Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Palo Alto Networks | PAN-OS | 8.1.* | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit to capitalize on vulnerability CVE-2020-2038. | https://github.com/und3sc0n0c1d0/CVE-2020-2038 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-2040 | 9.8 CRITICAL | PAN-OS: Buffer overflow when Captive Portal or Multi-Factor Authentication (MFA) is enable |
| CVE-2020-2036 | 8.8 HIGH | PAN-OS: Reflected Cross-Site Scripting (XSS) vulnerability in management web interface |
| CVE-2020-2041 | 7.5 HIGH | PAN-OS: Management web interface denial-of-service (DoS) |
| CVE-2020-2037 | 7.2 HIGH | PAN-OS: OS command injection vulnerability in the management web interface |
| CVE-2020-2042 | 7.2 HIGH | PAN-OS: Buffer overflow in the management web interface |
| CVE-2020-2039 | 5.3 MEDIUM | PAN-OS: Management web interface denial-of-service (DoS) through unauthenticated file uplo |
| CVE-2020-2043 | 3.3 LOW | PAN-OS: Passwords may be logged in clear text when using after-change-detail custom syslog |
| CVE-2020-2044 | 3.3 LOW | PAN-OS: Passwords may be logged in clear text while storing operational command (op comman |
No comments yet