An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
No PoCs from references.
- https://github.com/0nsec/0nsec
- https://github.com/0nsec/CVE-2023-35078
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/Blue-number/CVE-2023-35078
- https://github.com/Chocapikk/CVE-2023-35082
- https://github.com/LazyySec/CVE-2023-35078
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/Wisdomajoku/Ivanti-VPN-Attack-Case-Study
- https://github.com/Zierax/R-Meth
- https://github.com/ZonghaoLi777/githubTrending
- https://github.com/aneasystone/github-trending
- https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit
- https://github.com/getdrive/CVE-2023-35078
- https://github.com/getdrive/PoC
- https://github.com/gnurtuv/cyber-sim-incident-response
- https://github.com/iluaster/getdrive_PoC
- https://github.com/jgamblin/VI-MCP
- https://github.com/johe123qwe/github-trending
- https://github.com/lager1/CVE-2023-35078
- https://github.com/lazysec0x21/CVE-2023-35078
- https://github.com/netlas-io/netlas-dorks
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/raytheon0x21/CVE-2023-35078
- https://github.com/synfinner/CVE-2023-35078
- https://github.com/vchan-in/CVE-2023-35078-Exploit-POC
- https://github.com/zhanpengliu-tencent/medium-cve
- https://github.com/zulloper/cve-poc