{"vulnerability": "CVE-2024-9464", "sightings": [{"uuid": "189e8b61-4683-42c1-86dd-340b9b3cb98e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "seen", "source": "MISP/b7f8e58c-4b84-44c0-81ac-a4997844e1e6", "content": "", "creation_timestamp": "2024-10-28T17:07:02.000000Z"}, {"uuid": "f67139ac-51e2-44af-ba74-b9061236e68d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "seen", "source": "https://packetstormsecurity.com/files/182665/paloalto_expedition_rce.rb.txt", "content": "", "creation_timestamp": "2024-11-13T14:55:01.000000Z"}, {"uuid": "0636d30d-d5c5-416d-b511-da1a25b036f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "0f55c693-0fe7-4301-b8a3-8f21d55d1c27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:06.000000Z"}, {"uuid": "69e536ae-3101-49dd-bcc6-2a67f3866b83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-9464", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1393", "content": "", "creation_timestamp": "2024-10-10T04:00:00.000000Z"}, {"uuid": "ec99cc21-4edd-406a-8269-c48f75b93675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "0d62a7da-98ca-4755-82b2-67972862ff86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-9464", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_24/2024", "content": "", "creation_timestamp": "2024-10-10T12:00:25.000000Z"}, {"uuid": "281bfa36-dc68-4c88-9313-d4f4d27555cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8706", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof of Concept Exploit for CVE-2024-9464\nURL\uff1ahttps://github.com/horizon3ai/CVE-2024-9464\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-09T16:49:15.000000Z"}, {"uuid": "ccadff53-c53f-4b6d-a3f4-bcf255b38f39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2292", "content": "https://github.com/horizon3ai/CVE-2024-9464\n\nProof of Concept Exploit for CVE-2024-9464\n#github #exploit", "creation_timestamp": "2024-10-14T15:50:04.000000Z"}, {"uuid": "bc0b68c5-d6c7-40ef-b1f5-0f06c75a7dbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "Telegram/u-l-OUpMy672NqrhaJvWq0WJkTfPIBwNF7Vj0QnLsp6-too", "content": "", "creation_timestamp": "2024-10-14T15:50:05.000000Z"}, {"uuid": "510e1a05-6ddb-42a8-8aca-f0d677a899ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/19662", "content": "https://github.com/horizon3ai/CVE-2024-9464\n\nProof of Concept Exploit for CVE-2024-9464\n#github #exploit", "creation_timestamp": "2024-10-14T15:50:04.000000Z"}, {"uuid": "23dca9de-66a4-43f9-84fb-e69d875db765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "seen", "source": "https://t.me/cvedetector/7505", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9464 - Palo Alto Networks Expedition OS Command Injection vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9464 \nPublished : Oct. 9, 2024, 5:15 p.m. | 28\u00a0minutes ago \nDescription : An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-09T19:50:17.000000Z"}, {"uuid": "6bedc875-687d-431f-acb9-24b69cc9e2ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1085", "content": "Tools - Hackers Factory \n\nThis is the development tree. Production downloads are at:\n\nhttps://github.com/simsong/bulk_extractor\n\nZero Infrastructure Password Cracking\n\nhttps://github.com/JoelGMSec/Cloudtopolis\n\nGitHub - Exafunction/codeium-react-code-editor: AI-enabled code editor for React. Unlimited AI autocomplete capabilities with full Typescript support.\n\nhttps://github.com/Exafunction/codeium-react-code-editor\n\nA VMWare logger using built-in backdoor.\n\nhttps://github.com/Azvanzed/vmw-logger-rs\n\nProof of Concept Exploit for CVE-2024-9464\n\nhttps://github.com/horizon3ai/CVE-2024-9464\n\nNow You See Me, Now You Don't\n\nhttps://github.com/ZeroMemoryEx/Chaos-Rootkit\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nProof of concept of CVE-2024-3656 [Keycloak] low-privilege users to access administrative functionalities\n\nhttps://github.com/h4x0r-dz/CVE-2024-3656\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-23T05:32:04.000000Z"}, {"uuid": "5671c9d4-2036-4fec-8c40-deb8fc278db7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/1691", "content": "CVE-2024-9464\n*\nUnauthenticated Command Injection Vulnerability\n*\nExploit", "creation_timestamp": "2024-10-14T00:38:16.000000Z"}, {"uuid": "5a145c8f-b6dc-4ee0-a415-d774f1da568e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1084", "content": "Tools - Hackers Factory \n\nThis is the development tree. Production downloads are at:\n\nhttps://github.com/simsong/bulk_extractor\n\nZero Infrastructure Password Cracking\n\nhttps://github.com/JoelGMSec/Cloudtopolis\n\nGitHub - Exafunction/codeium-react-code-editor: AI-enabled code editor for React. Unlimited AI autocomplete capabilities with full Typescript support.