{"vulnerability": "CVE-2023-36745", "sightings": [{"uuid": "2ad829a0-9571-4c28-ad27-3bb3f1db86f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://www.thezdi.com/blog/2024/9/18/exploiting-exchange-powershell-after-proxynotshell-part-3-dll-loading-chain-for-rce", "content": "", "creation_timestamp": "2024-09-19T18:02:10.000000Z"}, {"uuid": "b9c84f4a-ce72-4abd-b707-57d17cf1440b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://www.thezdi.com/blog/2024/9/11/exploiting-exchange-powershell-after-proxynotshell-part-2-approvedapplicationcollection", "content": "", "creation_timestamp": "2024-09-12T15:00:00.000000Z"}, {"uuid": "180f2260-c6f0-4cf5-96ae-b79e962bb1c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://infosec.exchange/users/saltmyhash/statuses/114039171548967342", "content": "", "creation_timestamp": "2025-02-21T01:01:38.686691Z"}, {"uuid": "8f8e0842-cdf3-454b-be7b-071885fcf3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/92582bf5-d92c-47fe-b891-656d271bbfef", "content": "", "creation_timestamp": "2024-10-14T15:50:35.983245Z"}, {"uuid": "ba285097-daa8-41b6-afee-71219f38d962", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/fdda4963-0aa7-4d15-8a8f-969db8f304ca", "content": "", "creation_timestamp": "2025-02-28T23:49:13.272798Z"}, {"uuid": "d762d3fd-6200-40e5-8595-3fdfcf6513e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/157", "content": "\u2604\ufe0fCVE-2023-36745: MS Exchange Server Privilege Escalation\n\n\ud83d\udce3\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 PoC:\nhttps://github.com/N1k0la-T/CVE-2023-36745/blob/main/exp.py\n\n#cve #poc #exploit", "creation_timestamp": "2023-10-25T06:48:00.000000Z"}, {"uuid": "dcee1d47-0b57-4354-8bb4-fdae8ca8bb56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/49", "content": "CVE-2023-36745: Microsoft Exchange Server RCE\n#CVE-2023-36745\n\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/\n\nPoC: https://github.com/N1k0la-T/CVE-2023-36745", "creation_timestamp": "2023-10-25T15:48:08.000000Z"}, {"uuid": "84254833-d23b-4345-b564-295b30401765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/215", "content": "\u2604\ufe0fCVE-2023-36745: MS Exchange Server Privilege Escalation\n\n\ud83d\udce3\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 PoC:\nhttps://github.com/N1k0la-T/CVE-2023-36745/blob/main/exp.py\n\n#cve #poc #exploit", "creation_timestamp": "2023-10-25T06:48:00.000000Z"}, {"uuid": "432ca6a4-0be3-4966-b8c3-a4e278eba4de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/bh_cat/188", "content": "\ud83d\udcd5 \u041f\u043e\u0434\u0431\u043e\u0440\u043e\u0447\u043a\u0430 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\u042d\u0442\u043e \u043f\u0440\u043e\u0431\u043d\u0438\u043a.\n\n\ud83d\udca1 F5 BIG-IP Unauth RCE via AJP Smuggling\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\nCVE-2023-46747\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x:\n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u0438\u043c\u0435\u044e\u0449\u0438\u043c \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0435 BIG-IP \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u0440\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438/\u0438\u043b\u0438 \u0441\u0430\u043c\u043e\u043f\u0438\u0441\u043d\u044b\u0435 \u0430\u0434\u0440\u0435\u0441\u0430, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\n\n\n\ud83d\udca1 ActiveMQ Remote Code Execution\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\nCVE-2023-46604\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x:\n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435: \n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u0438\u043c\u0435\u044e\u0449\u0435\u043c\u0443 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0431\u0440\u043e\u043a\u0435\u0440\u0443, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438, \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u0443\u044f \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u043c\u0438 \u0442\u0438\u043f\u0430\u043c\u0438 \u043a\u043b\u0430\u0441\u0441\u043e\u0432 \u0432 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 OpenWire, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0431\u0440\u043e\u043a\u0435\u0440 \u0438\u043d\u0441\u0442\u0430\u043d\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043b\u044e\u0431\u043e\u0439 \u043a\u043b\u0430\u0441\u0441 \u0432 \u043f\u0443\u0442\u0438 \u043a\u043b\u0430\u0441\u0441\u0430.