{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"WildFire WF-500 et WF-500-B versions 12.1.4 ant\u00e9rieures \u00e0 12.1.4-h5","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"GlobalProtect App versions 6.0.x ant\u00e9rieures \u00e0 6.0.14 pour Android et ChromeOS","product":{"name":"GlobalProtect App","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Prisma Access versions 10.2.x ant\u00e9rieures \u00e0 10.2.10-h36","product":{"name":"Prisma Access Browser","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.2.12","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Prisma SD-WAN ION versions 6.3.x ant\u00e9rieures \u00e0 6.3.6-b10","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 11.1.13 ant\u00e9rieures \u00e0 11.1.13-h5","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"GlobalProtect App versions 6.0.x ant\u00e9rieures \u00e0 6.0.11 pour Linux","product":{"name":"GlobalProtect App","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 11.2.10 ant\u00e9rieures \u00e0 11.2.10-h6","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"GlobalProtect App versions 6.1.x ant\u00e9rieures \u00e0 6.1.13 pour Android et ChomeOS","product":{"name":"GlobalProtect App","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.2.7 ant\u00e9rieures \u00e0 11.2.7-h14","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Prisma Access Agent versions 25.x et 26.x ant\u00e9rieures \u00e0 26.2.1 pour Android et ChromeOS","product":{"name":"Prisma Access Browser","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 10.2.7 ant\u00e9rieures \u00e0 10.2.7-h34","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.2.4 ant\u00e9rieures \u00e0 11.2.4-h17","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 11.1.6 ant\u00e9rieures \u00e0 11.1.6-h32","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Prisma SD-WAN ION versions 6.5.x ant\u00e9rieures \u00e0 6.5.3-b15","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 10.2.13 ant\u00e9rieures \u00e0 10.2.13-h21","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.15","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Prisma SD-WAN ION versions 6.4.x ant\u00e9rieures \u00e0 6.4.3-b8","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.2.7 ant\u00e9rieures \u00e0 10.2.7-h34","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Chronosphere Chronocollector  versions ant\u00e9rieures \u00e0 v0.116.0","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 12.1.7","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Broker VM versions 30.0.x ant\u00e9rieures \u00e0 30.0.24","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 11.1.7 ant\u00e9rieures \u00e0 11.1.7-h6","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 11.1.10 ant\u00e9rieures \u00e0 11.1.10-h25","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Trust Protection Foundation versions 24.1.x ant\u00e9rieures \u00e0 24.1.13","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.10 ant\u00e9rieures \u00e0 11.1.10-h25","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 11.2.12","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.2.10 ant\u00e9rieures \u00e0 11.2.10-h7","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"GlobalProtect App versions 6.0.x ant\u00e9rieures \u00e0 6.0.13 pour macOS et Windows","product":{"name":"GlobalProtect App","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.2.16 ant\u00e9rieures \u00e0 10.2.16-h7","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.7 ant\u00e9rieures \u00e0 11.1.7-h6","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 12.1.4 