\n\nhttps://github.com/Exafunction/codeium-react-code-editor\n\nA VMWare logger using built-in backdoor.\n\nhttps://github.com/Azvanzed/vmw-logger-rs\n\nProof of Concept Exploit for CVE-2024-9464\n\nhttps://github.com/horizon3ai/CVE-2024-9464\n\nNow You See Me, Now You Don't\n\nhttps://github.com/ZeroMemoryEx/Chaos-Rootkit\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nProof of concept of CVE-2024-3656 [Keycloak] low-privilege users to access administrative functionalities\n\nhttps://github.com/h4x0r-dz/CVE-2024-3656\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-23T05:29:04.000000Z"}, {"uuid": "72f14e18-278e-4def-b609-6ef2d23e9f8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24153", "content": "Tools - Hackers Factory \n\nThis is the development tree. Production downloads are at:\n\nhttps://github.com/simsong/bulk_extractor\n\nZero Infrastructure Password Cracking\n\nhttps://github.com/JoelGMSec/Cloudtopolis\n\nGitHub - Exafunction/codeium-react-code-editor: AI-enabled code editor for React. Unlimited AI autocomplete capabilities with full Typescript support.\n\nhttps://github.com/Exafunction/codeium-react-code-editor\n\nA VMWare logger using built-in backdoor.\n\nhttps://github.com/Azvanzed/vmw-logger-rs\n\nProof of Concept Exploit for CVE-2024-9464\n\nhttps://github.com/horizon3ai/CVE-2024-9464\n\nNow You See Me, Now You Don't\n\nhttps://github.com/ZeroMemoryEx/Chaos-Rootkit\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nProof of concept of CVE-2024-3656 [Keycloak] low-privilege users to access administrative functionalities\n\nhttps://github.com/h4x0r-dz/CVE-2024-3656\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-23T06:15:18.000000Z"}, {"uuid": "09cf1880-dc1f-47e9-8160-f70df0aae575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8899", "content": "Tools - Hackers Factory \n\nThis is the development tree. Production downloads are at:\n\nhttps://github.com/simsong/bulk_extractor\n\nZero Infrastructure Password Cracking\n\nhttps://github.com/JoelGMSec/Cloudtopolis\n\nGitHub - Exafunction/codeium-react-code-editor: AI-enabled code editor for React. Unlimited AI autocomplete capabilities with full Typescript support.\n\nhttps://github.com/Exafunction/codeium-react-code-editor\n\nA VMWare logger using built-in backdoor.\n\nhttps://github.com/Azvanzed/vmw-logger-rs\n\nProof of Concept Exploit for CVE-2024-9464\n\nhttps://github.com/horizon3ai/CVE-2024-9464\n\nNow You See Me, Now You Don't\n\nhttps://github.com/ZeroMemoryEx/Chaos-Rootkit\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nProof of concept of CVE-2024-3656 [Keycloak] low-privilege users to access administrative functionalities\n\nhttps://github.com/h4x0r-dz/CVE-2024-3656\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-23T06:15:12.000000Z"}, {"uuid": "7656e1b4-c458-4ed3-be3b-ca35adaa3a7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3317", "content": "https://github.com/horizon3ai/CVE-2024-9464\n\nProof of Concept Exploit for CVE-2024-9464\n#github #exploit", "creation_timestamp": "2024-10-14T15:24:55.000000Z"}, {"uuid": "43ab92f1-e325-4c9a-a8ec-78fd674d5270", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6304", "content": "\u0422\u0435\u043f\u0435\u0440\u044c \u043e \u0433\u0440\u0443\u0441\u0442\u043d\u043e\u043c, \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Fortinet RCE \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0420\u0435\u0447\u044c \u0438\u0434\u0435\u0442 \u043e CVE-2024-23113, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e \u0434\u0435\u043c\u043e\u043d fgfmd \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u0430 \u0441\u0442\u0440\u043e\u043a\u0443 \u0444\u043e\u0440\u043c\u0430\u0442\u0430, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u0443\u044e \u0438\u0437\u0432\u043d\u0435, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438\u043b\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u043d\u0435\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\u041a\u0430\u043a \u043f\u043e\u044f\u0441\u043d\u044f\u0435\u0442 Fortinet, \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u0434\u0435\u043c\u043e\u043d fgfmd \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 FortiGate \u0438 FortiManager, \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044f \u0432\u0441\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u043c\u0435\u0436\u0434\u0443 \u043d\u0438\u043c\u0438.