The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Palo Alto PAN-OS

Palo Alto PAN-OS: information disclosure via Logged Passwords
An attacker can bypass access restrictions to data via Logged Passwords of Palo Alto PAN-OS, in order to obtain sensitive information...
CERTFR-2020-AVI-566, CVE-2020-2044, PAN-135262, VIGILANCE-VUL-33305
Palo Alto PAN-OS: information disclosure via Logged Passwords
An attacker can bypass access restrictions to data via Logged Passwords of Palo Alto PAN-OS, in order to obtain sensitive information...
CERTFR-2020-AVI-566, CVE-2020-2043, PAN-146837, VIGILANCE-VUL-33304
Palo Alto PAN-OS: privilege escalation via Management Web Interface
An attacker can bypass restrictions via Management Web Interface of Palo Alto PAN-OS, in order to escalate his privileges...
CERTFR-2020-AVI-566, CVE-2020-2042, PAN-145797, PAN-150409, VIGILANCE-VUL-33303
Palo Alto PAN-OS: code execution via OS Command Injection
An attacker can use a vulnerability via OS Command Injection of Palo Alto PAN-OS, in order to run code...
CERTFR-2020-AVI-566, CVE-2020-2038, PAN-101484, VIGILANCE-VUL-33299
Palo Alto PAN-OS: code execution via OS Command Injection
An attacker can use a vulnerability via OS Command Injection of Palo Alto PAN-OS, in order to run code...
CERTFR-2020-AVI-566, CVE-2020-2037, PAN-128761, VIGILANCE-VUL-33298
PAN-OS: information disclosure via SSL/TLS Forward Proxy Decryption URL Filtering Bypass
An attacker can bypass access restrictions to data via SSL/TLS Forward Proxy Decryption URL Filtering Bypass of PAN-OS, in order to obtain sensitive information...
CVE-2020-2035, VIGILANCE-VUL-33072
PAN-OS: code execution via GlobalProtect OS Command Injection
An attacker can use a vulnerability via GlobalProtect OS Command Injection of PAN-OS, in order to run code...
CERTFR-2020-AVI-419, CVE-2020-2034, VIGILANCE-VUL-32785
PAN-OS: memory corruption via Management Interface
An attacker can trigger a memory corruption via Management Interface of PAN-OS, in order to trigger a denial of service, and possibly to run code...
CERTFR-2020-AVI-419, CVE-2020-2031, VIGILANCE-VUL-32784
PAN-OS: code execution via OS Command Injection
An attacker can use a vulnerability via OS Command Injection of PAN-OS, in order to run code...
CERTFR-2020-AVI-419, CVE-2020-2030, VIGILANCE-VUL-32783
PAN-OS: information disclosure via TLS 1.0 Usage
An attacker can bypass access restrictions to data via TLS 1.0 Usage of PAN-OS, in order to obtain sensitive information...
CERTFR-2020-AVI-419, CVE-2020-1982, VIGILANCE-VUL-32782
Our database contains other pages. You can request a free trial to read them.

Display information about Palo Alto PAN-OS: