Does anyone know how to exploit CVE-2024-3400? I've detected a lot of them but I don't know how to confirm if they have this vulnerability. Can anyone help me?
Код:
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://apps.ibb.gov.tr/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://apps.pspa.punjab.gov.pk/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://arabic.ruw.edu.bh:2086/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://apuntec.fra.utn.edu.ar:8020/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://arcee.website/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://arch.asu.edu.eg:8020/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://archives.gov.mn/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://argos.met.gov.fj:8020/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://arizonschool.edu.kh:2095/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://arms.bhutanaudit.gov.bt:8020/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://arts.asu.edu.eg:8020/ssl-vpn/hipreport.esp
[palo-alto-networks-pan-os-command-injection] [http] [critical] http://artline.com.eg/ssl-vpn/hipreport.esp
