POC-CVE-2024-23113
by result - Monday October 21, 2024 at 10:35 AM
#31
Thank, certainly worth having a look
Reply
#32
dammm, nice job!

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#33
POC-CVE-2024-23113 yes thank you ...........
Reply
#34
will try it and if it's good i'll rate bro

[url=https://breachforums.rs/private.php?action=send&uid=325229][/url]
Reply
#35
thanks for the share
Reply
#36
Thanks for sharing !
Reply
#37
thx bro! Im check now.
Reply
#38
(Oct 21, 2024, 10:35 AM)result Wrote: The script is designed to detect CVE-2024-23113, which is a format string vulnerability in the FortiGate FGFM service (FortiGate to FortiManager protocol) running on TCP port 541. The vulnerability occurs because an attacker can control a format string, which could lead to Remote Code Execution (RCE) or other unintended behaviors 

After many requests I made it I would really appreciate it if you could rate the project on github

                                                                                                                        
i would like to test it
Reply
#39
would like to see what happend
Reply
#40
let's see what u hv got
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  {SECRET} DATABASE OF EXPLOITS lulagain 438 26,878 5 hours ago
Last Post: NUKEx
  [POC] Google OAuth "MultiLogin" endpoint 0-day Farfallaiero 108 13,839 Yesterday, 05:42 PM
Last Post: nobcoderfck
  Ban Any Discord Exploit phineasfisherman 7 475 Yesterday, 10:16 AM
Last Post: sniperx86
  Dokan Pro Unauthenticated SQL Injection POC | CVSS 10 Loki 42 3,785 Yesterday, 08:39 AM
Last Post: d39ug
  New Zer0 Day Wordpress A3g00n 81 3,418 May 05, 2026, 03:06 AM
Last Post: DirtyEra

Forum Jump:


 Users browsing this forum: 1 Guest(s)