Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection | https://github.com/horizon3ai/CVE-2024-23108 | POC Details |
| 2 | POC iteration for CVE-2024-23108 | https://github.com/hitem/CVE-2024-23108 | POC Details |
| 3 | FortiSIEM versions 6.4.0 through 7.1.1 contain an OS command injection vulnerability in the Phoenix Monitor service. The vulnerability exists in the XML parsing of TEST_STORAGE elements where the mount_point field is not properly sanitized before being passed to shell commands, allowing unauthenticated remote code execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2024/CVE-2024-23108.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet