM) POC | https://github.com/Blue-number/CVE-2023-35078 | POC Details |
| 7 | Tools to scanner & exploit cve-2023-35078 | https://github.com/raytheon0x21/CVE-2023-35078 | POC Details |
| 8 | CVE-2023-35078 Remote Unauthenticated API Access vulnerability has been discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. | https://github.com/0nsec/CVE-2023-35078 | POC Details |
| 9 | Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, through 11.10 allows remote attackers to obtain PII, add an administrative account, and change the configuration because of an authentication bypass, as exploited in the wild in July 2023. A patch is available. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-35078.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet