Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2023-35078

Description

An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.

POC

Reference

No PoCs from references.

Github

- https://github.com/0nsec/0nsec

- https://github.com/0nsec/CVE-2023-35078

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/Blue-number/CVE-2023-35078

- https://github.com/Chocapikk/CVE-2023-35082

- https://github.com/LazyySec/CVE-2023-35078

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Wisdomajoku/Ivanti-VPN-Attack-Case-Study

- https://github.com/Zierax/R-Meth

- https://github.com/ZonghaoLi777/githubTrending

- https://github.com/aneasystone/github-trending

- https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit

- https://github.com/getdrive/CVE-2023-35078

- https://github.com/getdrive/PoC

- https://github.com/gnurtuv/cyber-sim-incident-response

- https://github.com/iluaster/getdrive_PoC

- https://github.com/jgamblin/VI-MCP

- https://github.com/johe123qwe/github-trending

- https://github.com/lager1/CVE-2023-35078

- https://github.com/lazysec0x21/CVE-2023-35078

- https://github.com/netlas-io/netlas-dorks

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/raytheon0x21/CVE-2023-35078

- https://github.com/synfinner/CVE-2023-35078

- https://github.com/vchan-in/CVE-2023-35078-Exploit-POC

- https://github.com/zhanpengliu-tencent/medium-cve

- https://github.com/zulloper/cve-poc