10
CVE-2017-8390
- EPSS 14.68%
- Veröffentlicht 02.08.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
The DNS Proxy in Palo Alto Networks PAN-OS before 6.1.18, 7.x before 7.0.16, 7.1.x before 7.1.11, and 8.x before 8.0.3 allows remote attackers to execute arbitrary code via a crafted domain name.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Paloaltonetworks ≫ Pan-os Version <= 6.1.17
Paloaltonetworks ≫ Pan-os Version7.0.1
Paloaltonetworks ≫ Pan-os Version7.0.2
Paloaltonetworks ≫ Pan-os Version7.0.3
Paloaltonetworks ≫ Pan-os Version7.0.4
Paloaltonetworks ≫ Pan-os Version7.0.5
Paloaltonetworks ≫ Pan-os Version7.0.6
Paloaltonetworks ≫ Pan-os Version7.0.7
Paloaltonetworks ≫ Pan-os Version7.0.8
Paloaltonetworks ≫ Pan-os Version7.0.9
Paloaltonetworks ≫ Pan-os Version7.0.10
Paloaltonetworks ≫ Pan-os Version7.0.11
Paloaltonetworks ≫ Pan-os Version7.0.12
Paloaltonetworks ≫ Pan-os Version7.0.13
Paloaltonetworks ≫ Pan-os Version7.0.14
Paloaltonetworks ≫ Pan-os Version7.0.15
Paloaltonetworks ≫ Pan-os Version7.1.0
Paloaltonetworks ≫ Pan-os Version7.1.1
Paloaltonetworks ≫ Pan-os Version7.1.2
Paloaltonetworks ≫ Pan-os Version7.1.3
Paloaltonetworks ≫ Pan-os Version7.1.4
Paloaltonetworks ≫ Pan-os Version7.1.4-h2
Paloaltonetworks ≫ Pan-os Version7.1.6
Paloaltonetworks ≫ Pan-os Version7.1.7
Paloaltonetworks ≫ Pan-os Version7.1.8
Paloaltonetworks ≫ Pan-os Version7.1.9
Paloaltonetworks ≫ Pan-os Version7.1.9-h2
Paloaltonetworks ≫ Pan-os Version7.1.10
Paloaltonetworks ≫ Pan-os Version8.0.0
Paloaltonetworks ≫ Pan-os Version8.0.1
Paloaltonetworks ≫ Pan-os Version8.0.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 14.68% | 0.942 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.