Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paloaltonetworks pan-os 4.0.6 vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2012-6590
The web-based management UI in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.8 allows remote malicious users to obtain verbose error information via crafted input, aka Ref ID 33139.
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
801
VMScore
CVE-2012-6598
The device-management command-line interface in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.8 allows remote authenticated users to execute arbitrary commands via unspecified vectors, aka Ref ID 33080.
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
801
VMScore
CVE-2012-6599
The device-management command-line interface in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.8 and 4.1.x prior to 4.1.1 allows remote authenticated users to execute arbitrary commands via unspecified vectors, aka Ref ID 33476.
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
801
VMScore
CVE-2012-6594
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.11, 4.0.x prior to 4.0.8, and 4.1.x prior to 4.1.1 allows remote authenticated administrators to execute arbitrary commands via unspecified vectors, aka Ref ID 34299.
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
561
VMScore
CVE-2012-6597
Palo Alto Networks PAN-OS prior to 3.1.11 and 4.0.x prior to 4.0.9 allows remote authenticated users to cause a denial of service (management-server crash) by using the command-line interface for a crafted command, aka Ref ID 35254.
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os
801
VMScore
CVE-2012-6604
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.11 and 4.0.x prior to 4.0.9 allows remote authenticated users to execute arbitrary code via unspecified vectors, aka Ref ID 35249.
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 3.1.9
801
VMScore
CVE-2012-6605
The device-management command-line interface in Palo Alto Networks PAN-OS prior to 3.1.11 and 4.0.x prior to 4.0.9 allows remote authenticated users to execute arbitrary code via unspecified vectors, aka Ref ID 34896.
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 3.1.9
Paloaltonetworks Pan-os
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.0.6
801
VMScore
CVE-2012-6595
The device-management command-line interface in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.2 allows remote authenticated administrators to execute arbitrary commands via unspecified vectors, aka Ref ID 34595.
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
801
VMScore
CVE-2012-6600
The device-management command-line interface in Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.2 allows remote authenticated users to execute arbitrary commands via unspecified vectors, aka Ref ID 34502.
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.4
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.8
445
VMScore
CVE-2012-6596
Palo Alto Networks PAN-OS 4.0.x prior to 4.0.9 and 4.1.x prior to 4.1.3 stores cleartext LDAP bind passwords in authd.log, which allows context-dependent malicious users to obtain sensitive information by reading this file, aka Ref ID 35493.
Paloaltonetworks Pan-os 4.0.5
Paloaltonetworks Pan-os 4.0.6
Paloaltonetworks Pan-os 4.0.7
Paloaltonetworks Pan-os 4.0.8
Paloaltonetworks Pan-os 4.1.0
Paloaltonetworks Pan-os 4.1.1
Paloaltonetworks Pan-os 4.1.2
Paloaltonetworks Pan-os 4.0.1
Paloaltonetworks Pan-os 4.0.3
Paloaltonetworks Pan-os 4.0.0
Paloaltonetworks Pan-os 4.0.2
Paloaltonetworks Pan-os 4.0.4
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »