Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2020-1991
Disclosure Date: April 08, 2020 (last updated February 21, 2025)
An insecure temporary file vulnerability in Palo Alto Networks Traps allows a local authenticated Windows user to escalate privileges or overwrite system files. This issue affects Palo Alto Networks Traps 5.0 versions before 5.0.8; 6.1 versions before 6.1.4 on Windows. This issue does not affect Cortex XDR 7.0. This issue does not affect Traps for Linux or MacOS.
0
Attacker Value
Unknown
CVE-2019-1577
Disclosure Date: August 29, 2019 (last updated December 06, 2023)
Code injection vulnerability in Palo Alto Networks Traps 5.0.5 and earlier may allow an authenticated attacker to inject arbitrary JavaScript or HTML.
0
Attacker Value
Unknown
CVE-2019-1577
Disclosure Date: July 01, 2019 (last updated December 06, 2023)
Code injection vulnerability in Palo Alto Networks Traps 5.0.5 and earlier may allow an authenticated attacker to inject arbitrary JavaScript or HTML.
0
Attacker Value
Unknown
CVE-2017-7408
Disclosure Date: April 14, 2017 (last updated November 26, 2024)
Palo Alto Networks Traps ESM Console before 3.4.4 allows attackers to cause a denial of service by leveraging improper validation of requests to revoke a Traps agent license.
0
Attacker Value
Unknown
CVE-2015-2223
Disclosure Date: April 14, 2015 (last updated October 05, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in the web-based console management interface in Palo Alto Networks Traps (formerly Cyvera Endpoint Protection) 3.1.2.1546 allow remote attackers to inject arbitrary web script or HTML via the (1) Arguments, (2) FileName, or (3) URL parameter in a SOAP request.
0
Attacker Value
Unknown
CVE-2014-5723
Disclosure Date: September 09, 2014 (last updated October 05, 2023)
The Trapster (aka com.trapster.android) application 4.3.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0