Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paloaltonetworks pan-os vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2019-1579
Remote Code Execution in PAN-OS 7.1.18 and previous versions, PAN-OS 8.0.11-h1 and previous versions, and PAN-OS 8.1.2 and previous versions with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote malicious user to execute arbitrar...
Paloaltonetworks Pan-os
1 Github repository
1 Article
6.6
CVSSv2
CVE-2018-9242
The PAN-OS management web interface page in PAN-OS 6.1.20 and previous versions, PAN-OS 7.1.16 and previous versions, PAN-OS 8.0.9 and previous versions may allow an malicious user to delete files in the system via specific request parameters.
Paloaltonetworks Pan-os
6.5
CVSSv2
CVE-2020-1998
An improper authorization vulnerability in PAN-OS that mistakenly uses the permissions of local linux users instead of the intended SAML permissions of the account when the username is shared for the purposes of SSO authentication. This can result in authentication bypass and uni...
Paloaltonetworks Pan-os
6.5
CVSSv2
CVE-2020-1975
Missing XML validation vulnerability in the PAN-OS web interface on Palo Alto Networks PAN-OS software allows authenticated users to inject arbitrary XML that results in privilege escalation. This issue affects PAN-OS 8.1 versions earlier than PAN-OS 8.1.12 and PAN-OS 9.0 version...
Paloaltonetworks Pan-os
6.5
CVSSv2
CVE-2019-1582
Memory corruption in PAN-OS 8.1.9 and previous versions, and PAN-OS 9.0.3 and previous versions will allow an administrative user to cause arbitrary memory corruption by rekeying the current client interactive session.
Paloaltonetworks Pan-os
6.5
CVSSv2
CVE-2019-1575
Information disclosure in PAN-OS 7.1.23 and previous versions, PAN-OS 8.0.18 and previous versions, PAN-OS 8.1.8-h4 and previous versions, and PAN-OS 9.0.2 and previous versions may allow for an authenticated user with read-only privileges to extract the API key of the device and...
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 8.1.8
6.5
CVSSv2
CVE-2019-1576
Command injection in PAN-0S 9.0.2 and previous versions may allow an authenticated malicious user to gain access to a remote shell in PAN-OS, and potentially run with the escalated user’s permissions.
Paloaltonetworks Pan-os
6.4
CVSSv2
CVE-2020-2050
An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an malicious user to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any use...
Paloaltonetworks Pan-os
6.3
CVSSv2
CVE-2012-6597
Palo Alto Networks PAN-OS prior to 3.1.11 and 4.0.x prior to 4.0.9 allows remote authenticated users to cause a denial of service (management-server crash) by using the command-line interface for a crafted command, aka Ref ID 35254.
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os
6
CVSSv2
CVE-2021-3062
An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-Series firewalls hosted on Amazon AWS. Exploitation of this vulnerability enable...
Paloaltonetworks Pan-os
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »