POC-CVE-2024-23113
by result - Monday October 21, 2024 at 10:35 AM
#31
Thank, certainly worth having a look
Reply
#32
dammm, nice job!

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#33
POC-CVE-2024-23113 yes thank you ...........
Reply
#34
will try it and if it's good i'll rate bro

[url=https://breachforums.rs/private.php?action=send&uid=325229][/url]
Reply
#35
thanks for the share
Reply
#36
Thanks for sharing !
Reply
#37
thx bro! Im check now.
Reply
#38
(Oct 21, 2024, 10:35 AM)result Wrote: The script is designed to detect CVE-2024-23113, which is a format string vulnerability in the FortiGate FGFM service (FortiGate to FortiManager protocol) running on TCP port 541. The vulnerability occurs because an attacker can control a format string, which could lead to Remote Code Execution (RCE) or other unintended behaviors 

After many requests I made it I would really appreciate it if you could rate the project on github

                                                                                                                        
i would like to test it
Reply
#39
would like to see what happend
Reply
#40
let's see what u hv got
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Dokan Pro Unauthenticated SQL Injection POC | CVSS 10 Loki 41 3,624 1 hour ago
Last Post: Xploitd
  {SECRET} DATABASE OF EXPLOITS lulagain 435 26,327 Today, 06:11 AM
Last Post: DirtyEra
  New Zer0 Day Wordpress A3g00n 81 3,330 Today, 03:06 AM
Last Post: DirtyEra
  Wordpress Elementor 3.11.6 Exploit - Full Takeover TheGoodlife 102 19,689 Yesterday, 06:45 AM
Last Post: eztocard
  new wordpress website takeover vuln (video + poc ) zinzeur 314 28,316 Apr 30, 2026, 03:54 PM
Last Post: baku

Forum Jump:


 Users browsing this forum: 1 Guest(s)