{"vulnerability": "CVE-2023-3674", "sightings": [{"uuid": "82c0b54d-4b76-42dd-8514-efc54b762d6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36744", "type": "seen", "source": "https://www.thezdi.com/blog/2024/9/18/exploiting-exchange-powershell-after-proxynotshell-part-3-dll-loading-chain-for-rce", "content": "", "creation_timestamp": "2024-09-19T18:02:10.000000Z"}, {"uuid": "2ad829a0-9571-4c28-ad27-3bb3f1db86f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://www.thezdi.com/blog/2024/9/18/exploiting-exchange-powershell-after-proxynotshell-part-3-dll-loading-chain-for-rce", "content": "", "creation_timestamp": "2024-09-19T18:02:10.000000Z"}, {"uuid": "b9c84f4a-ce72-4abd-b707-57d17cf1440b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://www.thezdi.com/blog/2024/9/11/exploiting-exchange-powershell-after-proxynotshell-part-2-approvedapplicationcollection", "content": "", "creation_timestamp": "2024-09-12T15:00:00.000000Z"}, {"uuid": "180f2260-c6f0-4cf5-96ae-b79e962bb1c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://infosec.exchange/users/saltmyhash/statuses/114039171548967342", "content": "", "creation_timestamp": "2025-02-21T01:01:38.686691Z"}, {"uuid": "8f8e0842-cdf3-454b-be7b-071885fcf3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/92582bf5-d92c-47fe-b891-656d271bbfef", "content": "", "creation_timestamp": "2024-10-14T15:50:35.983245Z"}, {"uuid": "ba285097-daa8-41b6-afee-71219f38d962", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/fdda4963-0aa7-4d15-8a8f-969db8f304ca", "content": "", "creation_timestamp": "2025-02-28T23:49:13.272798Z"}, {"uuid": "d762d3fd-6200-40e5-8595-3fdfcf6513e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/157", "content": "\u2604\ufe0fCVE-2023-36745: MS Exchange Server Privilege Escalation\n\n\ud83d\udce3\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 PoC:\nhttps://github.com/N1k0la-T/CVE-2023-36745/blob/main/exp.py\n\n#cve #poc #exploit", "creation_timestamp": "2023-10-25T06:48:00.000000Z"}, {"uuid": "dcee1d47-0b57-4354-8bb4-fdae8ca8bb56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/49", "content": "CVE-2023-36745: Microsoft Exchange Server RCE\n#CVE-2023-36745\n\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/\n\nPoC: https://github.com/N1k0la-T/CVE-2023-36745", "creation_timestamp": "2023-10-25T15:48:08.000000Z"}, {"uuid": "a86b4fba-c935-4c67-a5e0-a0d9433d8730", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36743", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11719", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-36743\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Win32k Elevation of Privilege Vulnerability\n\ud83d\udccf Published: 2023-10-10T17:08:13.184Z\n\ud83d\udccf Modified: 2025-04-14T22:46:45.204Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36743", "creation_timestamp": "2025-04-14T22:53:43.000000Z"}, {"uuid": "84254833-d23b-4345-b564-295b30401765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/215", "content": "\u2604\ufe0fCVE-2023-36745: MS Exchange Server Privilege Escalation\n\n\ud83d\udce3\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 PoC:\nhttps://github.com/N1k0la-T/CVE-2023-36745/blob/main/exp.py\n\n#cve #poc #exploit", "creation_timestamp": "2023-10-25T06:48:00.000000Z"}, {"uuid": "432ca6a4-0be3-4966-b8c3-a4e278eba4de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/bh_cat/188", "content": "\ud83d\udcd5 \u041f\u043e\u0434\u0431\u043e\u0440\u043e\u0447\u043a\u0430 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\u042d\u0442\u043e \u043f\u0440\u043e\u0431\u043d\u0438\u043a.