CVE-2022-0018
- EPSS 0.25%
- Veröffentlicht 10.02.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:37:49
An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the Globa...
CVE-2022-0017
- EPSS 0.04%
- Veröffentlicht 10.02.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:37:49
An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM...
CVE-2022-0016
- EPSS 0.15%
- Veröffentlicht 10.02.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:37:49
An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Co...
CVE-2021-3057
- EPSS 0.7%
- Veröffentlicht 13.10.2021 16:15:07
- Zuletzt bearbeitet 21.11.2024 06:20:52
A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: Gl...
CVE-2021-3038
- EPSS 0.05%
- Veröffentlicht 20.04.2021 04:15:12
- Zuletzt bearbeitet 21.11.2024 06:20:48
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. ...
CVE-2020-2033
- EPSS 0.03%
- Veröffentlicht 10.06.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 05:24:30
When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability...
- EPSS 0.1%
- Veröffentlicht 10.06.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 05:24:30
A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue a...
CVE-2020-2004
- EPSS 0.06%
- Veröffentlicht 13.05.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:24:25
Under certain circumstances a user's password may be logged in cleartext in the PanGPS.log diagnostic file when logs are collected for troubleshooting on GlobalProtect app (also known as GlobalProtect Agent) for MacOS and Windows. For this issue to o...
CVE-2020-1989
- EPSS 0.11%
- Veröffentlicht 08.04.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:47
An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affec...
CVE-2020-1988
- EPSS 0.13%
- Veröffentlicht 08.04.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:47
An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\) or to Program Files directory to gain system privileges. This issue...