Palo-Alto-Expedition-Remote-Code
by result - Friday November 15, 2024 at 11:53 PM
#1
Critical Remote Code Execution Vulnerabilities in Palo Alto Expedition (Versions ≤ 1.2.91) 
CVE-2024-5910: A weakness that allows unauthenticated attackers to reset the administrator password to a default value, enabling unauthorized access.
CVE-2024-9464: A flaw enabling authenticated OS command injection, allowing arbitrary command execution in the context of the www-data user.

                                                                             
Hidden Content
You must register or login to view this content.
Reply
#2
Could be interesting

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#3
sounds good. Letś see
Reply
#4
30 hosts public facing. Pretty pointless to exploit, unless you're in their network.
ZeroNet
Contact me on Tox for faster replies
Reply
#5
Thank you bro, let's me check
Reply
#6
Thanks truly man

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#7
GREAT LETS LOOK AT TI
Reply
#8
Thanks u brother for your contrib, i will use that.
Reply
#9
Could be interesting
Reply
#10
THANKS FOR THE INFORMATION
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Dokan Pro Unauthenticated SQL Injection POC | CVSS 10 Loki 41 3,625 2 hours ago
Last Post: Xploitd
  {SECRET} DATABASE OF EXPLOITS lulagain 435 26,331 Today, 06:11 AM
Last Post: DirtyEra
  New Zer0 Day Wordpress A3g00n 81 3,332 Today, 03:06 AM
Last Post: DirtyEra
  Wordpress Elementor 3.11.6 Exploit - Full Takeover TheGoodlife 102 19,690 Yesterday, 06:45 AM
Last Post: eztocard
  new wordpress website takeover vuln (video + poc ) zinzeur 314 28,316 Apr 30, 2026, 03:54 PM
Last Post: baku

Forum Jump:


 Users browsing this forum: 1 Guest(s)