尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Palo Alto Networks | PAN-OS | 10.2.0 ~ 10.2.9-h1 | - | |
| Palo Alto Networks | Cloud NGFW | - | - | |
| Palo Alto Networks | Prisma Access | - | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | This script is designed to demonstrate the exploitation of vulnerabilities in PAN-OS firewalls. It sends a specially crafted payload to the firewall's API endpoint to execute arbitrary commands. | https://github.com/DrewskyDev/CVE-2024-3400 | POC详情 |
| 2 | CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software | https://github.com/bigsclowns/CVE-2024-3400-POC | POC详情 |
| 3 | None | https://github.com/Yuvvi01/CVE-2024-3400 | POC详情 |
| 4 | CVE-2024-3400 Checker | https://github.com/shamo0/CVE-2024-3400 | POC详情 |
| 5 | None | https://github.com/CerTusHack/CVE-2024-3400-PoC | POC详情 |
| 6 | None | https://github.com/0x0d3ad/CVE-2024-3400 | POC详情 |
| 7 | None | https://github.com/FoxyProxys/CVE-2024-3400 | POC详情 |
| 8 | None | https://github.com/momika233/CVE-2024-3400 | POC详情 |
| 9 | CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software | https://github.com/kerberoshacker/CVE-2024-3400-POC | POC详情 |
| 10 | Vulnerabilidad de palo alto | https://github.com/MrR0b0t19/CVE-2024-3400 | POC详情 |
| 11 | A simple bash script to check for evidence of compromise related to CVE-2024-3400 | https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker | POC详情 |
| 12 | CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software | https://github.com/kerberoshacker2/CVE-2024-3400-POC | POC详情 |
| 13 | CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect | https://github.com/AdaniKamal/CVE-2024-3400 | POC详情 |
| 14 | None | https://github.com/LoanVitor/CVE-2024-3400- | POC详情 |
| 15 | CVE-2024-3400 Palo Alto OS Command Injection | https://github.com/h4x0r-dz/CVE-2024-3400 | POC详情 |
| 16 | CVE-2024-3400 | https://github.com/W01fh4cker/CVE-2024-3400 | POC详情 |
| 17 | None | https://github.com/CONDITIONBLACK/CVE-2024-3400-POC | POC详情 |
| 18 | None | https://github.com/Chocapikk/CVE-2024-3400 | POC详情 |
| 19 | CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect | https://github.com/ihebski/CVE-2024-3400 | POC详情 |
| 20 | CVE-2024-3400-RCE | https://github.com/W01fh4cker/CVE-2024-3400-RCE | POC详情 |
| 21 | A check program for CVE-2024-3400, Palo Alto PAN-OS unauthenticated command injection vulnerability. Palo Alto 防火墙 PAN-OS 远程命令注入检测程序。 | https://github.com/index2014/CVE-2024-3400-Checker | POC详情 |
| 22 | CVE-2024-3400-RCE | https://github.com/admi-n/CVE-2024-3400-RCE-copy | POC详情 |
| 23 | Have we not learnt from HoneyPoC? | https://github.com/ZephrFish/CVE-2024-3400-Canary | POC详情 |
| 24 | Global Protec Palo Alto File Write Exploit | https://github.com/ak1t4/CVE-2024-3400 | POC详情 |
| 25 | Simple POC for CVE-2024-3400 | https://github.com/phantomradar/cve-2024-3400-poc | POC详情 |
| 26 | CVE-2024-3400 : Palo Alto OS Command Injection - POC | https://github.com/retkoussa/CVE-2024-3400 | POC详情 |
| 27 | None | https://github.com/schooldropout1337/CVE-2024-3400 | POC详情 |
| 28 | EDL for IPs attacking customers with CVE-2024-3400 | https://github.com/hahasagined/CVE-2024-3400 | POC详情 |
| 29 | Simple Python code to check for arbitrary uploading | https://github.com/codeblueprint/CVE-2024-3400 | POC详情 |
| 30 | Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts | https://github.com/swaybs/CVE-2024-3400 | POC详情 |
| 31 | None | https://github.com/sxyrxyy/CVE-2024-3400-Check | POC详情 |
| 32 | CVE-2024-3400 POC written in Rust and Python | https://github.com/Ravaan21/CVE-2024-3400 | POC详情 |
| 33 | Finding Palo Alto devices vulnerable to CVE-2024-3400. | https://github.com/pwnj0hn/CVE-2024-3400 | POC详情 |
| 34 | CVE-2024-3400-RCE | https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan | POC详情 |
| 35 | Extract useful information from PANOS support file for CVE-2024-3400 | https://github.com/HackingLZ/panrapidcheck | POC详情 |
| 36 | Exploit for CVE-2024-3400 | https://github.com/stronglier/CVE-2024-3400 | POC详情 |
| 37 | Python exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creation | https://github.com/Kr0ff/cve-2024-3400 | POC详情 |
| 38 | Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability | https://github.com/zam89/CVE-2024-3400-pot | POC详情 |
| 39 | Check to see if your Palo Alto firewall has been compromised by running script againt support bundle. | https://github.com/terminalJunki3/CVE-2024-3400-Checker | POC详情 |
| 40 | None | https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection | POC详情 |
| 41 | Exploit for GlobalProtect CVE-2024-3400 | https://github.com/marconesler/CVE-2024-3400 | POC详情 |
| 42 | None | https://github.com/andrelia-hacks/CVE-2024-3400 | POC详情 |
| 43 | Find rows contain specific IP addresses in large files and then, extract them. This tool make for investigating logs for cve-2024-3400 | https://github.com/tk-sawada/IPLineFinder | POC详情 |
| 44 | None | https://github.com/iwallarm/cve-2024-3400 | POC详情 |
| 45 | Simple POC for CVE-2024-3400 | https://github.com/tfrederick74656/cve-2024-3400-poc | POC详情 |
| 46 | Attempt at making the CVE-2024-3400 initial exploit (for educational purposes) | https://github.com/workshop748/CVE-2024-3400 | POC详情 |
| 47 | CVE-2024-3400 PAN-OS Vulnerability Scanner. | https://github.com/nanwinata/CVE-2024-3400 | POC详情 |
| 48 | CVE-2024-3400的攻击脚本 | https://github.com/XiaomingX/CVE-2024-3400-poc | POC详情 |
| 49 | None | https://github.com/drake044/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400 | POC详情 |
| 50 | None | https://github.com/hashdr1ft/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400 | POC详情 |
| 51 | A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-3400.yaml | POC详情 |
| 52 | Detection, analysis, and response strategies for CVE-2024-3400 exploitation attempts targeting Palo Alto PAN-OS GlobalProtect portals. Includes IOCs, exploit patterns, and mitigation guidance. | https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-study | POC详情 |
| 53 | An AI-powered tool to predict and prevent zero-day attacks on firewalls, like Palo Alto’s CVE-2024-3400. Uses Python, Wireshark, MITRE ATT&CK datasets, and Docker for real-time anomaly detection. | https://github.com/Rohith-Reddy-Y/Zero-Day-Vulnerability-Exploitation-Detection-Tool | POC详情 |
| 54 | None | https://github.com/CyberBibs/SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400- | POC详情 |
| 55 | CS50 Cybersecurity final project — Palo Alto OAuth token breach (CVE-2024-3400) | https://github.com/Yafiah-Darwesh/cs50-cyber-paloalto-oauth | POC详情 |
| 56 | CVE-2024-3400的攻击脚本 | https://github.com/GhassanSabir/CVE-2024-3400-poc | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论