2025-09-29 16:08:36 +00:00
### [CVE-2024-9465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9465)

2025-09-29 21:09:30 +02:00

& color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.
### POC
#### Reference
- https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/
#### Github
- https://github.com/12442RF/POC
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2025-09-29 16:08:36 +00:00
- https://github.com/DMW11525708/wiki
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Linxloop/fork_POC
- https://github.com/Ostorlab/KEV
- https://github.com/Qlng/CVE-2024-9465
2025-09-29 21:09:30 +02:00
- https://github.com/SecNN/SecNN-Wiki
2025-09-29 16:08:36 +00:00
- https://github.com/XiaomingX/cve-2024-9465-poc
- https://github.com/adysec/POC
2025-09-29 21:09:30 +02:00
- https://github.com/cyb3r-w0lf/nuclei-template-collection
2025-09-29 16:08:36 +00:00
- https://github.com/eeeeeeeeee-code/POC
2025-09-29 21:09:30 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
2025-09-29 16:08:36 +00:00
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/horizon3ai/CVE-2024-9465
- https://github.com/iemotion/POC
- https://github.com/laoa1573/wy876
2025-09-29 21:09:30 +02:00
- https://github.com/mustafaakalin/CVE-2024-9465
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/oLy0/Vulnerability
- https://github.com/packetinside/CISA_BOT
- https://github.com/plbplbp/loudong001
2025-09-29 21:09:30 +02:00
- https://github.com/ums91/CISA_BOT
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
2025-09-29 16:08:36 +00:00