1 |
A tool to discover Juniper firewalls vulnerable to CVE-2023-36845 |
https://github.com/vulncheck-oss/cve-2023-36845-scanner |
POC详情
|
2 |
Juniper Firewalls CVE-2023-36845 - RCE |
https://github.com/kljunowsky/CVE-2023-36845 |
POC详情
|
3 |
PoC CVE-2023-36845 on Juniper Device |
https://github.com/toanln-cov/CVE-2023-36845 |
POC详情
|
4 |
None |
https://github.com/halencarjunior/CVE-2023-36845 |
POC详情
|
5 |
CVE-2023-36845 - Juniper Firewall Remote code execution (RCE) |
https://github.com/zaenhaxor/CVE-2023-36845 |
POC详情
|
6 |
None |
https://github.com/simrotion13/CVE-2023-36845 |
POC详情
|
7 |
PoC & vulnerability detector for Juniper EX switches and SRX firewalls |
https://github.com/WhiteOwl-Pub/PoC-Vuln-Detector-juniper-cve-2023-36845 |
POC详情
|
8 |
CVE-2023-36845 PoC script automates the PoC for CVE-2023-36845 targeting Juniper Networks Junos OS's J-Web component on EX and SRX Series devices. It exploits a PHP flaw, allowing remote modification of the PHPRC variable. Successful exploitation can lead to code injection and execution. |
https://github.com/cyberh3als/CVE-2023-36845-POC |
POC详情
|
9 |
Ansible Playbook for CVE-2023-36845 |
https://github.com/ditekshen/ansible-cve-2023-36845 |
POC详情
|
10 |
proof of Concept and Vulnerability Detector for CVE-2023-36845 |
https://github.com/WhiteOwl-Pub/Juniper-PoC-CVE-2023-36845 |
POC详情
|
11 |
Simple Automation script for juniper cve-2023-36845 |
https://github.com/Asbawy/Automation-for-Juniper-cve-2023-36845 |
POC详情
|
12 |
Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device. |
https://github.com/jahithoque/Juniper-CVE-2023-36845-Mass-Hunting |
POC详情
|
13 |
None |
https://github.com/cyb3rzest/Juniper-Bug-Automation-CVE-2023-36845 |
POC详情
|
14 |
None |
https://github.com/CharonDefalt/Juniper-exploit-CVE-2023-36845 |
POC详情
|
15 |
CVE-2023-36845 и CVE-2023-36846 Juniper Junos OS J-Web RCE |
https://github.com/iveresk/CVE-2023-36845-6- |
POC详情
|
16 |
CVES |
https://github.com/ak1t4/CVE-2023-36845 |
POC详情
|
17 |
This Python script automates the Proof of Concept (PoC) for CVE-2023-36845, a vulnerability impacting Juniper Networks Junos OS on EX and SRX Series devices. The vulnerability resides in the J-Web component, allowing remote manipulation of the PHPRC variable, potentially leading to code injection. |
https://github.com/0xNehru/CVE-2023-36845-Juniper-Vulnerability |
POC详情
|
18 |
Juniper - Remote Code Execution (CVE-2023-36845) PreAuth-RCE Exploits |
https://github.com/imhunterand/CVE-2023-36845 |
POC详情
|
19 |
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. |
https://github.com/ifconfig-me/CVE-2023-36845 |
POC详情
|
20 |
CVE-2023-36845 – Unauthenticated Juniper Remote Code Execution Vulnerability Scanner |
https://github.com/e11i0t4lders0n/CVE-2023-36845 |
POC详情
|
21 |
Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞) |
https://github.com/CKevens/ansible-cve-2023-36845 |
POC详情
|
22 |
None |
https://github.com/Vignesh2712/Automation-for-Juniper-cve-2023-36845 |
POC详情
|
23 |
None |
https://github.com/Vignesh2712/utomation-for-Juniper-cve-2023-36845 |
POC详情
|
24 |
Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞) |
https://github.com/3yujw7njai/ansible-cve-2023-36845 |
POC详情
|
25 |
Juniper Networks POC Understanding CVE-2023–36845 Remote Code Execution Exploit and Protection |
https://github.com/functionofpwnosec/CVE-2023-36845 |
POC详情
|
26 |
A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845 cve-2023-36845, go-exploit |
https://github.com/meekchest/cve-2023-36845-scanner |
POC详情
|