mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
6.5 KiB
6.5 KiB
CVE-2024-3400
Description
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
POC
Reference
- https://security.paloaltonetworks.com/CVE-2024-3400
- https://unit42.paloaltonetworks.com/cve-2024-3400/
Github
- https://github.com/0day404/HV-2024-POC
- https://github.com/0x0d3ad/CVE-2024-3400
- https://github.com/0xAj-Krishna/biggest-hack
- https://github.com/0xMarcio/cve
- https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection
- https://github.com/12442RF/POC
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/AboSteam/POPC
- https://github.com/AdaniKamal/CVE-2024-3400
- https://github.com/CONDITIONBLACK/CVE-2024-3400-POC
- https://github.com/CerTusHack/CVE-2024-3400-PoC
- https://github.com/Chocapikk/CVE-2024-3400
- https://github.com/Cyb3rTim/Cyber-Threat-Intelligence-Dashboard
- https://github.com/CyberBibs/Labs
- https://github.com/CyberBibs/SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400-
- https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-study
- https://github.com/DMW11525708/wiki
- https://github.com/DrewskyDev/CVE-2024-3400
- https://github.com/FoxyProxys/CVE-2024-3400
- https://github.com/GhostTroops/TOP
- https://github.com/H4lo/awesome-IoT-security-article
- https://github.com/HackingLZ/panrapidcheck
- https://github.com/Just-Hack-For-Fun/NOPTrace-Configs
- https://github.com/Kr0ff/cve-2024-3400
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Linxloop/fork_POC
- https://github.com/LoanVitor/CVE-2024-3400-
- https://github.com/MarcUrbano/CVE-PoC-Hunter
- https://github.com/MrR0b0t19/CVE-2024-3400
- https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker
- https://github.com/Ostorlab/KEV
- https://github.com/Ravaan21/CVE-2024-3400
- https://github.com/T43cr0wl3r/Gorilla_Sessions
- https://github.com/Tig3rHu/Awesome_IOT_Vul_lib
- https://github.com/Veridano/veridano-mcp-server
- https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan
- https://github.com/WatchDog1307/SOC-Web-attack-investigation
- https://github.com/WhosGa/MyWiki
- https://github.com/XiaomingX/CVE-2024-3400-poc
- https://github.com/Yuan08o/pocs
- https://github.com/Yuvvi01/CVE-2024-3400
- https://github.com/ZephrFish/CVE-2024-3400-Canary
- https://github.com/admin772/POC
- https://github.com/adminlove520/pocWiki
- https://github.com/adysec/POC
- https://github.com/ak1t4/CVE-2024-3400
- https://github.com/andrelia-hacks/CVE-2024-3400
- https://github.com/aneasystone/github-trending
- https://github.com/barkandbite/iranian-apt-detection
- https://github.com/cisp-pte/POC-20241008-sec-fork
- https://github.com/codeblueprint/CVE-2024-3400
- https://github.com/duggytuxy/Data-Shield_IPv4_Blocklist
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/enomothem/PenTestNote
- https://github.com/eswar152319/eswar
- https://github.com/fatguru/dorks
- https://github.com/febrian96r/Cybersecurity-Portfolio
- https://github.com/febrian96r/febrian96r
- https://github.com/fireinrain/github-trending
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/h4x0r-dz/CVE-2024-3400
- https://github.com/hackerhijeck/CVE-Exploit
- https://github.com/hahasagined/CVE-2024-3400
- https://github.com/hashdr1ft/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400
- https://github.com/iemotion/POC
- https://github.com/ihebski/CVE-2024-3400
- https://github.com/index2014/CVE-2024-3400-Checker
- https://github.com/iwallarm/cve-2024-3400
- https://github.com/jcaballero/cve-scanner
- https://github.com/k4nfr3/nmap-scripts
- https://github.com/kerberoshacker/CVE-2024-3400-POC
- https://github.com/kerberoshacker2/CVE-2024-3400-POC
- https://github.com/laoa1573/wy876
- https://github.com/lirantal/cve-cvss-calculator
- https://github.com/lodetomasi/zero-day-llm-ensemble
- https://github.com/maheavula/Incident-Investigation-Response
- https://github.com/marconesler/CVE-2024-3400
- https://github.com/momika233/CVE-2024-3400
- https://github.com/nanwinata/CVE-2024-3400
- https://github.com/netlas-io/netlas-dorks
- https://github.com/nitish778191/fitness_app
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oLy0/Vulnerability
- https://github.com/ozanunal0/viper
- https://github.com/patrickmgarrity/threatcon1-lab
- https://github.com/phantomradar/cve-2024-3400-poc
- https://github.com/picuslabs/Picus-Emerging-Threat-Response
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/pwnj0hn/CVE-2024-3400
- https://github.com/retkoussa/CVE-2024-3400
- https://github.com/schooldropout1337/CVE-2024-3400
- https://github.com/schooldropout1337/gorilla
- https://github.com/shreyxploit/ThreatLens
- https://github.com/stronglier/CVE-2024-3400
- https://github.com/swaybs/CVE-2024-3400
- https://github.com/sxyrxyy/CVE-2024-3400-Check
- https://github.com/t0chka1312/r3g4l1z-container2
- https://github.com/tanjiti/sec_profile
- https://github.com/terminalJunki3/CVE-2024-3400-Checker
- https://github.com/tfrederick74656/cve-2024-3400-poc
- https://github.com/tk-sawada/IPLineFinder
- https://github.com/toxyl/lscve
- https://github.com/v3153/v3153
- https://github.com/vulsio/go-cve-dictionary
- https://github.com/wjlin0/poc-doc
- https://github.com/workshop748/CVE-2024-3400
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
- https://github.com/xr0r/Dorks
- https://github.com/zam89/CVE-2024-3400-pot
- https://github.com/zhanpengliu-tencent/medium-cve