\n\nCVE-2024-23113\u00a0\u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 FortiOS 7.0 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, FortiPAM 1.0 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, FortiProxy 7.0 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 FortiWeb 7.4.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0435\u0449\u0435 \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435, \u043f\u043e\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u0432 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0437\u0430\u043a\u0440\u044b\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0434\u0435\u043c\u043e\u043d\u0443 fgfmd \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u043e\u0432 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439, \u043f\u0440\u0438\u0437\u0432\u0430\u043d\u043d\u043e\u0439 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c Fortinet \u0434\u043e \u0441\u0438\u0445 \u043f\u043e\u0440 \u043d\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0430 \u0441\u0432\u043e\u0438 \u0444\u0435\u0432\u0440\u0430\u043b\u044c\u0441\u043a\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0447\u0430\u0441\u0442\u0438 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2024-23113, \u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0441\u0432\u043e\u0438\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0432 \u043d\u0435\u0432\u0435\u0434\u0435\u043d\u0438\u0438.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u0438 \u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430 Palo Alto Networks, \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0435\u043d\u044b \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u0437\u043b\u043e\u043c\u0430\u0442\u044c \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u044d\u043a\u0440\u0430\u043d\u044b PAN-OS. \u0421\u0440\u0435\u0434\u0438 \u043d\u0438\u0445:\n\n- CVE-2024-9463\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434)\n- CVE-2024-9464\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434)\n- CVE-2024-9465\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438)\n- CVE-2024-9466\u00a0(\u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0445\u0440\u0430\u043d\u044f\u0442\u0441\u044f \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435 \u0432 \u0436\u0443\u0440\u043d\u0430\u043b\u0430\u0445)\n- CVE-2024-9467\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c XSS \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438)\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u0438 Expedition. \u0418\u0445 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c (\u0438\u043c\u0435\u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043f\u0430\u0440\u043e\u043b\u0438, \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0438 \u043a\u043b\u044e\u0447\u0438 API \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u0432 PAN-OS), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0435 \u0443\u0442\u0435\u0447\u043a\u0438.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Horizon3.ai, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0435 \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u0432\u0448\u0438\u0435 \u043e \u0447\u0435\u0442\u044b\u0440\u0435\u0445 \u043e\u0448\u0438\u0431\u043a\u0430\u0445, \u0443\u0436\u0435 \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u043e\u0442\u0447\u0435\u0442, \u0430 Hanley - PoC, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0441\u0432\u044f\u0437\u044b\u0432\u0430\u0435\u0442 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u044e\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0431\u0440\u043e\u0441\u0430 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 CVE-2024-5910 \u0441 CVE-2024-9464 \u0434\u043b\u044f \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 Expedition.\n\n\u0412 Palo Alto Networks \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u043d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u043d\u0435\u0442 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0434\u043b\u044f \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a. \u041d\u043e \u044d\u0442\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u043a\u0430.\n\n\u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 Expedition \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u0432\u0441\u0435 \u0438\u043c\u0435\u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 \u043a\u043b\u044e\u0447\u0438 API, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0434\u043b\u044f \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430.