Vulnerability Details CVE-2014-3764
Cross-site scripting (XSS) vulnerability in the web-based device management interface in Palo Alto Networks PAN-OS before 5.0.15, 5.1.x before 5.1.10, and 6.0.x before 6.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Ref ID 64563.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 48.0%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2014-3764
-
cpe:2.3:o:paloaltonetworks:pan-os:-
-
cpe:2.3:o:paloaltonetworks:pan-os:1.3
-
cpe:2.3:o:paloaltonetworks:pan-os:2.0
-
cpe:2.3:o:paloaltonetworks:pan-os:2.1
-
cpe:2.3:o:paloaltonetworks:pan-os:3.0
-
cpe:2.3:o:paloaltonetworks:pan-os:3.1
-
cpe:2.3:o:paloaltonetworks:pan-os:3.1.10
-
cpe:2.3:o:paloaltonetworks:pan-os:3.1.11
-
cpe:2.3:o:paloaltonetworks:pan-os:3.1.12
-
cpe:2.3:o:paloaltonetworks:pan-os:3.1.9
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.0
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.1
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.10
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.11
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.12
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.13
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.2
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.3
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.4
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.5
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.6
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.7
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.8
-
cpe:2.3:o:paloaltonetworks:pan-os:4.0.9
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.0
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.1
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.10
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.11
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.12
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.13
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.2
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.3
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.4
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.5
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.6
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.7
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.8
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.8-h3
-
cpe:2.3:o:paloaltonetworks:pan-os:4.1.9
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.0
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.0-h1
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.10
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.11
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.12
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.13
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.14
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.2
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.3
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.4
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.5
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.6
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.7
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.8
-
cpe:2.3:o:paloaltonetworks:pan-os:5.0.9
-
cpe:2.3:o:paloaltonetworks:pan-os:5.1
-
cpe:2.3:o:paloaltonetworks:pan-os:5.1.1
-
cpe:2.3:o:paloaltonetworks:pan-os:5.1.2
-
cpe:2.3:o:paloaltonetworks:pan-os:5.1.3
-
cpe:2.3:o:paloaltonetworks:pan-os:5.1.4
-
cpe:2.3:o:paloaltonetworks:pan-os:5.1.5
-
cpe:2.3:o:paloaltonetworks:pan-os:5.1.6
-
cpe:2.3:o:paloaltonetworks:pan-os:5.1.7
-
cpe:2.3:o:paloaltonetworks:pan-os:5.1.8
-
cpe:2.3:o:paloaltonetworks:pan-os:5.1.9
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.1
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.2
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.3
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.4
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.5