ant\u00e9rieures \u00e0 12.1.4-h5","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Prisma Browser versions ant\u00e9rieures \u00e0 148.6.3.96","product":{"name":"Prisma Access Browser","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Trust Protection Foundation versions 24.3.x ant\u00e9rieures \u00e0 24.3.6","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 11.1.4 ant\u00e9rieures \u00e0 11.1.4-h33","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.4 ant\u00e9rieures \u00e0 11.1.4-h33","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 10.2.10 ant\u00e9rieures \u00e0 10.2.10-h36","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 10.2.18 ant\u00e9rieures \u00e0 10.2.18-h6","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Trust Protection Foundation versions 25.3.x ant\u00e9rieures \u00e0 25.3.3","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 12.1.4 ant\u00e9rieures \u00e0 12.1.4-h6","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.2.10 ant\u00e9rieures \u00e0 11.2.10-h6","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Prisma Access Agent (Endpoint DLP) versions 25.x \u00e0 26.x ant\u00e9rieures \u00e0 26.2.1 pour Windows et macOS","product":{"name":"Prisma Access Browser","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.2.18 ant\u00e9rieures \u00e0 10.2.18-h6","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Prisma Access versions 11.2.x ant\u00e9rieures \u00e0 11.2.7-h13","product":{"name":"Prisma Access Browser","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 10.2.16 ant\u00e9rieures \u00e0 10.2.16-h7","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"GlobalProtect App versions 6.3.x ant\u00e9rieures \u00e0 6.3.3-h2 pour Linux","product":{"name":"GlobalProtect App","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"GlobalProtect UWP App versions 6.3 ant\u00e9rieures \u00e0 6.3.3-h10","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 11.1.15","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"GlobalProtect App versions 6.3.x ant\u00e9rieures \u00e0 6.3.3-h10 pour Windows et macOS","product":{"name":"GlobalProtect App","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 11.2.7 ant\u00e9rieures \u00e0 11.2.7-h13","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"GlobalProtect App versions 6.2.x ant\u00e9rieures \u00e0 6.2.8-h10 (6.2.8-948)","product":{"name":"GlobalProtect App","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 11.2.4 ant\u00e9rieures \u00e0 11.2.4-h17","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.6 ant\u00e9rieures \u00e0 11.1.6-h32","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.13 ant\u00e9rieures \u00e0 11.1.13-h5","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.2.10 ant\u00e9rieures \u00e0 10.2.10-h36","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.2.7 ant\u00e9rieures \u00e0 11.2.7-h13","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"WildFire WF-500 et WF-500-B versions 12.1.7","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Trust Protection Foundation versions 25.1.x ant\u00e9rieures \u00e0 25.1.8","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.2.13 ant\u00e9rieures \u00e0 10.2.13-h21","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}}],"affected_systems_content":"L'\u00e9diteur indique que des correctifs seront publi\u00e9s le 28 mai 