10
CVSSv2

CVE-2017-8390

Published: 02/08/2017 Updated: 17/02/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The DNS Proxy in Palo Alto Networks PAN-OS prior to 6.1.18, 7.x prior to 7.0.16, 7.1.x prior to 7.1.11, and 8.x prior to 8.0.3 allows remote malicious users to execute arbitrary code via a crafted domain name.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

paloaltonetworks pan-os

paloaltonetworks pan-os 7.0.1

paloaltonetworks pan-os 7.0.2

paloaltonetworks pan-os 7.0.3

paloaltonetworks pan-os 7.1.1

paloaltonetworks pan-os 7.1.2

paloaltonetworks pan-os 7.1.3

paloaltonetworks pan-os 7.1.4

paloaltonetworks pan-os 7.0.5

paloaltonetworks pan-os 7.0.7

paloaltonetworks pan-os 7.0.14

paloaltonetworks pan-os 7.0.10

paloaltonetworks pan-os 7.1.4-h2

paloaltonetworks pan-os 8.0.1

paloaltonetworks pan-os 7.0.6

paloaltonetworks pan-os 7.0.4

paloaltonetworks pan-os 7.1.9-h2

paloaltonetworks pan-os 7.0.15

paloaltonetworks pan-os 7.1.10

paloaltonetworks pan-os 7.0.9

paloaltonetworks pan-os 7.0.13

paloaltonetworks pan-os 8.0.2

paloaltonetworks pan-os 7.1.7

paloaltonetworks pan-os 7.1.0

paloaltonetworks pan-os 7.0.8

paloaltonetworks pan-os 7.1.9

paloaltonetworks pan-os 7.1.6

paloaltonetworks pan-os 7.0.11

paloaltonetworks pan-os 7.0.12

paloaltonetworks pan-os 7.1.8

paloaltonetworks pan-os 8.0.0