Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
globalprotect vulnerabilities and exploits
(subscribe to this query)
490
VMScore
CVE-2020-1993
The GlobalProtect Portal feature in PAN-OS does not set a new session identifier after a successful user login, which allows session fixation attacks, if an attacker is able to control a user's session ID. This issue affects: All PAN-OS 7.1 and 8.0 versions; PAN-OS 8.1 versi...
Paloaltonetworks Pan-os
383
VMScore
CVE-2020-2005
A cross-site scripting (XSS) vulnerability exists when visiting malicious websites with the Palo Alto Networks GlobalProtect Clientless VPN that can compromise the user's active session. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier...
Paloaltonetworks Pan-os
445
VMScore
CVE-2017-7945
The GlobalProtect external interface in Palo Alto Networks PAN-OS prior to 6.1.17, 7.x prior to 7.0.15, 7.1.x prior to 7.1.9, and 8.x prior to 8.0.2 provides different error messages for failed login attempts depending on whether the username exists, which allows remote malicious...
Paloaltonetworks Pan-os 8.0.0
Paloaltonetworks Pan-os 7.1.4
Paloaltonetworks Pan-os 7.1.6
Paloaltonetworks Pan-os 7.1.8
Paloaltonetworks Pan-os 7.0.3
Paloaltonetworks Pan-os 7.0.5
Paloaltonetworks Pan-os 7.0.12
Paloaltonetworks Pan-os 7.0.14
Paloaltonetworks Pan-os 7.0.0
Paloaltonetworks Pan-os 7.0.1
Paloaltonetworks Pan-os 7.0.2
Paloaltonetworks Pan-os 7.1.1
Paloaltonetworks Pan-os 7.1.2
Paloaltonetworks Pan-os 7.1.3
Paloaltonetworks Pan-os 7.0.7
Paloaltonetworks Pan-os 7.0.8
Paloaltonetworks Pan-os 7.0.9
Paloaltonetworks Pan-os 7.0.10
Paloaltonetworks Pan-os 8.0.1
Paloaltonetworks Pan-os 7.1.0
Paloaltonetworks Pan-os 7.1.5
Paloaltonetworks Pan-os 7.1.7
829
VMScore
CVE-2021-3060
An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The at...
Paloaltonetworks Prisma Access 2.1
Paloaltonetworks Pan-os
2 Github repositories
668
VMScore
CVE-2019-16239
process_http_response in OpenConnect prior to 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
Infradead Openconnect
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Opensuse Leap 15.0
Opensuse Leap 15.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6