Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paloaltonetworks pan-os 4.0.3 vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2012-6602
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.10 and 4.0.x prior to 4.0.4 allows remote authenticated users to execute arbitrary commands via unspecified vectors, aka Ref ID 30122.
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
9
CVSSv2
CVE-2012-6604
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.11 and 4.0.x prior to 4.0.9 allows remote authenticated users to execute arbitrary code via unspecified vectors, aka Ref ID 35249.
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 3.1.9
9
CVSSv2
CVE-2012-6605
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.11 and 4.0.x prior to 4.0.9 allows remote authenticated users to execute arbitrary code via unspecified vectors, aka Ref ID 34896.
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
6.3
CVSSv2
CVE-2012-6597
Palo Alto Networks PAN-OS prior to 3.1.11 and 4.0.x prior to 4.0.9 allows remote authenticated users to cause a denial of service (management-server crash) by using the command-line interface for a crafted command, aka Ref ID 35254.
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os
5
CVSSv2
CVE-2012-6596
Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.3 stores cleartext LDAP bind passwords in authd.log, which allows context-dependent malicious users to obtain sensitive information by reading this file, aka Ref ID 35493.
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
4.3
CVSSv2
CVE-2012-6590
The web-based management UI in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.8 allows remote malicious users to obtain verbose error information via crafted input, aka Ref ID 33139.
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
4.3
CVSSv2
CVE-2013-5663
The App-ID cache feature in Palo Alto Networks PAN-OS prior to 4.0.14, 4.1.x prior to 4.1.11, and 5.0.x prior to 5.0.2 allows remote malicious users to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification...
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.1.9
Paloaltonetworks Pan-os 4.1.3
Paloaltonetworks Pan-os 4.1.6
Paloaltonetworks Pan-os 4.1.7
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 5.0.0-h1
Paloaltonetworks Pan-os 4.1.8
Paloaltonetworks Pan-os 5.0.0
Paloaltonetworks Pan-os 4.1.4
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.8-h3
Paloaltonetworks Pan-os 4.1.10
Paloaltonetworks Pan-os 4.1.5
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.4
4.3
CVSSv2
CVE-2013-5664
Cross-site scripting (XSS) vulnerability in the web-based device-management API browser in Palo Alto Networks PAN-OS prior to 4.1.13 and 5.0.x prior to 5.0.6 allows remote malicious users to inject arbitrary web script or HTML via crafted data, aka Ref ID 50908.
Paloaltonetworks Pan-os 5.0.4
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.1.4
Paloaltonetworks Pan-os 5.0.0
Paloaltonetworks Pan-os 5.0.0-h1
Paloaltonetworks Pan-os 5.0.2
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.10
Paloaltonetworks Pan-os 4.1.11
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.1.6
Paloaltonetworks Pan-os 4.1.7
Paloaltonetworks Pan-os 4.1.8
Paloaltonetworks Pan-os 4.1.8-h3
Paloaltonetworks Pan-os 5.0.3
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2