Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit new CVE-2023-42789 Fortinet FortiOS FortiProxy ----> RCE | https://github.com/CrimBit/CVE-2023-42789-POC | POC Details |
| 2 | Check CVE-2023-42789 | https://github.com/jhonnybonny/CVE-2023-42789 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-48788 | 9.3 CRITICAL | Fortinet FortiClientEMS SQL注入漏洞 |
| CVE-2023-47534 | 8.7 HIGH | Fortinet FortiClientEMS 安全漏洞 |
| CVE-2023-42790 | 7.7 HIGH | Fortinet FortiOS 安全漏洞 |
| CVE-2023-36554 | 7.7 HIGH | Fortinet FortiManager 访问控制错误漏洞 |
| CVE-2024-23112 | 7.2 HIGH | Fortinet FortiOS 和 FortiProxy 安全漏洞 |
| CVE-2023-46717 | 6.7 MEDIUM | Fortinet FortiOS 授权问题漏洞 |
| CVE-2023-41842 | 6.3 MEDIUM | Fortinet 多款产品 格式化字符串错误漏洞 |
| CVE-2024-21761 | 3.9 LOW | Fortinet FortiPortal 授权问题漏洞 |
No comments yet