2026.","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2026-4678","url":"https://www.cve.org/CVERecord?id=CVE-2026-4678"},{"name":"CVE-2026-4448","url":"https://www.cve.org/CVERecord?id=CVE-2026-4448"},{"name":"CVE-2026-5914","url":"https://www.cve.org/CVERecord?id=CVE-2026-5914"},{"name":"CVE-2026-5289","url":"https://www.cve.org/CVERecord?id=CVE-2026-5289"},{"name":"CVE-2026-4460","url":"https://www.cve.org/CVERecord?id=CVE-2026-4460"},{"name":"CVE-2026-5886","url":"https://www.cve.org/CVERecord?id=CVE-2026-5886"},{"name":"CVE-2026-4445","url":"https://www.cve.org/CVERecord?id=CVE-2026-4445"},{"name":"CVE-2026-5278","url":"https://www.cve.org/CVERecord?id=CVE-2026-5278"},{"name":"CVE-2026-4444","url":"https://www.cve.org/CVERecord?id=CVE-2026-4444"},{"name":"CVE-2026-4673","url":"https://www.cve.org/CVERecord?id=CVE-2026-4673"},{"name":"CVE-2026-0264","url":"https://www.cve.org/CVERecord?id=CVE-2026-0264"},{"name":"CVE-2026-0241","url":"https://www.cve.org/CVERecord?id=CVE-2026-0241"},{"name":"CVE-2026-0251","url":"https://www.cve.org/CVERecord?id=CVE-2026-0251"},{"name":"CVE-2026-4456","url":"https://www.cve.org/CVERecord?id=CVE-2026-4456"},{"name":"CVE-2026-5272","url":"https://www.cve.org/CVERecord?id=CVE-2026-5272"},{"name":"CVE-2026-7359","url":"https://www.cve.org/CVERecord?id=CVE-2026-7359"},{"name":"CVE-2026-4464","url":"https://www.cve.org/CVERecord?id=CVE-2026-4464"},{"name":"CVE-2026-8022","url":"https://www.cve.org/CVERecord?id=CVE-2026-8022"},{"name":"CVE-2026-7361","url":"https://www.cve.org/CVERecord?id=CVE-2026-7361"},{"name":"CVE-2026-5291","url":"https://www.cve.org/CVERecord?id=CVE-2026-5291"},{"name":"CVE-2026-4457","url":"https://www.cve.org/CVERecord?id=CVE-2026-4457"},{"name":"CVE-2026-4461","url":"https://www.cve.org/CVERecord?id=CVE-2026-4461"},{"name":"CVE-2026-5876","url":"https://www.cve.org/CVERecord?id=CVE-2026-5876"},{"name":"CVE-2026-6921","url":"https://www.cve.org/CVERecord?id=CVE-2026-6921"},{"name":"CVE-2026-4447","url":"https://www.cve.org/CVERecord?id=CVE-2026-4447"},{"name":"CVE-2026-5284","url":"https://www.cve.org/CVERecord?id=CVE-2026-5284"},{"name":"CVE-2026-5881","url":"https://www.cve.org/CVERecord?id=CVE-2026-5881"},{"name":"CVE-2026-5282","url":"https://www.cve.org/CVERecord?id=CVE-2026-5282"},{"name":"CVE-2026-0249","url":"https://www.cve.org/CVERecord?id=CVE-2026-0249"},{"name":"CVE-2026-4442","url":"https://www.cve.org/CVERecord?id=CVE-2026-4442"},{"name":"CVE-2026-0263","url":"https://www.cve.org/CVERecord?id=CVE-2026-0263"},{"name":"CVE-2026-5283","url":"https://www.cve.org/CVERecord?id=CVE-2026-5283"},{"name":"CVE-2026-4676","url":"https://www.cve.org/CVERecord?id=CVE-2026-4676"},{"name":"CVE-2026-0265","url":"https://www.cve.org/CVERecord?id=CVE-2026-0265"},{"name":"CVE-2026-4675","url":"https://www.cve.org/CVERecord?id=CVE-2026-4675"},{"name":"CVE-2026-0244","url":"https://www.cve.org/CVERecord?id=CVE-2026-0244"},{"name":"CVE-2026-0258","url":"https://www.cve.org/CVERecord?id=CVE-2026-0258"},{"name":"CVE-2026-4446","url":"https://www.cve.org/CVERecord?id=CVE-2026-4446"},{"name":"CVE-2026-4679","url":"https://www.cve.org/CVERecord?id=CVE-2026-4679"},{"name":"CVE-2026-4674","url":"https://www.cve.org/CVERecord?id=CVE-2026-4674"},{"name":"CVE-2026-0256","url":"https://www.cve.org/CVERecord?id=CVE-2026-0256"},{"name":"CVE-2026-0261","url":"https://www.cve.org/CVERecord?id=CVE-2026-0261"},{"name":"CVE-2026-5274","url":"https://www.cve.org/CVERecord?id=CVE-2026-5274"},{"name":"CVE-2026-4463","url":"https://www.cve.org/CVERecord?id=CVE-2026-4463"},{"name":"CVE-2026-5909","url":"https://www.cve.org/CVERecord?id=CVE-2026-5909"},{"name":"CVE-2026-0243","url":"https://www.cve.org/CVERecord?id=CVE-2026-0243"},{"name":"CVE-2026-0242","url":"https://www.cve.org/CVERecord?id=CVE-2026-0242"},{"name":"CVE-2026-4441","url":"https