Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Juniper Networks | Junos OS | 0 ~ 20.4R3-S9 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A tool to discover Juniper firewalls vulnerable to CVE-2023-36845 | https://github.com/vulncheck-oss/cve-2023-36845-scanner | POC Details |
| 2 | Juniper Firewalls CVE-2023-36845 - RCE | https://github.com/kljunowsky/CVE-2023-36845 | POC Details |
| 3 | PoC CVE-2023-36845 on Juniper Device | https://github.com/toanln-cov/CVE-2023-36845 | POC Details |
| 4 | None | https://github.com/halencarjunior/CVE-2023-36845 | POC Details |
| 5 | CVE-2023-36845 - Juniper Firewall Remote code execution (RCE) | https://github.com/zaenhaxor/CVE-2023-36845 | POC Details |
| 6 | None | https://github.com/simrotion13/CVE-2023-36845 | POC Details |
| 7 | PoC & vulnerability detector for Juniper EX switches and SRX firewalls | https://github.com/WhiteOwl-Pub/PoC-Vuln-Detector-juniper-cve-2023-36845 | POC Details |
| 8 | CVE-2023-36845 PoC script automates the PoC for CVE-2023-36845 targeting Juniper Networks Junos OS's J-Web component on EX and SRX Series devices. It exploits a PHP flaw, allowing remote modification of the PHPRC variable. Successful exploitation can lead to code injection and execution. | https://github.com/cyberh3als/CVE-2023-36845-POC | POC Details |
| 9 | Ansible Playbook for CVE-2023-36845 | https://github.com/ditekshen/ansible-cve-2023-36845 | POC Details |
| 10 | proof of Concept and Vulnerability Detector for CVE-2023-36845 | https://github.com/WhiteOwl-Pub/Juniper-PoC-CVE-2023-36845 | POC Details |
| 11 | Simple Automation script for juniper cve-2023-36845 | https://github.com/Asbawy/Automation-for-Juniper-cve-2023-36845 | POC Details |
| 12 | Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device. | https://github.com/jahithoque/Juniper-CVE-2023-36845-Mass-Hunting | POC Details |
| 13 | None | https://github.com/cyb3rzest/Juniper-Bug-Automation-CVE-2023-36845 | POC Details |
| 14 | None | https://github.com/CharonDefalt/Juniper-exploit-CVE-2023-36845 | POC Details |
| 15 | CVE-2023-36845 и CVE-2023-36846 Juniper Junos OS J-Web RCE | https://github.com/iveresk/CVE-2023-36845-6- | POC Details |
| 16 | CVES | https://github.com/ak1t4/CVE-2023-36845 | POC Details |
| 17 | This Python script automates the Proof of Concept (PoC) for CVE-2023-36845, a vulnerability impacting Juniper Networks Junos OS on EX and SRX Series devices. The vulnerability resides in the J-Web component, allowing remote manipulation of the PHPRC variable, potentially leading to code injection. | https://github.com/0xNehru/CVE-2023-36845-Juniper-Vulnerability | POC Details |
| 18 | Juniper - Remote Code Execution (CVE-2023-36845) PreAuth-RCE Exploits | https://github.com/imhunterand/CVE-2023-36845 | POC Details |
| 19 | A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. | https://github.com/ifconfig-me/CVE-2023-36845 | POC Details |
| 20 | CVE-2023-36845 – Unauthenticated Juniper Remote Code Execution Vulnerability Scanner | https://github.com/e11i0t4lders0n/CVE-2023-36845 | POC Details |
| 21 | Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞) | https://github.com/CKevens/ansible-cve-2023-36845 | POC Details |
| 22 | None | https://github.com/Vignesh2712/Automation-for-Juniper-cve-2023-36845 | POC Details |
| 23 | None | https://github.com/Vignesh2712/utomation-for-Juniper-cve-2023-36845 | POC Details |
| 24 | Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞) | https://github.com/3yujw7njai/ansible-cve-2023-36845 | POC Details |
| 25 | Juniper Networks POC Understanding CVE-2023–36845 Remote Code Execution Exploit and Protection | https://github.com/functionofpwnosec/CVE-2023-36845 | POC Details |
| 26 | A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845 cve-2023-36845, go-exploit | https://github.com/meekchest/cve-2023-36845-scanner | POC Details |
| 27 | Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞) | https://github.com/AiK1d/ansible-cve-2023-36845 | POC Details |
| 28 | A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to control certain environments variables to execute remote commands | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-36845.yaml | POC Details |
| 29 | Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞) | https://github.com/P4x1s/ansible-cve-2023-36845 | POC Details |
| 30 | Juniper JunOS J-Web PHP external variable modification (CVE-2023-36845) exploit. | https://github.com/kopfjager007/CVE-2023-36845 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet