Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
globalprotect vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv3
CVE-2020-1993
The GlobalProtect Portal feature in PAN-OS does not set a new session identifier after a successful user login, which allows session fixation attacks, if an attacker is able to control a user's session ID. This issue affects: All PAN-OS 7.1 and 8.0 versions; PAN-OS 8.1 versi...
Paloaltonetworks Pan-os
6.1
CVSSv3
CVE-2020-2005
A cross-site scripting (XSS) vulnerability exists when visiting malicious websites with the Palo Alto Networks GlobalProtect Clientless VPN that can compromise the user's active session. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier...
Paloaltonetworks Pan-os
9.8
CVSSv3
CVE-2017-7945
The GlobalProtect external interface in Palo Alto Networks PAN-OS prior to 6.1.17, 7.x prior to 7.0.15, 7.1.x prior to 7.1.9, and 8.x prior to 8.0.2 provides different error messages for failed login attempts depending on whether the username exists, which allows remote malicious...
Paloaltonetworks Pan-os 8.0.0
Paloaltonetworks Pan-os 7.1.4
Paloaltonetworks Pan-os 7.1.6
Paloaltonetworks Pan-os 7.1.8
Paloaltonetworks Pan-os 7.0.3
Paloaltonetworks Pan-os 7.0.5
Paloaltonetworks Pan-os 7.0.12
Paloaltonetworks Pan-os 7.0.14
Paloaltonetworks Pan-os 7.0.0
Paloaltonetworks Pan-os 7.0.1
Paloaltonetworks Pan-os 7.0.2
Paloaltonetworks Pan-os 7.1.1
Paloaltonetworks Pan-os 7.1.2
Paloaltonetworks Pan-os 7.1.3
Paloaltonetworks Pan-os 7.0.7
Paloaltonetworks Pan-os 7.0.8
Paloaltonetworks Pan-os 7.0.9
Paloaltonetworks Pan-os 7.0.10
Paloaltonetworks Pan-os 8.0.1
Paloaltonetworks Pan-os 7.1.0
Paloaltonetworks Pan-os 7.1.5
Paloaltonetworks Pan-os 7.1.7
8.1
CVSSv3
CVE-2021-3060
An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The at...
Paloaltonetworks Prisma Access 2.1
Paloaltonetworks Pan-os
2 Github repositories
9.8
CVSSv3
CVE-2019-16239
process_http_response in OpenConnect prior to 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
Infradead Openconnect
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Opensuse Leap 15.0
Opensuse Leap 15.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6