\n\n\ud83d\udca1 F5 BIG-IP Unauth RCE via AJP Smuggling\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\nCVE-2023-46747\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x:\n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u0438\u043c\u0435\u044e\u0449\u0438\u043c \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0435 BIG-IP \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u0440\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438/\u0438\u043b\u0438 \u0441\u0430\u043c\u043e\u043f\u0438\u0441\u043d\u044b\u0435 \u0430\u0434\u0440\u0435\u0441\u0430, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\n\n\n\ud83d\udca1 ActiveMQ Remote Code Execution\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\nCVE-2023-46604\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x:\n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435: \n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u0438\u043c\u0435\u044e\u0449\u0435\u043c\u0443 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0431\u0440\u043e\u043a\u0435\u0440\u0443, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438, \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u0443\u044f \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u043c\u0438 \u0442\u0438\u043f\u0430\u043c\u0438 \u043a\u043b\u0430\u0441\u0441\u043e\u0432 \u0432 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 OpenWire, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0431\u0440\u043e\u043a\u0435\u0440 \u0438\u043d\u0441\u0442\u0430\u043d\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043b\u044e\u0431\u043e\u0439 \u043a\u043b\u0430\u0441\u0441 \u0432 \u043f\u0443\u0442\u0438 \u043a\u043b\u0430\u0441\u0441\u0430.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\n\n\ud83d\udca1 \u041f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 UI Cisco IOS XE\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\n- CVE-2023-20198\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x: \n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e, \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0443\u0447\u0435\u0442\u043d\u0443\u044e \u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0441 \u0443\u0440\u043e\u0432\u043d\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 15.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\n\n\ud83d\udca1 Microsoft Exchange Server Remote Code Execution\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\nCVE-2023-36745\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x:\n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0438 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u0436\u0435\u0440\u0442\u0432\u044b, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u0440\u043e\u0441\u0442\u043e\u044e \u0446\u0435\u043b\u0435\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\n#poc", "creation_timestamp": "2023-11-10T10:57:44.000000Z"}, {"uuid": "f285c374-9410-4da8-bc22-596693894e8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "Telegram/qQDf_QbEQjFZp0Et7iiynljt2UEc3wP6rjcNCRIVxu0TNg", "content": "", "creation_timestamp": "2023-10-25T16:40:53.000000Z"}, {"uuid": "d860e60a-e66c-46f3-92f4-ffe50787543d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "Telegram/yGvj5EX2z2XHKM-IYEdTm5WzR8ebYOvYFlvF8VjTE_nHLw", "content": "", "creation_timestamp": "2023-11-05T14:35:46.000000Z"}, {"uuid": "b1f5d5f9-db94-4114-91e5-f6b9e1b91b69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "Telegram/ONdo6kSSiubBTLR9b8SYjF-HZGmrQ_i9_RMV50j7MrWMBQ", "content": "", "creation_timestamp": "2023-11-06T03:38:30.000000Z"}, {"uuid": "505451cb-20de-449b-abc3-2677ee2a2c1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "Telegram/9WEmnZW4gUShi36wFEKo_YOHGbW19JX5QBHeFT8hui0CLA", "content": "", "creation_timestamp": "2023-10-30T09:48:09.000000Z"}, {"uuid": "a1d744e8-01ac-4973-8b10-15d20f19eeeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3468", "content": "https://n1k0la-t.github.io/2023/10/24/Microsoft-Exchange-Server-CVE-2023-36745/\n\n\nMicrosoft Exchange Server CVE-2023-36745", "creation_timestamp": "2023-10-25T09:52:31.000000Z"}, {"uuid": "71825c9d-9ff8-4422-9edd-4ddc56f3b454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://t.me/proxy_bar/1792", "content": "CVE-2023-36745\nMS Exchange Server Privilege