尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Palo Alto Networks | Cloud NGFW | - | - | |
| Palo Alto Networks | PAN-OS | 11.2.0 ~ 11.2.4-h1 | cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:* | |
| Palo Alto Networks | Prisma Access | - | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/watchtowrlabs/palo-alto-panos-cve-2024-0012 | POC详情 |
| 2 | CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC | https://github.com/Sachinart/CVE-2024-0012-POC | POC详情 |
| 3 | PANW NGFW CVE-2024-0012 | https://github.com/greaselovely/CVE-2024-0012 | POC详情 |
| 4 | Palo Alto CVE-2024-0012 Exploit POC | https://github.com/VegetableLasagne/CVE-2024-0012 | POC详情 |
| 5 | CVE-2024-0012批量检测脚本 | https://github.com/iSee857/CVE-2024-0012-poc | POC详情 |
| 6 | CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面,获取PAN-OS管理员权限,从而执行管理操作、篡改配置,或利用其他需要身份验证的特权提升漏洞(如CVE-2024-9474) | https://github.com/XiaomingX/cve-2024-0012-poc | POC详情 |
| 7 | None | https://github.com/PunitTailor55/Paloalto-CVE-2024-0012 | POC详情 |
| 8 | CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC | https://github.com/0xjessie21/CVE-2024-0012 | POC详情 |
| 9 | None | https://github.com/punitdarji/Paloalto-CVE-2024-0012 | POC详情 |
| 10 | This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution. | https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC | POC详情 |
| 11 | Python script for CVE-2024-0012 / CVE-2024-9474 exploit | https://github.com/dcollaoa/cve-2024-0012-gui-poc | POC详情 |
| 12 | An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-0012.yaml | POC详情 |
| 13 | Exploitation and Post-Exploitation Multitool for Palo Alto PAN-OS Systems affected by vulnerabilities CVE-2024-0012 and CVE-2024-9474 | https://github.com/Regent8SH/PanOsExploitMultitool | POC详情 |
| 14 | CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面,获取PAN-OS管理员权限,从而执行管理操作、篡改配置,或利用其他需要身份验证的特权提升漏洞(如CVE-2024-9474) | https://github.com/Gr-1m/cve-2024-0012-poc | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论