://www.cve.org/CVERecord?id=CVE-2026-4441"},{"name":"CVE-2026-0239","url":"https://www.cve.org/CVERecord?id=CVE-2026-0239"},{"name":"CVE-2026-7981","url":"https://www.cve.org/CVERecord?id=CVE-2026-7981"},{"name":"CVE-2026-5276","url":"https://www.cve.org/CVERecord?id=CVE-2026-5276"},{"name":"CVE-2026-6305","url":"https://www.cve.org/CVERecord?id=CVE-2026-6305"},{"name":"CVE-2026-0250","url":"https://www.cve.org/CVERecord?id=CVE-2026-0250"},{"name":"CVE-2026-4439","url":"https://www.cve.org/CVERecord?id=CVE-2026-4439"},{"name":"CVE-2026-5893","url":"https://www.cve.org/CVERecord?id=CVE-2026-5893"},{"name":"CVE-2026-5285","url":"https://www.cve.org/CVERecord?id=CVE-2026-5285"},{"name":"CVE-2026-4452","url":"https://www.cve.org/CVERecord?id=CVE-2026-4452"},{"name":"CVE-2026-4462","url":"https://www.cve.org/CVERecord?id=CVE-2026-4462"},{"name":"CVE-2026-4680","url":"https://www.cve.org/CVERecord?id=CVE-2026-4680"},{"name":"CVE-2026-0237","url":"https://www.cve.org/CVERecord?id=CVE-2026-0237"},{"name":"CVE-2026-4677","url":"https://www.cve.org/CVERecord?id=CVE-2026-4677"},{"name":"CVE-2026-5919","url":"https://www.cve.org/CVERecord?id=CVE-2026-5919"},{"name":"CVE-2026-6361","url":"https://www.cve.org/CVERecord?id=CVE-2026-6361"},{"name":"CVE-2026-0238","url":"https://www.cve.org/CVERecord?id=CVE-2026-0238"},{"name":"CVE-2026-8018","url":"https://www.cve.org/CVERecord?id=CVE-2026-8018"},{"name":"CVE-2026-7363","url":"https://www.cve.org/CVERecord?id=CVE-2026-7363"},{"name":"CVE-2026-5273","url":"https://www.cve.org/CVERecord?id=CVE-2026-5273"},{"name":"CVE-2026-4458","url":"https://www.cve.org/CVERecord?id=CVE-2026-4458"},{"name":"CVE-2026-4459","url":"https://www.cve.org/CVERecord?id=CVE-2026-4459"},{"name":"CVE-2026-0246","url":"https://www.cve.org/CVERecord?id=CVE-2026-0246"},{"name":"CVE-2026-4450","url":"https://www.cve.org/CVERecord?id=CVE-2026-4450"},{"name":"CVE-2026-5275","url":"https://www.cve.org/CVERecord?id=CVE-2026-5275"},{"name":"CVE-2026-4455","url":"https://www.cve.org/CVERecord?id=CVE-2026-4455"},{"name":"CVE-2026-0262","url":"https://www.cve.org/CVERecord?id=CVE-2026-0262"},{"name":"CVE-2026-5280","url":"https://www.cve.org/CVERecord?id=CVE-2026-5280"},{"name":"CVE-2026-5286","url":"https://www.cve.org/CVERecord?id=CVE-2026-5286"},{"name":"CVE-2026-0257","url":"https://www.cve.org/CVERecord?id=CVE-2026-0257"},{"name":"CVE-2026-5884","url":"https://www.cve.org/CVERecord?id=CVE-2026-5884"},{"name":"CVE-2026-5287","url":"https://www.cve.org/CVERecord?id=CVE-2026-5287"},{"name":"CVE-2026-4449","url":"https://www.cve.org/CVERecord?id=CVE-2026-4449"},{"name":"CVE-2026-5277","url":"https://www.cve.org/CVERecord?id=CVE-2026-5277"},{"name":"CVE-2026-7343","url":"https://www.cve.org/CVERecord?id=CVE-2026-7343"},{"name":"CVE-2026-5292","url":"https://www.cve.org/CVERecord?id=CVE-2026-5292"},{"name":"CVE-2026-5290","url":"https://www.cve.org/CVERecord?id=CVE-2026-5290"},{"name":"CVE-2026-0245","url":"https://www.cve.org/CVERecord?id=CVE-2026-0245"},{"name":"CVE-2026-0248","url":"https://www.cve.org/CVERecord?id=CVE-2026-0248"},{"name":"CVE-2026-0235","url":"https://www.cve.org/CVERecord?id=CVE-2026-0235"},{"name":"CVE-2026-4451","url":"https://www.cve.org/CVERecord?id=CVE-2026-4451"},{"name":"CVE-2026-4440","url":"https://www.cve.org/CVERecord?id=CVE-2026-4440"},{"name":"CVE-2026-0247","url":"https://www.cve.org/CVERecord?id=CVE-2026-0247"},{"name":"CVE-2026-0236","url":"https://www.cve.org/CVERecord?id=CVE-2026-0236"},{"name":"CVE-2026-5281","url":"https://www.cve.org/CVERecord?id=CVE-2026-5281"},{"name":"CVE-2026-0240","url":"https://www.