Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Palo Alto Networks | PAN-OS | 9.0.* | - | |
| Palo Alto Networks | Prisma Access | 2.2 all | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for CVE-2021-3036, HTTP Smuggling + buffer overflow in PanOS 8.x | https://github.com/0xhaggis/CVE-2021-3064 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-3058 | 8.8 HIGH | PAN-OS: OS Command Injection Vulnerability in Web Interface XML API |
| CVE-2021-3056 | 8.8 HIGH | PAN-OS: Memory Corruption Vulnerability in GlobalProtect Clientless VPN During SAML Authen |
| CVE-2021-3062 | 8.1 HIGH | PAN-OS: Improper Access Control Vulnerability Exposing AWS Instance Metadata Endpoint to G |
| CVE-2021-3060 | 8.1 HIGH | PAN-OS: OS Command Injection in Simple Certificate Enrollment Protocol (SCEP) |
| CVE-2021-3059 | 8.1 HIGH | PAN-OS: OS Command Injection Vulnerability When Performing Dynamic Updates |
| CVE-2021-3063 | 7.5 HIGH | PAN-OS: Denial-of-Service (DoS) Vulnerability in GlobalProtect Portal and Gateway Interfac |
| CVE-2021-3061 | 6.4 MEDIUM | PAN-OS: OS Command Injection Vulnerability in the Command Line Interface (CLI) |
No comments yet