Lucene search

K
PaloaltonetworksPan-os9.0.17

5 matches found

CVE
CVE
added 2024/04/10 5:15 p.m.73 views

CVE-2024-3385

A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online. This affects the followin...

7.5CVSS7.4AI score0.01719EPSS
CVE
CVE
added 2024/04/10 5:15 p.m.72 views

CVE-2024-3388

A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal asset...

5CVSS6.5AI score0.00132EPSS
CVE
CVE
added 2024/04/10 5:15 p.m.65 views

CVE-2024-3386

An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software prevents Predefined Decryption Exclusions from functioning as intended. This can cause traffic destined for domains that are not specified in Predefined Decryption Exclusions to be unintentionally excluded from decry...

5.3CVSS6.7AI score0.00186EPSS
CVE
CVE
added 2024/02/14 6:15 p.m.60 views

CVE-2024-0008

Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthorized access.

8.8CVSS6.3AI score0.00249EPSS
CVE
CVE
added 2024/02/14 6:15 p.m.36 views

CVE-2024-0010

A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of a user’s browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential...

6.1CVSS4.5AI score0.0321EPSS