Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paloaltonetworks pan-os 4.0.1 vulnerabilities and exploits
(subscribe to this query)
801
VMScore
CVE-2012-6599
The device-management command-line interface in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.8 and 4.1.x prior to 4.1.1 allows remote authenticated users to execute arbitrary commands via unspecified vectors, aka Ref ID 33476.
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
801
VMScore
CVE-2012-6595
The device-management command-line interface in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.2 allows remote authenticated administrators to execute arbitrary commands via unspecified vectors, aka Ref ID 34595.
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
801
VMScore
CVE-2012-6600
The device-management command-line interface in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.2 allows remote authenticated users to execute arbitrary commands via unspecified vectors, aka Ref ID 34502.
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.8
445
VMScore
CVE-2012-6596
Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.3 stores cleartext LDAP bind passwords in authd.log, which allows context-dependent malicious users to obtain sensitive information by reading this file, aka Ref ID 35493.
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
890
VMScore
CVE-2012-6601
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.12, 4.0.x prior to 4.0.10, and 4.1.x prior to 4.1.4 allows remote malicious users to execute arbitrary code via unspecified vectors, aka Ref ID 36983.
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 3.1.10
Paloaltonetworks Pan-os 4.1.3
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os
890
VMScore
CVE-2012-6603
The web management UI in Palo Alto Networks PAN-OS prior to 3.1.12, 4.0.x prior to 4.0.10, and 4.1.x prior to 4.1.4 allows remote malicious users to bypass authentication and obtain administrator privileges via unspecified vectors, aka Ref ID 37034.
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.1.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os 3.1.10
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os
383
VMScore
CVE-2013-5663
The App-ID cache feature in Palo Alto Networks PAN-OS prior to 4.0.14, 4.1.x prior to 4.1.11, and 5.0.x prior to 5.0.2 allows remote malicious users to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification...
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.1.9
Paloaltonetworks Pan-os 4.1.3
Paloaltonetworks Pan-os 4.1.6
Paloaltonetworks Pan-os 4.1.7
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 5.0.0-h1
Paloaltonetworks Pan-os 4.1.8
Paloaltonetworks Pan-os 5.0.0
Paloaltonetworks Pan-os 4.1.4
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.8-h3
Paloaltonetworks Pan-os 4.1.10
Paloaltonetworks Pan-os 4.1.5
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.4
383
VMScore
CVE-2013-5664
Cross-site scripting (XSS) vulnerability in the web-based device-management API browser in Palo Alto Networks PAN-OS prior to 4.1.13 and 5.0.x prior to 5.0.6 allows remote malicious users to inject arbitrary web script or HTML via crafted data, aka Ref ID 50908.
Paloaltonetworks Pan-os 5.0.4
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.1.4
Paloaltonetworks Pan-os 5.0.0
Paloaltonetworks Pan-os 5.0.0-h1
Paloaltonetworks Pan-os 5.0.2
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.10
Paloaltonetworks Pan-os 4.1.11
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.1.6
Paloaltonetworks Pan-os 4.1.7
Paloaltonetworks Pan-os 4.1.8
Paloaltonetworks Pan-os 4.1.8-h3
Paloaltonetworks Pan-os 5.0.3
1 Github repository
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2