Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Fortra | GoAnywhere MFT | 6.0.1 ~ 7.4.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Authentication Bypass in GoAnywhere MFT | https://github.com/horizon3ai/CVE-2024-0204 | POC Details |
| 2 | Scanning for vulnerable GoAnywhere MFT CVE-2024-0204 | https://github.com/cbeek-r7/CVE-2024-0204 | POC Details |
| 3 | This script exploits the CVE-2024-0204 vulnerability in Fortra GoAnywhere MFT, allowing the creation of unauthorized administrative users, for educational and authorized testing purposes. | https://github.com/m-cetin/CVE-2024-0204 | POC Details |
| 4 | GoAnywhere MFT | https://github.com/adminlove520/CVE-2024-0204 | POC Details |
| 5 | Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-0204.yaml | POC Details |
| 6 | Fortra GoAnywhere MFT 7.4.1 - Authentication Bypass | https://github.com/ibrahmsql/CVE-2024-0204 | POC Details |
| 7 | GoAnywhere MFT | https://github.com/anonymous-echo/CVE-2024-0204 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet