Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paloaltonetworks pan-os 4.0.2 vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2012-6599
The device-management command-line interface in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.8 and 4.1.x prior to 4.1.1 allows remote authenticated users to execute arbitrary commands via unspecified vectors, aka Ref ID 33476.
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
9
CVSSv2
CVE-2012-6595
The device-management command-line interface in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.2 allows remote authenticated administrators to execute arbitrary commands via unspecified vectors, aka Ref ID 34595.
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
9
CVSSv2
CVE-2012-6600
The device-management command-line interface in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.2 allows remote authenticated users to execute arbitrary commands via unspecified vectors, aka Ref ID 34502.
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.8
5
CVSSv2
CVE-2012-6596
Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.3 stores cleartext LDAP bind passwords in authd.log, which allows context-dependent malicious users to obtain sensitive information by reading this file, aka Ref ID 35493.
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
10
CVSSv2
CVE-2012-6603
The web management UI in Palo Alto Networks PAN-OS prior to 3.1.12, 4.0.x prior to 4.0.10, and 4.1.x prior to 4.1.4 allows remote malicious users to bypass authentication and obtain administrator privileges via unspecified vectors, aka Ref ID 37034.
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.1.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os 3.1.10
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os
10
CVSSv2
CVE-2012-6601
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.12, 4.0.x prior to 4.0.10, and 4.1.x prior to 4.1.4 allows remote malicious users to execute arbitrary code via unspecified vectors, aka Ref ID 36983.
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 3.1.10
Paloaltonetworks Pan-os 4.1.3
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os
4.3
CVSSv2
CVE-2013-5663
The App-ID cache feature in Palo Alto Networks PAN-OS prior to 4.0.14, 4.1.x prior to 4.1.11, and 5.0.x prior to 5.0.2 allows remote malicious users to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification...
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.1.9
Paloaltonetworks Pan-os 4.1.3
Paloaltonetworks Pan-os 4.1.6
Paloaltonetworks Pan-os 4.1.7
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 5.0.0-h1
Paloaltonetworks Pan-os 4.1.8
Paloaltonetworks Pan-os 5.0.0
Paloaltonetworks Pan-os 4.1.4
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.8-h3
Paloaltonetworks Pan-os 4.1.10
Paloaltonetworks Pan-os 4.1.5
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.4
4.3
CVSSv2
CVE-2013-5664
Cross-site scripting (XSS) vulnerability in the web-based device-management API browser in Palo Alto Networks PAN-OS prior to 4.1.13 and 5.0.x prior to 5.0.6 allows remote malicious users to inject arbitrary web script or HTML via crafted data, aka Ref ID 50908.
Paloaltonetworks Pan-os 5.0.4
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.1.4
Paloaltonetworks Pan-os 5.0.0
Paloaltonetworks Pan-os 5.0.0-h1
Paloaltonetworks Pan-os 5.0.2
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.10
Paloaltonetworks Pan-os 4.1.11
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.1.6
Paloaltonetworks Pan-os 4.1.7
Paloaltonetworks Pan-os 4.1.8
Paloaltonetworks Pan-os 4.1.8-h3
Paloaltonetworks Pan-os 5.0.3
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38298
CVE-2024-20356
CVE-2023-21987
CVE-2024-33217
bypass
CVE-2024-31804
CVE-2024-32660
unauthorized
SSRF
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2