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\n\n\ud83d\udca1 \u041f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 UI Cisco IOS XE\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\n- CVE-2023-20198\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x: \n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e, \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0443\u0447\u0435\u0442\u043d\u0443\u044e \u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0441 \u0443\u0440\u043e\u0432\u043d\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 15.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\u27bf\n\n\ud83d\udca1 Microsoft Exchange Server Remote Code Execution\n\n\u041e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435:\nCVE-2023-36745\n\u0421\u043a\u043e\u0440\u0438\u043d\u0433 CVSS3.x:\n\u270d\ufe0f\u270d\ufe0f\u270d\ufe0f\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0438 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u0436\u0435\u0440\u0442\u0432\u044b, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u0440\u043e\u0441\u0442\u043e\u044e \u0446\u0435\u043b\u0435\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\nPOC\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\ud83c\udf10 \u0421\u0441\u044b\u043b\u043a\u0430\n\n#poc", "creation_timestamp": "2023-11-10T10:57:44.000000Z"}, {"uuid": "f285c374-9410-4da8-bc22-596693894e8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "Telegram/qQDf_QbEQjFZp0Et7iiynljt2UEc3wP6rjcNCRIVxu0TNg", "content": "", "creation_timestamp": "2023-10-25T16:40:53.000000Z"}, {"uuid": "d860e60a-e66c-46f3-92f4-ffe50787543d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "Telegram/yGvj5EX2z2XHKM-IYEdTm5WzR8ebYOvYFlvF8VjTE_nHLw", "content": "", "creation_timestamp": "2023-11-05T14:35:46.000000Z"}, {"uuid": "b1f5d5f9-db94-4114-91e5-f6b9e1b91b69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "Telegram/ONdo6kSSiubBTLR9b8SYjF-HZGmrQ_i9_RMV50j7MrWMBQ", "content": "", "creation_timestamp": "2023-11-06T03:38:30.000000Z"}, {"uuid": "505451cb-20de-449b-abc3-2677ee2a2c1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "Telegram/9WEmnZW4gUShi36wFEKo_YOHGbW19JX5QBHeFT8hui0CLA", "content": "", "creation_timestamp": "2023-10-30T09:48:09.000000Z"}, {"uuid": "a1d744e8-01ac-4973-8b10-15d20f19eeeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3468", "content": "https://n1k0la-t.github.io/2023/10/24/Microsoft-Exchange-Server-CVE-2023-36745/\n\n\nMicrosoft Exchange Server CVE-2023-36745", "creation_timestamp": "2023-10-25T09:52:31.000000Z"}, {"uuid": "71825c9d-9ff8-4422-9edd-4ddc56f3b454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://t.me/proxy_bar/1792", "content": "CVE-2023-36745\nMS Exchange Server Privilege Escalation\nexploit\n\n#exchange", "creation_timestamp": "2023-10-24T11:59:19.000000Z"}, {"uuid": "0f5c5dda-0c46-4be4-a3ad-3518ac2cde10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "exploited", "source": "Telegram/6gYyVdYl9-acnpuiEjII8H8v4M_oiONGf4arKd-1SLHQ94Y", "content": "", "creation_timestamp": "2023-10-31T06:46:02.000000Z"}, {"uuid": "0fde0648-26ca-4cbe-95fd-1fe816691d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "Telegram/eT8lMd0FVqqzyqxvxxgy4aEJ6RyNZWYIkxnyBxpQJJeAfMc", "content": "", "creation_timestamp": "2023-10-30T06:40:45.000000Z"}, {"uuid": "b2338b13-1c7f-41e6-859e-1b3274acfab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "Telegram/-f6CeRaW6J5lkXzlSrItVf3Yey54YrCECLLw-B0K8lNtBx0", "content": "", "creation_timestamp": "2023-10-24T04:52:48.000000Z"}, {"uuid": "4298ce00-1da3-4069-aac8-b355164e8752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1402", "content": "CVE-2023-36745: