高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The detection script checks if they exist. Provided AS-IS without any warrenty. | https://github.com/Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline | POC詳細 |
| 2 | Recent Campaign abusing CVE-2023-36884 | https://github.com/deepinstinct/Storm0978-RomCom-Campaign | POC詳細 |
| 3 | This is an emergency solution while Microsoft addresses the vulnerability. | https://github.com/zerosorai/CVE-2023-36884 | POC詳細 |
| 4 | Script to check for CVE-2023-36884 hardening | https://github.com/tarraschk/CVE-2023-36884-Checker | POC詳細 |
| 5 | CVE-2023-36884 临时补丁 | https://github.com/or2me/CVE-2023-36884_patcher | POC詳細 |
| 6 | PowerShell Script for initial mitigation of vulnerability | https://github.com/ToddMaxey/CVE-2023-36884 | POC詳細 |
| 7 | None | https://github.com/ridsoliveira/Fix-CVE-2023-36884 | POC詳細 |
| 8 | #comeonits2023 #ie9 #Storm-0978 | https://github.com/raresteak/CVE-2023-36884 | POC詳細 |
| 9 | MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit | https://github.com/jakabakos/CVE-2023-36884-MS-Office-HTML-RCE | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2023-35367 | 9.8 CRITICAL | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2023-35366 | 9.8 CRITICAL | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2023-35365 | 9.8 CRITICAL | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2023-32057 | 9.8 CRITICAL | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
| CVE-2023-33150 | 9.6 CRITICAL | Microsoft Office Security Feature Bypass Vulnerability |
| CVE-2023-32049 | 8.8 HIGH | Windows SmartScreen Security Feature Bypass Vulnerability |
| CVE-2023-33134 | 8.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2023-33157 | 8.8 HIGH | Microsoft SharePoint Remote Code Execution Vulnerability |
| CVE-2023-33159 | 8.8 HIGH | Microsoft SharePoint Server Spoofing Vulnerability |
| CVE-2023-33160 | 8.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2023-35364 | 8.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2023-35333 | 8.8 HIGH | MediaWiki PandocUpload Extension Remote Code Execution Vulnerability |
| CVE-2023-35300 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2023-35302 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-35303 | 8.8 HIGH | USB Audio Class System Driver Remote Code Execution Vulnerability |
| CVE-2023-32038 | 8.8 HIGH | Microsoft ODBC Driver Remote Code Execution Vulnerability |
| CVE-2023-35311 | 8.8 HIGH | Microsoft Outlook Security Feature Bypass Vulnerability |
| CVE-2023-35315 | 8.8 HIGH | Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability |
| CVE-2023-35322 | 8.8 HIGH | Windows Deployment Services Remote Code Execution Vulnerability |
| CVE-2023-29347 | 8.7 HIGH | Windows Admin Center Spoofing Vulnerability |
Showing 20 of 131 CVEs. View all on vendor page →
まだコメントはありません