Page 8 of 42 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

Palo Alto Networks PAN-OS before 3.1.10 and 4.0.x before 4.0.4 allows remote attackers to execute arbitrary commands via unspecified vectors, aka Ref ID 30088. Palo Alto Networks PAN-OS anterior a 3.1.10 y 4.0.x anterior a 4.0.5, permite a atacantes remotos ejecutar comandos arbitrarios a través de vectores sin especificar. Aka Ref ID 30088. • https://security.paloaltonetworks.com/CVE-2012-6593 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 11EXPL: 0

The device-management command-line interface in Palo Alto Networks PAN-OS before 3.1.11 and 4.0.x before 4.0.9 allows remote authenticated users to execute arbitrary code via unspecified vectors, aka Ref ID 34896. La administración del dispositivo mediante el interfaz de comandos en Palo Alto Networks PAN-OS anterior a 3.1.11 y 4.0.x anterior a 4.0.9, permite a usuarios autenticados remotamente ejecutar comandos arbitrarios a través de vectores sin especificar. Aka Ref ID 34896. • https://security.paloaltonetworks.com/CVE-2012-6605 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.3EPSS: 0%CPEs: 11EXPL: 0

Palo Alto Networks PAN-OS before 3.1.11 and 4.0.x before 4.0.9 allows remote authenticated users to cause a denial of service (management-server crash) by using the command-line interface for a crafted command, aka Ref ID 35254. Palo Alto Networks PAN-OS anterior a 3.1.11 y 4.0.x anterior a 4.0.9, permite a usuarios autenticados remotamente provocar una denegación de servicio (caída del servidor de administración) utilizando un comando manipulado desde la interfaz. Aka Ref ID 35254. • https://security.paloaltonetworks.com/CVE-2012-6597 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 1%CPEs: 23EXPL: 1

The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195. La característica App-ID cache en Palo Alto Networks PAN-OS anterior a 4.0.14, 4.1.x anterior a 4.1.11 y 5.0.x anterior a 5.0.2, permite a atacantes remotos evitar las políticas de seguridad establecidas a través de una petición que provoca un cacheo no válido, como se demostró mediante la identificación incorrecta del tráfico HTTP como tráfico SIP. Aka Ref ID 47195. • http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20%28Brad%20Woodberg%20-%20Final%29.pptx http://pastie.org/pastes/5568186/text http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update https://security.paloaltonetworks.com/CVE-2013-5663 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.0EPSS: 0%CPEs: 6EXPL: 0

The device-management command-line interface in Palo Alto Networks PAN-OS before 3.1.10 and 4.0.x before 4.0.5 allows remote authenticated administrators to execute arbitrary commands via unspecified vectors, aka Ref ID 31116. El interfaz de gestión de línea de comandos en Palo Alto Networks PAN-OS anterior a 3.1.10 y 4.0.x anterior a 4.0.5, permite a usuarios autenticados remotamente ejecutar comandos arbitrarios a través de vectores no especificados. Aka Ref ID 31116. • https://security.paloaltonetworks.com/CVE-2012-6591 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •