Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Ivanti | MobileIron Sentry | 9.18.0 and below ~ 9.18.0 and below | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Ivanti Sentry CVE-2023-38035 | https://github.com/horizon3ai/CVE-2023-38035 | POC Details |
| 2 | CVE-2023-38035 Recon oriented exploit, extract company name contact information | https://github.com/LeakIX/sentryexploit | POC Details |
| 3 | Script to exploit CVE-2023-38035 | https://github.com/mind2hex/MICS_Hunter | POC Details |
| 4 | Script to exploit CVE-2023-38035 | https://github.com/mind2hex/CVE-2023-38035 | POC Details |
| 5 | A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-38035.yaml | POC Details |
| 6 | Script to exploit CVE-2023-38035 | https://github.com/mind2hex/CVE-2023-38035-MobileIron-RCE | POC Details |
No public POC found.
Login to generate AI POCNo comments yet