Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paloaltonetworks pan-os vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2020-1999
A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that allows an malicious user to communicate with devices in the network in a way that is not analyzed for threats by sending data through specifically crafted TCP packets. This techniq...
Paloaltonetworks Pan-os
3.3
CVSSv3
CVE-2020-2048
An information exposure through log file vulnerability exists where the password for the configured system proxy server for a PAN-OS appliance may be displayed in cleartext when using the CLI in Palo Alto Networks PAN-OS software. This issue impacts: PAN-OS 8.1 versions earlier t...
Paloaltonetworks Pan-os
8.2
CVSSv3
CVE-2020-2050
An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an malicious user to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any use...
Paloaltonetworks Pan-os
7.2
CVSSv3
CVE-2020-2000
An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrary code and OS commands with root privileges. This issue impacts: PAN-OS 8.1 vers...
Paloaltonetworks Pan-os
7.5
CVSSv3
CVE-2020-2022
An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator's session to a managed device when the Panorama administrator performs a context switch into that device. This vulnerabi...
Paloaltonetworks Pan-os
3.3
CVSSv3
CVE-2020-2043
An information exposure through log file vulnerability where sensitive fields are recorded in the configuration log without masking on Palo Alto Networks PAN-OS software when the after-change-detail custom syslog field is enabled for configuration logs and the sensitive field app...
Paloaltonetworks Pan-os
3.3
CVSSv3
CVE-2020-2044
An information exposure through log file vulnerability where an administrator's password or other sensitive information may be logged in cleartext while using the CLI in Palo Alto Networks PAN-OS software. The opcmdhistory.log file was introduced to track operational command...
Paloaltonetworks Pan-os
5.3
CVSSv3
CVE-2020-2039
An uncontrolled resource consumption vulnerability in Palo Alto Networks PAN-OS allows for a remote unauthenticated user to upload temporary files through the management web interface that are not properly deleted after the request is finished. It is possible for an malicious use...
Paloaltonetworks Pan-os
9.8
CVSSv3
CVE-2020-2040
A buffer overflow vulnerability in PAN-OS allows an unauthenticated malicious user to disrupt system processes and potentially execute arbitrary code with root privileges by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface. This issue imp...
Paloaltonetworks Pan-os
1 Article
7.5
CVSSv3
CVE-2020-2041
An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unauthenticated user to send a specifically crafted request to the device that causes the appweb service to crash. Repeated attempts to send this request result in denial of service to...
Paloaltonetworks Pan-os
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »