Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-34362-IOCs. More information on Deep Instinct's blog site. | https://github.com/deepinstinct/MOVEit_CVE-2023-34362_IOCs | POC Details |
| 2 | MOVEit CVE-2023-34362 | https://github.com/horizon3ai/CVE-2023-34362 | POC Details |
| 3 | CVE-2023-34362: MOVEit Transfer Unauthenticated RCE | https://github.com/sfewer-r7/CVE-2023-34362 | POC Details |
| 4 | Repository with everything I have tracking the impact of MOVEit CVE-2023-34362 | https://github.com/kenbuckler/MOVEit-CVE-2023-34362 | POC Details |
| 5 | POC for CVE-2023-34362 affecting MOVEit Transfer | https://github.com/Malwareman007/CVE-2023-34362 | POC Details |
| 6 | This shellscript given the OrgKey 0 will parse the header of the base64 artifacts found in MOVEit Logs and decrypt the Serialized object used a payload | https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362 | POC Details |
| 7 | an exploit of POC for CVE-2023-34362 affecting MOVEit Transfer | https://github.com/errorfiathck/MOVEit-Exploit | POC Details |
| 8 | A video presentation analysing the technical details, scale and lessons to be learned from the MOVEit CVE-2023=3462(CS50 Introduction to Cyber Security Finale Project) | https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362 | POC Details |
| 9 | Modified RCE with a remote shell and logging | https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE | POC Details |
| 10 | None | https://github.com/aditibv/MOVEit-CVE-2023-34362 | POC Details |
| 11 | In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-34362.yaml | POC Details |
| 12 | Threat-Informed Detection & Mitigation Package for MOVEit Transfer Vulnerability | https://github.com/Naveenbana5250/CVE-2023-34362-Defense-Package | POC Details |
| 13 | MOVEit Transfer 2023 mass data breach (CVE-2023-34362) | https://github.com/khengar9274-web/moveit-transfer-2023-breach | POC Details |
No public POC found.
Login to generate AI POCNo comments yet