Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The detection script checks if they exist. Provided AS-IS without any warrenty. | https://github.com/Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline | POC Details |
| 2 | Recent Campaign abusing CVE-2023-36884 | https://github.com/deepinstinct/Storm0978-RomCom-Campaign | POC Details |
| 3 | This is an emergency solution while Microsoft addresses the vulnerability. | https://github.com/zerosorai/CVE-2023-36884 | POC Details |
| 4 | Script to check for CVE-2023-36884 hardening | https://github.com/tarraschk/CVE-2023-36884-Checker | POC Details |
| 5 | CVE-2023-36884 临时补丁 | https://github.com/or2me/CVE-2023-36884_patcher | POC Details |
| 6 | PowerShell Script for initial mitigation of vulnerability | https://github.com/ToddMaxey/CVE-2023-36884 | POC Details |
| 7 | None | https://github.com/ridsoliveira/Fix-CVE-2023-36884 | POC Details |
| 8 | #comeonits2023 #ie9 #Storm-0978 | https://github.com/raresteak/CVE-2023-36884 | POC Details |
| 9 | MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit | https://github.com/jakabakos/CVE-2023-36884-MS-Office-HTML-RCE | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-35367 | 9.8 CRITICAL | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2023-35366 | 9.8 CRITICAL | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2023-35365 | 9.8 CRITICAL | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2023-32057 | 9.8 CRITICAL | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
| CVE-2023-33150 | 9.6 CRITICAL | Microsoft Office Security Feature Bypass Vulnerability |
| CVE-2023-32049 | 8.8 HIGH | Windows SmartScreen Security Feature Bypass Vulnerability |
| CVE-2023-33134 | 8.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2023-33157 | 8.8 HIGH | Microsoft SharePoint Remote Code Execution Vulnerability |
| CVE-2023-33159 | 8.8 HIGH | Microsoft SharePoint Server Spoofing Vulnerability |
| CVE-2023-33160 | 8.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2023-35364 | 8.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2023-35333 | 8.8 HIGH | MediaWiki PandocUpload Extension Remote Code Execution Vulnerability |
| CVE-2023-35300 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2023-35302 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-35303 | 8.8 HIGH | USB Audio Class System Driver Remote Code Execution Vulnerability |
| CVE-2023-32038 | 8.8 HIGH | Microsoft ODBC Driver Remote Code Execution Vulnerability |
| CVE-2023-35311 | 8.8 HIGH | Microsoft Outlook Security Feature Bypass Vulnerability |
| CVE-2023-35315 | 8.8 HIGH | Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability |
| CVE-2023-35322 | 8.8 HIGH | Windows Deployment Services Remote Code Execution Vulnerability |
| CVE-2023-29347 | 8.7 HIGH | Windows Admin Center Spoofing Vulnerability |
Showing top 20 of 131 CVEs. View all on vendor page → →
No comments yet