Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Palo Alto Networks | PAN-OS | 9.0 ~ 9.0.9 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PAN-OS management web interface is vulnerable to reflected cross-site scripting. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-2036.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-2040 | 9.8 CRITICAL | PAN-OS: Buffer overflow when Captive Portal or Multi-Factor Authentication (MFA) is enable |
| CVE-2020-2041 | 7.5 HIGH | PAN-OS: Management web interface denial-of-service (DoS) |
| CVE-2020-2037 | 7.2 HIGH | PAN-OS: OS command injection vulnerability in the management web interface |
| CVE-2020-2038 | 7.2 HIGH | PAN-OS: OS command injection vulnerability in the management web interface |
| CVE-2020-2042 | 7.2 HIGH | PAN-OS: Buffer overflow in the management web interface |
| CVE-2020-2039 | 5.3 MEDIUM | PAN-OS: Management web interface denial-of-service (DoS) through unauthenticated file uplo |
| CVE-2020-2043 | 3.3 LOW | PAN-OS: Passwords may be logged in clear text when using after-change-detail custom syslog |
| CVE-2020-2044 | 3.3 LOW | PAN-OS: Passwords may be logged in clear text while storing operational command (op comman |
No comments yet