Escalation\nexploit\n\n#exchange", "creation_timestamp": "2023-10-24T11:59:19.000000Z"}, {"uuid": "0f5c5dda-0c46-4be4-a3ad-3518ac2cde10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "exploited", "source": "Telegram/6gYyVdYl9-acnpuiEjII8H8v4M_oiONGf4arKd-1SLHQ94Y", "content": "", "creation_timestamp": "2023-10-31T06:46:02.000000Z"}, {"uuid": "0fde0648-26ca-4cbe-95fd-1fe816691d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "Telegram/eT8lMd0FVqqzyqxvxxgy4aEJ6RyNZWYIkxnyBxpQJJeAfMc", "content": "", "creation_timestamp": "2023-10-30T06:40:45.000000Z"}, {"uuid": "b2338b13-1c7f-41e6-859e-1b3274acfab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "Telegram/-f6CeRaW6J5lkXzlSrItVf3Yey54YrCECLLw-B0K8lNtBx0", "content": "", "creation_timestamp": "2023-10-24T04:52:48.000000Z"}, {"uuid": "4298ce00-1da3-4069-aac8-b355164e8752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1402", "content": "CVE-2023-36745: Microsoft Exchange Server RCE\n\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/\n\nPoC: https://github.com/N1k0la-T/CVE-2023-36745\n\n#exploit #ad #redteam #pentest", "creation_timestamp": "2023-10-24T23:32:39.000000Z"}, {"uuid": "b212b70e-eaf2-4c0e-a07a-fdf48a5da964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://t.me/cibsecurity/70305", "content": "\u203c CVE-2023-36745 \u203c\n\nMicrosoft Exchange Server Remote Code Execution Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T20:23:13.000000Z"}, {"uuid": "79b13509-6012-466a-a450-348c6d16c826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36746", "type": "seen", "source": "https://t.me/ctinow/168998", "content": "https://ift.tt/50XhY6D\nCVE-2023-36746 Exploit", "creation_timestamp": "2024-01-16T21:16:24.000000Z"}, {"uuid": "a1cdb8ba-5c5c-461b-8aaa-75b5c2542b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36744", "type": "seen", "source": "https://t.me/cibsecurity/70333", "content": "\u203c CVE-2023-36744 \u203c\n\nMicrosoft Exchange Server Remote Code Execution Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T20:29:25.000000Z"}, {"uuid": "158044c9-916a-415e-8b8b-db48b27d3fe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36747", "type": "seen", "source": "https://t.me/ctinow/168997", "content": "https://ift.tt/LtmTE3C\nCVE-2023-36747 Exploit", "creation_timestamp": "2024-01-16T21:16:21.000000Z"}, {"uuid": "09ba9ebd-ab09-47d8-8de8-36ed87f1dcd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36747", "type": "seen", "source": "https://t.me/ctinow/173423", "content": "https://ift.tt/ZnHrY2m\nCVE-2023-36747 | GTKWave 3.3.115 fstReaderIterBlocks2 len heap-based overflow (TALOS-2023-1793)", "creation_timestamp": "2024-01-25T13:11:35.000000Z"}, {"uuid": "07c8d778-e35f-4116-9ef7-bbe1e9d108db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36746", "type": "seen", "source": "https://t.me/ctinow/173422", "content": "https://ift.tt/FCIB46O\nCVE-2023-36746 | GTKWave 3.3.115 fstReaderIterBlocks2 heap-based overflow (TALOS-2023-1793)", "creation_timestamp": "2024-01-25T13:11:34.000000Z"}, {"uuid": "e1e7d367-9f3d-43da-a933-c3a202b223f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36741", "type": "seen", "source": "https://t.me/cibsecurity/69237", "content": "\u203c CVE-2023-36741 \u203c\n\nMicrosoft Edge (Chromium-based) Elevation of Privilege Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-26T07:14:33.000000Z"}, {"uuid": "3721b613-f86b-4adf-a001-da4c6ed36054", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3674", "type": "seen", "source": "https://t.me/cibsecurity/67019", "content": "\u203c CVE-2023-3674 \u203c\n\nA flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-19T22:21:59.000000Z"}, {"uuid": "a1c1f1ef-5eb0-407f-b6d2-1d6608e97012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36749", "type": "seen", "source": "https://t.me/cibsecurity/66358", "content": "\u203c CVE-2023-36749 \u203c\n\nA vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.16.0), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1400 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1500 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1501 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1510 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1511 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1512 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1524 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1536 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX5000 (All versions &lt; V2.16.0). The webserver of the affected devices support insecure TLS 1.0 