尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Fortinet | Fortinet FortiOS, FortiProxy, FortiSwitchManager | FortiOS 7.2.1, 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0; FortiProxy 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0; FortiSwitchManager 7.2.0, 7.0.0 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager | https://github.com/horizon3ai/CVE-2022-40684 | POC详情 |
| 2 | PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only) | https://github.com/carlosevieira/CVE-2022-40684 | POC详情 |
| 3 | Bash PoC for Fortinet Auth Bypass - CVE-2022-40684 | https://github.com/Filiplain/Fortinet-PoC-Auth-Bypass | POC详情 |
| 4 | Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager | https://github.com/kljunowsky/CVE-2022-40684-POC | POC详情 |
| 5 | None | https://github.com/secunnix/CVE-2022-40684 | POC详情 |
| 6 | None | https://github.com/iveresk/CVE-2022-40684 | POC详情 |
| 7 | None | https://github.com/mhd108/CVE-2022-40684 | POC详情 |
| 8 | exploit for CVE-2022-40684 Fortinet | https://github.com/ClickCyber/cve-2022-40684 | POC详情 |
| 9 | Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ] | https://github.com/Chocapikk/CVE-2022-40684 | POC详情 |
| 10 | Exploit for CVE-2022-40684 vulnerability | https://github.com/mohamedbenchikh/CVE-2022-40684 | POC详情 |
| 11 | Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ] | https://github.com/HAWA771/CVE-2022-40684 | POC详情 |
| 12 | None | https://github.com/NeriaBasha/CVE-2022-40684 | POC详情 |
| 13 | Forti CVE-2022-40684 enumeration script built in Rust | https://github.com/Grapphy/fortipwn | POC详情 |
| 14 | None | https://github.com/puckiestyle/CVE-2022-40684 | POC详情 |
| 15 | None | https://github.com/jsongmax/Fortinet-CVE-2022-40684 | POC详情 |
| 16 | Utilities for exploiting vulnerability CVE-2022-40684 (FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface). | https://github.com/und3sc0n0c1d0/CVE-2022-40684 | POC详情 |
| 17 | None | https://github.com/qingsiweisan/CVE-2022-40684 | POC详情 |
| 18 | An authentication bypass using an alternate path or channel in Fortinet product | https://github.com/TaroballzChen/CVE-2022-40684-metasploit-scanner | POC详情 |
| 19 | Exploit Fortigate - CVE-2022-40684 | https://github.com/gustavorobertux/gotigate | POC详情 |
| 20 | None | https://github.com/hughink/CVE-2022-40684 | POC详情 |
| 21 | None | https://github.com/notareaperbutDR34P3r/CVE-2022-40684-Rust | POC详情 |
| 22 | 一键枚举所有用户名以及写入SSH公钥 | https://github.com/z-bool/CVE-2022-40684 | POC详情 |
| 23 | None | https://github.com/Anthony1500/CVE-2022-40684 | POC详情 |
| 24 | Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group | https://github.com/arsolutioner/fortigate-belsen-leak | POC详情 |
| 25 | None | https://github.com/Rofell0s/Fortigate-Leak-CVE-2022-40684 | POC详情 |
| 26 | Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group | https://github.com/AKboss1221/fortigate-belsen-leak | POC详情 |
| 27 | None | https://github.com/XalfiE/Fortigate-Belsen-Leak-Dump-CVE-2022-40684- | POC详情 |
| 28 | This repository contains informaion about the Fortigate firewall vulnerability (CVE-2022-40684) and affected data that were publicly disclosed by the Belsen Group. This information is being shared for security research and defensive purposes to help organizations identify if they were impacted. | https://github.com/niklasmato/fortileak-01-2025-Be | POC详情 |
| 29 | None | https://github.com/Yami0x777/Belsen_Group-et-exploitation-de-la-CVE-2022-40684 | POC详情 |
| 30 | Fortinet contains an authentication bypass vulnerability via using an alternate path or channel in FortiOS 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy 7.2.0 and 7.0.0 through 7.0.6, and FortiSwitchManager 7.2.0 and 7.0.0. An attacker can perform operations on the administrative interface via specially crafted HTTP or HTTPS requests, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-40684.yaml | POC详情 |
| 31 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/Fortinet%20FortiOS%20admin%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-40684.md | POC详情 |
| 32 | Exploit for CVE-2022-40684 vulnerability | https://github.com/dkstar11q/CVE-2022-40684 | POC详情 |
| 33 | Forti CVE-2022-40684 enumeration script built in Rust | https://github.com/xtwip/fortipwn | POC详情 |
| 34 | PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only) | https://github.com/ccordeiro/CVE-2022-40684 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论