mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
35 lines
1.6 KiB
Markdown
35 lines
1.6 KiB
Markdown
|
|
### [CVE-2024-8190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8190)
|
||
|
|
&color=blue)
|
||
|
|

|
||
|
|
&color=brighgreen)
|
||
|
|
|
||
|
|
### Description
|
||
|
|
|
||
|
|
An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability.
|
||
|
|
|
||
|
|
### POC
|
||
|
|
|
||
|
|
#### Reference
|
||
|
|
No PoCs from references.
|
||
|
|
|
||
|
|
#### Github
|
||
|
|
- https://github.com/12442RF/POC
|
||
|
|
- https://github.com/DMW11525708/wiki
|
||
|
|
- https://github.com/Lern0n/Lernon-POC
|
||
|
|
- https://github.com/Linxloop/fork_POC
|
||
|
|
- https://github.com/adysec/POC
|
||
|
|
- https://github.com/cisp-pte/POC-20241008-sec-fork
|
||
|
|
- https://github.com/eeeeeeeeee-code/POC
|
||
|
|
- https://github.com/fl4m3-s/IvantiCSA_Unauth_RCE
|
||
|
|
- https://github.com/flyingllama87/CVE-2024-8190-unauth
|
||
|
|
- https://github.com/greenberglinken/2023hvv_1
|
||
|
|
- https://github.com/horizon3ai/CVE-2024-8190
|
||
|
|
- https://github.com/iemotion/POC
|
||
|
|
- https://github.com/laoa1573/wy876
|
||
|
|
- https://github.com/oLy0/Vulnerability
|
||
|
|
- https://github.com/plbplbp/loudong001
|
||
|
|
- https://github.com/plzheheplztrying/cve_monitor
|
||
|
|
- https://github.com/tequilasunsh1ne/ivanti_CVE_2024_8190
|
||
|
|
- https://github.com/tylzars/awesome-vrre-writeups
|
||
|
|
|