mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
28 lines
1.2 KiB
Markdown
28 lines
1.2 KiB
Markdown
![]() |
### [CVE-2023-48788](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48788)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/CVETechnologic/CVE-2023-48788-Proof-of-concept-SQLinj
|
||
|
- https://github.com/NaInSec/CVE-LIST
|
||
|
- https://github.com/Ostorlab/KEV
|
||
|
- https://github.com/TheRedDevil1/CVE-2023-48788
|
||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||
|
- https://github.com/horizon3ai/CVE-2023-48788
|
||
|
- https://github.com/k4rd3n/CVE-2023-48788-PoC
|
||
|
- https://github.com/mrobsidian1/CVE-2023-48788-Proof-of-concept-SQLinj
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/tanjiti/sec_profile
|
||
|
- https://github.com/toxyl/lscve
|
||
|
|