Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Fortinet | FortiSwitchManager | 7.2.0 ~ 7.2.3 | - | |
| Fortinet | FortiOS | 7.4.0 ~ 7.4.2 | - | |
| Fortinet | FortiPAM | 1.2.0 | - | |
| Fortinet | FortiProxy | 7.4.0 ~ 7.4.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/cvedayprotech/CVE-2024-23113 | POC Details |
| 2 | CVE-2024-23113 FortiOS SSL VPN RCE | https://github.com/tr1pl3ight/CVE-2024-23113-POC | POC Details |
| 3 | None | https://github.com/cvedayprotech3s/cve-2024-23113 | POC Details |
| 4 | CVE-2024-23113 FortiOS SSL VPN RCE | https://github.com/foxymoxxy/CVE-2024-23113-POC | POC Details |
| 5 | CVE-2024-23113 Exploit with More than 20000 Targets | https://github.com/labesterOct/CVE-2024-23113 | POC Details |
| 6 | None | https://github.com/nothe1senberg/CVE-2024-23113 | POC Details |
| 7 | None | https://github.com/OxLmahdi/cve-2024-23113 | POC Details |
| 8 | test_private_CVE | https://github.com/CheckCve2/CVE-2024-23113 | POC Details |
| 9 | None | https://github.com/HazeLook/CVE-2024-23113 | POC Details |
| 10 | None | https://github.com/maybelookis/CVE-2024-23113 | POC Details |
| 11 | None | https://github.com/p33d/CVE-2024-23113 | POC Details |
| 12 | CVE-2024-23113-Private-POC | https://github.com/groshi/CVE-2024-23113-Private-POC | POC Details |
| 13 | None | https://github.com/Jaden1419/CVE-2024-23113 | POC Details |
| 14 | None | https://github.com/hatvix1/CVE-2024-23113 | POC Details |
| 15 | CVE-2024-23113 是存在于某特定软件或系统中的一个安全漏洞,该漏洞允许恶意攻击者在特定条件下利用系统中的缺陷实现未经授权的行为。这种行为可能包括但不限于远程代码执行、访问敏感信息或以更高权限执行操作。 | https://github.com/zgimszhd61/CVE-2024-23113 | POC Details |
| 16 | None | https://github.com/puckiestyle/CVE-2024-23113 | POC Details |
| 17 | POC TO RCE | https://github.com/radoslavatanasov1/CVE-2024-23113 | POC Details |
| 18 | None | https://github.com/expl0itsecurity/CVE-2024-23113 | POC Details |
| 19 | None | https://github.com/XiaomingX/cve-2024-23113-exp | POC Details |
| 20 | CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。 | https://github.com/XiaomingX/CVE-2024-23113-poc | POC Details |
| 21 | CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。 | https://github.com/XiaomingX/cve-2024-23113-poc | POC Details |
| 22 | This python scripts searches a client list to see if their FortiGate device is vulnerable to this CVE. | https://github.com/valornode/CVE-2024-23113 | POC Details |
| 23 | None | https://github.com/MAVRICK-1/cve-2024-23113-test-env | POC Details |
| 24 | CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。 | https://github.com/ownouwa/cve-2024-23113-poc | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-45581 | 7.9 HIGH | Fortinet FortiClient EMS 安全漏洞 |
| CVE-2023-26206 | 6.8 MEDIUM | Fortinet FortiNAC 跨站脚本漏洞 |
| CVE-2023-44253 | 4.7 MEDIUM | Fortinet FortiManager 信息泄露漏洞 |
| CVE-2023-47537 | 4.4 MEDIUM | Fortinet FortiOS 信任管理问题漏洞 |
No comments yet