\n\n\u0410\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435 \u043c\u043e\u0433\u0443\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0435\u0442\u0438 Expedition \u0434\u043b\u044f \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0445\u043e\u0441\u0442\u043e\u0432 \u0438\u043b\u0438 \u0441\u0435\u0442\u0435\u0439.", "creation_timestamp": "2024-10-10T13:17:11.000000Z"}, {"uuid": "df88f942-561a-4751-b2b0-ef4b547432ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3806", "content": "Tools - Hackers Factory \n\nThis is the development tree. Production downloads are at:\n\nhttps://github.com/simsong/bulk_extractor\n\nZero Infrastructure Password Cracking\n\nhttps://github.com/JoelGMSec/Cloudtopolis\n\nGitHub - Exafunction/codeium-react-code-editor: AI-enabled code editor for React. Unlimited AI autocomplete capabilities with full Typescript support.\n\nhttps://github.com/Exafunction/codeium-react-code-editor\n\nA VMWare logger using built-in backdoor.\n\nhttps://github.com/Azvanzed/vmw-logger-rs\n\nProof of Concept Exploit for CVE-2024-9464\n\nhttps://github.com/horizon3ai/CVE-2024-9464\n\nNow You See Me, Now You Don't\n\nhttps://github.com/ZeroMemoryEx/Chaos-Rootkit\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nProof of concept of CVE-2024-3656 [Keycloak] low-privilege users to access administrative functionalities\n\nhttps://github.com/h4x0r-dz/CVE-2024-3656\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-23T05:32:04.000000Z"}, {"uuid": "9861d485-d040-4df4-a60d-10f6a52a6902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7527", "content": "Tools - Hackers Factory \n\nThis is the development tree. Production downloads are at:\n\nhttps://github.com/simsong/bulk_extractor\n\nZero Infrastructure Password Cracking\n\nhttps://github.com/JoelGMSec/Cloudtopolis\n\nGitHub - Exafunction/codeium-react-code-editor: AI-enabled code editor for React. Unlimited AI autocomplete capabilities with full Typescript support.\n\nhttps://github.com/Exafunction/codeium-react-code-editor\n\nA VMWare logger using built-in backdoor.\n\nhttps://github.com/Azvanzed/vmw-logger-rs\n\nProof of Concept Exploit for CVE-2024-9464\n\nhttps://github.com/horizon3ai/CVE-2024-9464\n\nNow You See Me, Now You Don't\n\nhttps://github.com/ZeroMemoryEx/Chaos-Rootkit\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nProof of concept of CVE-2024-3656 [Keycloak] low-privilege users to access administrative functionalities\n\nhttps://github.com/h4x0r-dz/CVE-2024-3656\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-23T06:15:12.000000Z"}, {"uuid": "ece9efbe-fae1-48e8-ae95-e29e2183418b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2304", "content": "CVE-2024-9464\n*\n\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434\n*\nExploit", "creation_timestamp": "2024-10-13T22:47:58.000000Z"}, {"uuid": "b12abe31-b5e4-4e93-873a-350197933777", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11290", "content": "#exploit\n1. CVE-2024-35250:\nWindows 11 Kernel-Mode Driver EoP/LPE\nhttps://github.com/varwara/CVE-2024-35250\n\n2. CVE-2024-44193:\niTunes for Windows - LPE\nhttps://github.com/mbog14/CVE-2024-44193\n\n3. CVE-2024-9464:\nPalo Alto Expedition Authenticated CI\nhttps://github.com/horizon3ai/CVE-2024-9464", "creation_timestamp": "2024-10-16T22:23:49.000000Z"}, {"uuid": "7071b6ea-7b59-4825-a3fb-78f7468c1c8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/540", "content": "Tools - Hackers Factory \n\nThis is the development tree. Production downloads are at:\n\nhttps://github.com/simsong/bulk_extractor\n\nZero Infrastructure Password Cracking\n\nhttps://github.com/JoelGMSec/Cloudtopolis\n\nGitHub - Exafunction/codeium-react-code-editor: AI-enabled code editor for React. Unlimited AI autocomplete capabilities with full Typescript support.\n\nhttps://github.com/Exafunction/codeium-react-code-editor\n\nA VMWare logger using built-in backdoor.\n\nhttps://github.com/Azvanzed/vmw-logger-rs\n\nProof of Concept Exploit for CVE-2024-9464\n\nhttps://github.com/horizon3ai/CVE-2024-9464\n\nNow You See Me, Now You Don't\n\nhttps://github.com/ZeroMemoryEx/Chaos-Rootkit\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nProof of concept of CVE-2024-3656 [Keycloak] low-privilege users to access administrative functionalities\n\nhttps://github.com/h4x0r-dz/CVE-2024-3656\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-23T06:15:18.000000Z"}]}