{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Chromium and Prisma Browser: Monthly Vulnerability Update (May 2026)"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: PAN-SA-2026-0007","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-05-13T20:37:56.529Z","generator":{"date":"2026-05-13T20:37:56.529Z","engine":{"name":"Vulnogram","version":"0.1.0-dev"}},"id":"PAN-SA-2026-0007","initial_release_date":"2026-05-13T16:00:00.000Z","revision_history":[{"number":"1","date":"2026-05-13T09:00:00.000Z","summary":"Initial Publication"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"Prisma Browser","category":"product_name","branches":[{"category":"product_version_range","name":"vers:generic/Prisma Browser<146.10.7.154","product":{"name":"Palo Alto Networks Prisma Browser","product_id":"PANW-Prisma-Browser-65"}},{"category":"product_version_range","name":"vers:generic/Prisma Browser>=148.6.3.96","product":{"name":"Palo Alto Networks Prisma Browser","product_id":"PANW-Prisma-Browser-66"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2026-4439","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds memory access in WebGL"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4439","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4439"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds memory access in WebGL"}]},{"cve":"CVE-2026-4440","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds read and write in WebGL"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4440","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4440"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds read and write in WebGL"}]},{"cve":"CVE-2026-4441","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Base"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4441","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4441"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Base"}]},{"cve":"CVE-2026-4442","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in CSS"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4442","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4442"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in CSS"}]},{"cve":"CVE-2026-4443","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in WebAudio"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4443","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4443"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in WebAudio"}]},{"cve":"CVE-2026-4444","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Stack buffer overflow in WebRTC"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4444","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4444"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Stack buffer overflow in WebRTC"}]},{"cve":"CVE-2026-4445","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in WebRTC"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4445","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4445"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in WebRTC"}]},{"cve":"CVE-2026-4446","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in WebRTC"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4446","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4446"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in WebRTC"}]},{"cve":"CVE-2026-4447","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Inappropriate implementation in V8"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4447","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4447"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Inappropriate implementation in V8"}]},{"cve":"CVE-2026-4448","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in ANGLE"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4448","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4448"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in ANGLE"}]},{"cve":"CVE-2026-4449","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Blink"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4449","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4449"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Blink"}]},{"cve":"CVE-2026-4450","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds write in V8"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4450","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4450"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds write in V8"}]},{"cve":"CVE-2026-4451","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Insufficient validation of untrusted input in Navigation"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4451","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4451"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Insufficient validation of untrusted input in Navigation"}]},{"cve":"CVE-2026-4452","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Integer overflow in ANGLE"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4452","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4452"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Integer overflow in ANGLE"}]},{"cve":"CVE-2026-4453","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Integer overflow in Dawn"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4453","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4453"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Integer overflow in Dawn"}]},{"cve":"CVE-2026-4454","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Network"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4454","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4454"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Network"}]},{"cve":"CVE-2026-4455","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in PDFium"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4455","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4455"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in PDFium"}]},{"cve":"CVE-2026-4456","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Digital Credentials API"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4456","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4456"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Digital Credentials API"}]},{"cve":"CVE-2026-4457","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Type Confusion in V8"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4457","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4457"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Type Confusion in V8"}]},{"cve":"CVE-2026-4458","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Extensions"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4458","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4458"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Extensions"}]},{"cve":"CVE-2026-4459","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds read and write in WebAudio"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4459","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4459"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds read and write in WebAudio"}]},{"cve":"CVE-2026-4460","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds read in Skia"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4460","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4460"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds read in Skia"}]},{"cve":"CVE-2026-4461","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Inappropriate implementation in V8"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4461","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4461"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Inappropriate implementation in V8"}]},{"cve":"CVE-2026-4462","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds read in Blink"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4462","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4462"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds read in Blink"}]},{"cve":"CVE-2026-4463","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in WebRTC"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4463","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4463"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in WebRTC"}]},{"cve":"CVE-2026-4464","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Integer overflow in ANGLE"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4464","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4464"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Integer overflow in ANGLE"}]},{"cve":"CVE-2026-4673","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in WebAudio"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4673","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4673"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in WebAudio"}]},{"cve":"CVE-2026-4674","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds read in CSS"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4674","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4674"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds read in CSS"}]},{"cve":"CVE-2026-4675","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in WebGL"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4675","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4675"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in WebGL"}]},{"cve":"CVE-2026-4676","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Dawn"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4676","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4676"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Dawn"}]},{"cve":"CVE-2026-4677","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Inappropriate implementation in WebAudio"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4677","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4677"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Inappropriate implementation in WebAudio"}]},{"cve":"CVE-2026-4678","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in WebGPU"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4678","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4678"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in WebGPU"}]},{"cve":"CVE-2026-4679","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Integer overflow in