Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paloaltonetworks pan-os 4.0.2 vulnerabilities and exploits
(subscribe to this query)
801
VMScore
CVE-2012-6602
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.10 and 4.0.x prior to 4.0.4 allows remote authenticated users to execute arbitrary commands via unspecified vectors, aka Ref ID 30122.
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
801
VMScore
CVE-2012-6604
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.11 and 4.0.x prior to 4.0.9 allows remote authenticated users to execute arbitrary code via unspecified vectors, aka Ref ID 35249.
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 3.1.9
801
VMScore
CVE-2012-6605
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.11 and 4.0.x prior to 4.0.9 allows remote authenticated users to execute arbitrary code via unspecified vectors, aka Ref ID 34896.
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
561
VMScore
CVE-2012-6597
Palo Alto Networks PAN-OS prior to 3.1.11 and 4.0.x prior to 4.0.9 allows remote authenticated users to cause a denial of service (management-server crash) by using the command-line interface for a crafted command, aka Ref ID 35254.
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os
445
VMScore
CVE-2012-6596
Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.3 stores cleartext LDAP bind passwords in authd.log, which allows context-dependent malicious users to obtain sensitive information by reading this file, aka Ref ID 35493.
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
383
VMScore
CVE-2012-6590
The web-based management UI in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.8 allows remote malicious users to obtain verbose error information via crafted input, aka Ref ID 33139.
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
383
VMScore
CVE-2013-5663
The App-ID cache feature in Palo Alto Networks PAN-OS prior to 4.0.14, 4.1.x prior to 4.1.11, and 5.0.x prior to 5.0.2 allows remote malicious users to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification...
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.1.9
Paloaltonetworks Pan-os 4.1.3
Paloaltonetworks Pan-os 4.1.6
Paloaltonetworks Pan-os 4.1.7
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 5.0.0-h1
Paloaltonetworks Pan-os 4.1.8
Paloaltonetworks Pan-os 5.0.0
Paloaltonetworks Pan-os 4.1.4
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.8-h3
Paloaltonetworks Pan-os 4.1.10
Paloaltonetworks Pan-os 4.1.5
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.4
383
VMScore
CVE-2013-5664
Cross-site scripting (XSS) vulnerability in the web-based device-management API browser in Palo Alto Networks PAN-OS prior to 4.1.13 and 5.0.x prior to 5.0.6 allows remote malicious users to inject arbitrary web script or HTML via crafted data, aka Ref ID 50908.
Paloaltonetworks Pan-os 5.0.4
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.1.4
Paloaltonetworks Pan-os 5.0.0
Paloaltonetworks Pan-os 5.0.0-h1
Paloaltonetworks Pan-os 5.0.2
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.10
Paloaltonetworks Pan-os 4.1.11
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.1.6
Paloaltonetworks Pan-os 4.1.7
Paloaltonetworks Pan-os 4.1.8
Paloaltonetworks Pan-os 4.1.8-h3
Paloaltonetworks Pan-os 5.0.3
1 Github repository
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2