Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paloaltonetworks vulnerabilities and exploits
(subscribe to this query)
6.7
CVSSv3
CVE-2022-0031
A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system allows a local attacker with shell access to the engine to execute programs with elevated privileges.
Paloaltonetworks Cortex Xsoar 6.5.0
Paloaltonetworks Cortex Xsoar 6.6.0
Paloaltonetworks Cortex Xsoar 6.8.0
6.3
CVSSv3
CVE-2023-0006
A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a user to delete system files from the endpoint with elevated privileges through a race condition.
Paloaltonetworks Globalprotect 6.1.0
Paloaltonetworks Globalprotect
8.1
CVSSv3
CVE-2021-3057
A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle malicious user to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 vers...
Paloaltonetworks Globalprotect
Paloaltonetworks Globalprotect 5.0
7.8
CVSSv3
CVE-2023-0009
A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.
Paloaltonetworks Globalprotect 6.1.0
Paloaltonetworks Globalprotect
7.8
CVSSv3
CVE-2020-2049
A local privilege escalation vulnerability exists in Palo Alto Networks Cortex XDR Agent on the Windows platform that allows an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows...
Paloaltonetworks Cortex Xdr Agent
Paloaltonetworks Cortex Xdr Agent 7.1
Paloaltonetworks Cortex Xdr Agent 7.2
7.8
CVSSv3
CVE-2021-3042
A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creatio...
Paloaltonetworks Cortex Xdr Agent 6.1
Paloaltonetworks Cortex Xdr Agent 7.2
Paloaltonetworks Cortex Xdr Agent 7.3
5.3
CVSSv3
CVE-2017-6356
Palo Alto Networks Terminal Services (aka TS) Agent 6.0, 7.0, and 8.0 prior to 8.0.1 uses weak permissions for unspecified resources, which allows malicious users to obtain sensitive session information via unknown vectors.
Paloaltonetworks Terminal Services Agent 6.0
Paloaltonetworks Terminal Services Agent 7.0
Paloaltonetworks Terminal Services Agent 8.0
6.5
CVSSv3
CVE-2023-0003
A file disclosure vulnerability in the Palo Alto Networks Cortex XSOAR server software enables an authenticated user with access to the web interface to read local files from the server.
Paloaltonetworks Cortex Xsoar 6.8.0
Paloaltonetworks Cortex Xsoar 6.6.0
Paloaltonetworks Cortex Xsoar
Paloaltonetworks Cortex Xsoar 6.9.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
1 Github repository
8.8
CVSSv3
CVE-2019-1575
Information disclosure in PAN-OS 7.1.23 and previous versions, PAN-OS 8.0.18 and previous versions, PAN-OS 8.1.8-h4 and previous versions, and PAN-OS 9.0.2 and previous versions may allow for an authenticated user with read-only privileges to extract the API key of the device and...
Paloaltonetworks Pan-os 8.1.8
Paloaltonetworks Pan-os
8.8
CVSSv3
CVE-2021-3056
A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated malicious user to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; ...
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 10.0.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »