Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Palo Alto Networks | Cloud NGFW | All | - | |
| Palo Alto Networks | PAN-OS | 11.2.0 ~ 11.2.1 | cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:* | |
| Palo Alto Networks | Prisma Access | - | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-0129 | Prisma Access Browser: Inappropriate control behavior in Prisma Access Browser | |
| CVE-2025-0123 | PAN-OS: Information Disclosure Vulnerability in HTTP/2 Packet Captures | |
| CVE-2025-0119 | Cortex XDR Broker VM: Authenticated Command Injection Vulnerability in Broker VM | |
| CVE-2025-0128 | PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet | |
| CVE-2025-0127 | PAN-OS: Authenticated Admin Command Injection Vulnerability in PAN-OS VM-Series | |
| CVE-2025-0126 | PAN-OS: Session Fixation Vulnerability in GlobalProtect SAML Login | |
| CVE-2025-0125 | PAN-OS: Improper Neutralization of Input in the Management Web Interface | |
| CVE-2025-0122 | Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through Burst of Crafted Packets | |
| CVE-2025-0121 | Cortex XDR Agent: Local Windows User Can Crash the Agent | |
| CVE-2025-0120 | GlobalProtect App: Local Privilege Escalation (PE) Vulnerability |
No comments yet