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T14:29:51.000000Z"}, {"uuid": "f26dba8d-7cc2-4906-b63b-8ac3d272ce10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36748", "type": "seen", "source": "https://t.me/cibsecurity/66349", "content": "\u203c CVE-2023-36748 \u203c\n\nA vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.16.0), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1400 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1500 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1501 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1510 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1511 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1512 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1524 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1536 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX5000 (All versions &lt; V2.16.0). The affected devices are configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any datapassed over to and from the affected device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T14:29:37.000000Z"}, {"uuid": "178e954a-3e6f-4f17-995e-7fa82b028add", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/3380", "content": "#exchange\n\nMicrosoft Exchange Server CVE-2023-36745 \n\nhttps://n1k0la-t.github.io/2023/10/24/Microsoft-Exchange-Server-CVE-2023-36745/\n\nPOC", "creation_timestamp": "2023-10-27T01:00:42.000000Z"}, {"uuid": "7c978980-65e5-420d-bf3f-4d13094c3ae0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1354", "content": "https://n1k0la-t.github.io/2023/10/24/Microsoft-Exchange-Server-CVE-2023-36745/\nMicrosoft Exchange Server CVE-2023-36745", "creation_timestamp": "2023-10-24T17:54:45.000000Z"}, {"uuid": "95e70dcb-8a6b-43e3-9b4f-cb4a34a6c295", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/redscriptfreelog/6876", "content": "CVE-2023-36745: Microsoft Exchange Server RCE\n\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/\n\nPoC: https://github.com/N1k0la-T/CVE-2023-36745\n\n#exploit #ad #redteam #pentest", "creation_timestamp": "2023-11-30T17:33:29.000000Z"}, {"uuid": "0b96cb4c-203a-478a-933c-c101e74e3ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/redscriptfreelog/6845", "content": "CVE-2023-36745: Microsoft Exchange Server RCE\n\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/\n\nPoC: https://github.com/N1k0la-T/CVE-2023-36745\n\nProject: https://t.me/malwaresupport\n\nAdministration: https://t.me/vpn809", "creation_timestamp": "2023-10-31T20:50:37.000000Z"}, {"uuid": "ceec6fc0-9a2b-427a-a24d-1cdafdde6f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9253", "content": "#exploit\n1. CVE-2023-21931:\nOracle Weblogic PreAuth RCE\nhttps://github.com/MMarch7/weblogic_CVE-2023-21931_POC-EXP\n\n2. CVE-2023-36745:\nMS Exchange Server Privilege Escalation\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit\n]-&gt; PoC: https://github.com/N1k0la-T/CVE-2023-36745\n\n3. CVE-2023-4863:\nHeap buffer overflow in Google WebP\nhttps://paper.seebug.org/3056", "creation_timestamp": "2024-12-26T17:03:29.000000Z"}, {"uuid": "dca9e507-b02b-458c-b70d-65dd1f934409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/5625", "content": "CVE-2023-36745: Microsoft Exchange Server RCE CVE-2023-36745\n\nread \n\nPoc\n\n#cve #rce\n\u2014\u2014\u2014\u2014\u2014\u2014\u200c\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-10-30T10:50:03.000000Z"}, {"uuid": "cf013c87-a9f8-4cc1-9c06-9cbd7a4270f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1503", "content": "#exploit\n1. CVE-2023-21931:\nOracle Weblogic PreAuth RCE\nhttps://github.com/MMarch7/weblogic_CVE-2023-21931_POC-EXP\n\n2. CVE-2023-36745:\nMS Exchange Server Privilege Escalation\nhttps://github.com/N1k0la-T/CVE-2023-36745\n\n3. CVE-2023-4863:\nHeap buffer overflow in Google WebP\nhttps://paper.seebug.org/3056", "creation_timestamp": "2024-08-16T08:40:05.000000Z"}, {"uuid": "8162763f-f461-4d37-8a8d-0922a37c3bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1553", "content": "CVE-2023-36745: Microsoft Exchange Server RCE\n\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/\n\nPoC: https://github.com/N1k0la-T/CVE-2023-36745\n\n#exploit #ad #redteam #pentest", "creation_timestamp": "2024-08-16T08:40:08.000000Z"}]}