Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Fortinet | FortiClientEMS | 7.2.0 ~ 7.2.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | New exploit for Fortinet's [CVE-2023-48788] to SQL injection in HTTP reqs. | https://github.com/CVETechnologic/CVE-2023-48788-Proof-of-concept-SQLinj | POC Details |
| 2 | CVE-2023-48788 is a SQLi vulnerability which leads to unauthenticated remote code executing in fortinet's FortiClientEMS. | https://github.com/k4rd3n/CVE-2023-48788-PoC | POC Details |
| 3 | CVE-2023-48788 is a SQLi vulnerability which leads to unauthenticated remote code executing in fortinet's FortiClientEMS. | https://github.com/TheRedDevil1/CVE-2023-48788 | POC Details |
| 4 | Fortinet FortiClient EMS SQL Injection | https://github.com/horizon3ai/CVE-2023-48788 | POC Details |
| 5 | A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets. | https://github.com/TheRedDevil1/CVE-2023-48788-exploit | POC Details |
| 6 | None | https://github.com/mrobsidian1/CVE-2023-48788-Proof-of-concept-SQLinj | POC Details |
| 7 | None | https://github.com/AlexDoe11/CVE-2023-48788-Proof-of-concept-SQLinj | POC Details |
| 8 | A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2023/CVE-2023-48788.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-42789 | 9.3 CRITICAL | Fortinet FortiOS 缓冲区错误漏洞 |
| CVE-2023-47534 | 8.7 HIGH | Fortinet FortiClientEMS 安全漏洞 |
| CVE-2023-42790 | 7.7 HIGH | Fortinet FortiOS 安全漏洞 |
| CVE-2023-36554 | 7.7 HIGH | Fortinet FortiManager 访问控制错误漏洞 |
| CVE-2024-23112 | 7.2 HIGH | Fortinet FortiOS 和 FortiProxy 安全漏洞 |
| CVE-2023-46717 | 6.7 MEDIUM | Fortinet FortiOS 授权问题漏洞 |
| CVE-2023-41842 | 6.3 MEDIUM | Fortinet 多款产品 格式化字符串错误漏洞 |
| CVE-2024-21761 | 3.9 LOW | Fortinet FortiPortal 授权问题漏洞 |
No comments yet