Show filters
44 Total Results
Displaying 11-20 of 44
Sort by:
Attacker Value
Unknown
CVE-2024-9468
Disclosure Date: October 09, 2024 (last updated October 10, 2024)
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.
0
Attacker Value
Unknown
CVE-2024-8687
Disclosure Date: September 11, 2024 (last updated October 03, 2024)
An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so.
0
Attacker Value
Unknown
CVE-2024-5911
Disclosure Date: July 10, 2024 (last updated July 11, 2024)
An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online.
0
Attacker Value
Unknown
CVE-2024-5906
Disclosure Date: June 12, 2024 (last updated August 08, 2024)
A cross-site scripting (XSS) vulnerability in Palo Alto Networks Prisma Cloud Compute software enables a malicious administrator with add/edit permissions for identity providers to store a JavaScript payload using the web interface on Prisma Cloud Compute. This enables a malicious administrator to perform actions in the context of another user's browser when accessed by that other user.
0
Attacker Value
Unknown
CVE-2024-3388
Disclosure Date: April 10, 2024 (last updated January 25, 2025)
A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.
0
Attacker Value
Unknown
CVE-2024-3387
Disclosure Date: April 10, 2024 (last updated April 11, 2024)
A weak (low bit strength) device certificate in Palo Alto Networks Panorama software enables an attacker to perform a meddler-in-the-middle (MitM) attack to capture encrypted traffic between the Panorama management server and the firewalls it manages. With sufficient computing resources, the attacker could break encrypted communication and expose sensitive information that is shared between the management server and the firewalls.
0
Attacker Value
Unknown
CVE-2024-2433
Disclosure Date: March 13, 2024 (last updated January 05, 2025)
An improper authorization vulnerability in Palo Alto Networks Panorama software enables an authenticated read-only administrator to upload files using the web interface and completely fill one of the disk partitions with those uploaded files, which prevents the ability to log into the web interface or to download PAN-OS, WildFire, and content images.
This issue affects only the web interface of the management plane; the dataplane is unaffected.
0
Attacker Value
Unknown
CVE-2023-25304
Disclosure Date: March 06, 2023 (last updated March 08, 2024)
An issue in Prism Launcher up to v6.1 allows attackers to perform a directory traversal via importing a crafted .mrpack file.
0
Attacker Value
Unknown
CVE-2022-36121
Disclosure Date: August 26, 2022 (last updated October 08, 2023)
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the UpdateOfflineHelpData administrative function. Abusing this function will allow any Blue Prism user to change the offline help URL to one of their choice, opening the possibility of spoofing the help page or executing a local file.
0
Attacker Value
Unknown
CVE-2022-36120
Disclosure Date: August 26, 2022 (last updated October 08, 2023)
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the getChartData administrative function. Using a low/no privilege Blue Prism user account, the attacker can alter the server's settings by abusing the getChartData method, allowing the Blue Prism server to execute any MSSQL stored procedure by name.
0