cve.org/CVERecord?id=CVE-2026-0240"},{"name":"CVE-2026-4443","url":"https://www.cve.org/CVERecord?id=CVE-2026-4443"},{"name":"CVE-2026-5288","url":"https://www.cve.org/CVERecord?id=CVE-2026-5288"},{"name":"CVE-2026-0259","url":"https://www.cve.org/CVERecord?id=CVE-2026-0259"},{"name":"CVE-2026-5279","url":"https://www.cve.org/CVERecord?id=CVE-2026-5279"},{"name":"CVE-2026-4453","url":"https://www.cve.org/CVERecord?id=CVE-2026-4453"},{"name":"CVE-2026-4454","url":"https://www.cve.org/CVERecord?id=CVE-2026-4454"}],"links":[],"reference":"CERTFR-2026-AVI-0596","revisions":[{"description":"Version initiale","revision_date":"2026-05-15T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Injection SQL (SQLi)"},{"description":"Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo Alto Networks. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto Networks","vendor_advisories":[{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0242","url":"https://security.paloaltonetworks.com/CVE-2026-0242"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0251","url":"https://security.paloaltonetworks.com/CVE-2026-0251"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0238","url":"https://security.paloaltonetworks.com/CVE-2026-0238"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0263","url":"https://security.paloaltonetworks.com/CVE-2026-0263"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0259","url":"https://security.paloaltonetworks.com/CVE-2026-0259"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0257","url":"https://security.paloaltonetworks.com/CVE-2026-0257"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0262","url":"https://security.paloaltonetworks.com/CVE-2026-0262"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0243","url":"https://security.paloaltonetworks.com/CVE-2026-0243"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0247","url":"https://security.paloaltonetworks.com/CVE-2026-0247"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0261","url":"https://security.paloaltonetworks.com/CVE-2026-0261"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0240","url":"https://security.paloaltonetworks.com/CVE-2026-0240"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0239","url":"https://security.paloaltonetworks.com/CVE-2026-0239"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0248","url":"https://security.paloaltonetworks.com/CVE-2026-0248"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0246","url":"https://security.paloaltonetworks.com/CVE-2026-0246"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0265","url":"https://security.paloaltonetworks.com/CVE-2026-0265"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0250","url":"https://security.paloaltonetworks.com/CVE-2026-0250"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0264","url":"https://security.paloaltonetworks.com/CVE-2026-0264"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0256","url":"https://security.paloaltonetworks.com/CVE-2026-0256"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0241","url":"https://security.paloaltonetworks.com/CVE-2026-0241"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0245","url":"https://security.paloaltonetworks.com/CVE-2026-0245"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0258","url":"https://security.paloaltonetworks.com/CVE-2026-0258"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0249","url":"https://security.paloaltonetworks.com/CVE-2026-0249"},{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0244","url":"https://security.paloaltonetworks.com/CVE-2026-0244"}]}