Microsoft Exchange Server RCE\n\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/\n\nPoC: https://github.com/N1k0la-T/CVE-2023-36745\n\n#exploit #ad #redteam #pentest", "creation_timestamp": "2023-10-24T23:32:39.000000Z"}, {"uuid": "b212b70e-eaf2-4c0e-a07a-fdf48a5da964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "seen", "source": "https://t.me/cibsecurity/70305", "content": "\u203c CVE-2023-36745 \u203c\n\nMicrosoft Exchange Server Remote Code Execution Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T20:23:13.000000Z"}, {"uuid": "178e954a-3e6f-4f17-995e-7fa82b028add", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/3380", "content": "#exchange\n\nMicrosoft Exchange Server CVE-2023-36745 \n\nhttps://n1k0la-t.github.io/2023/10/24/Microsoft-Exchange-Server-CVE-2023-36745/\n\nPOC", "creation_timestamp": "2023-10-27T01:00:42.000000Z"}, {"uuid": "7c978980-65e5-420d-bf3f-4d13094c3ae0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1354", "content": "https://n1k0la-t.github.io/2023/10/24/Microsoft-Exchange-Server-CVE-2023-36745/\nMicrosoft Exchange Server CVE-2023-36745", "creation_timestamp": "2023-10-24T17:54:45.000000Z"}, {"uuid": "95e70dcb-8a6b-43e3-9b4f-cb4a34a6c295", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/redscriptfreelog/6876", "content": "CVE-2023-36745: Microsoft Exchange Server RCE\n\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/\n\nPoC: https://github.com/N1k0la-T/CVE-2023-36745\n\n#exploit #ad #redteam #pentest", "creation_timestamp": "2023-11-30T17:33:29.000000Z"}, {"uuid": "0b96cb4c-203a-478a-933c-c101e74e3ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/redscriptfreelog/6845", "content": "CVE-2023-36745: Microsoft Exchange Server RCE\n\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/\n\nPoC: https://github.com/N1k0la-T/CVE-2023-36745\n\nProject: https://t.me/malwaresupport\n\nAdministration: https://t.me/vpn809", "creation_timestamp": "2023-10-31T20:50:37.000000Z"}, {"uuid": "ceec6fc0-9a2b-427a-a24d-1cdafdde6f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9253", "content": "#exploit\n1. CVE-2023-21931:\nOracle Weblogic PreAuth RCE\nhttps://github.com/MMarch7/weblogic_CVE-2023-21931_POC-EXP\n\n2. CVE-2023-36745:\nMS Exchange Server Privilege Escalation\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit\n]-&gt; PoC: https://github.com/N1k0la-T/CVE-2023-36745\n\n3. CVE-2023-4863:\nHeap buffer overflow in Google WebP\nhttps://paper.seebug.org/3056", "creation_timestamp": "2024-12-26T17:03:29.000000Z"}, {"uuid": "dca9e507-b02b-458c-b70d-65dd1f934409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/5625", "content": "CVE-2023-36745: Microsoft Exchange Server RCE CVE-2023-36745\n\nread \n\nPoc\n\n#cve #rce\n\u2014\u2014\u2014\u2014\u2014\u2014\u200c\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-10-30T10:50:03.000000Z"}, {"uuid": "cf013c87-a9f8-4cc1-9c06-9cbd7a4270f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1503", "content": "#exploit\n1. CVE-2023-21931:\nOracle Weblogic PreAuth RCE\nhttps://github.com/MMarch7/weblogic_CVE-2023-21931_POC-EXP\n\n2. CVE-2023-36745:\nMS Exchange Server Privilege Escalation\nhttps://github.com/N1k0la-T/CVE-2023-36745\n\n3. CVE-2023-4863:\nHeap buffer overflow in Google WebP\nhttps://paper.seebug.org/3056", "creation_timestamp": "2024-08-16T08:40:05.000000Z"}, {"uuid": "8162763f-f461-4d37-8a8d-0922a37c3bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36745", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1553", "content": "CVE-2023-36745: Microsoft Exchange Server RCE\n\nhttps://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/\n\nPoC: https://github.com/N1k0la-T/CVE-2023-36745\n\n#exploit #ad #redteam #pentest", "creation_timestamp": "2024-08-16T08:40:08.000000Z"}]}