Fonts"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4679","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4679"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Integer overflow in Fonts"}]},{"cve":"CVE-2026-4680","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in FedCM"}],"references":[{"category":"external","summary":"NVD - CVE-2026-4680","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4680"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in FedCM"}]},{"cve":"CVE-2026-5272","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in GPU"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5272","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5272"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in GPU"}]},{"cve":"CVE-2026-5273","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in CSS"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5273","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5273"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in CSS"}]},{"cve":"CVE-2026-5274","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Integer overflow in Codecs"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5274","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5274"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Integer overflow in Codecs"}]},{"cve":"CVE-2026-5275","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in ANGLE"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5275","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5275"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in ANGLE"}]},{"cve":"CVE-2026-5276","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Insufficient policy enforcement in WebUSB"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5276","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5276"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Insufficient policy enforcement in WebUSB"}]},{"cve":"CVE-2026-5277","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Integer overflow in ANGLE"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5277","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5277"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Integer overflow in ANGLE"}]},{"cve":"CVE-2026-5278","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Web MIDI"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5278","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5278"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Web MIDI"}]},{"cve":"CVE-2026-5279","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Object corruption in V8"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5279","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5279"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Object corruption in V8"}]},{"cve":"CVE-2026-5280","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in WebCodecs"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5280","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5280"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in WebCodecs"}]},{"cve":"CVE-2026-5281","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Dawn"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5281","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5281"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Dawn"}]},{"cve":"CVE-2026-5282","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds read in WebCodecs"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5282","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5282"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds read in WebCodecs"}]},{"cve":"CVE-2026-5283","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Inappropriate implementation in ANGLE"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5283","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5283"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Inappropriate implementation in ANGLE"}]},{"cve":"CVE-2026-5284","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Dawn"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5284","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5284"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Dawn"}]},{"cve":"CVE-2026-5285","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in WebGL"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5285","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5285"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in WebGL"}]},{"cve":"CVE-2026-5286","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Dawn"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5286","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5286"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Dawn"}]},{"cve":"CVE-2026-5287","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in PDF"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5287","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5287"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in PDF"}]},{"cve":"CVE-2026-5288","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in WebView"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5288","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5288"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in WebView"}]},{"cve":"CVE-2026-5289","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Navigation"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5289","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5289"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Navigation"}]},{"cve":"CVE-2026-5290","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Compositing"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5290","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5290"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Compositing"}]},{"cve":"CVE-2026-5291","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Inappropriate implementation in WebGL"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5291","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5291"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Inappropriate implementation in WebGL"}]},{"cve":"CVE-2026-5292","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds read in WebCodecs"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5292","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5292"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds read in WebCodecs"}]},{"cve":"CVE-2026-5876","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Side-channel information leakage in Navigation"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5876","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5876"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Side-channel information leakage in Navigation"}]},{"cve":"CVE-2026-5881","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Policy bypass in LocalNetworkAccess"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5881","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5881"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Policy bypass in LocalNetworkAccess"}]},{"cve":"CVE-2026-5884","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Insufficient validation of untrusted input in Media"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5884","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5884"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Insufficient validation of untrusted input in Media"}]},{"cve":"CVE-2026-5886","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds read in WebAudio"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5886","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5886"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds read in WebAudio"}]},{"cve":"CVE-2026-5893","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Race in V8"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5893","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5893"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Race in V8"}]},{"cve":"CVE-2026-5909","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Integer overflow in Media"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5909","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5909"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Integer overflow in Media"}]},{"cve":"CVE-2026-5914","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Type Confusion in CSS"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5914","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5914"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Type Confusion in CSS"}]},{"cve":"CVE-2026-5919","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Insufficient validation of untrusted input in WebSockets"}],"references":[{"category":"external","summary":"NVD - CVE-2026-5919","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5919"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Insufficient validation of untrusted input in WebSockets"}]},{"cve":"CVE-2026-6305","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in PDFium"}],"references":[{"category":"external","summary":"NVD - CVE-2026-6305","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6305"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in PDFium"}]},{"cve":"CVE-2026-6361","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Heap buffer overflow in PDFium"}],"references":[{"category":"external","summary":"NVD - CVE-2026-6361","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6361"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Heap buffer overflow in PDFium"}]},{"cve":"CVE-2026-6921","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Race in GPU"}],"references":[{"category":"external","summary":"NVD - CVE-2026-6921","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6921"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Race in GPU"}]},{"cve":"CVE-2026-7343","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Views"}],"references":[{"category":"external","summary":"NVD - CVE-2026-7343","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-7343"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Views"}]},{"cve":"CVE-2026-7359","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in ANGLE"}],"references":[{"category":"external","summary":"NVD - CVE-2026-7359","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-7359"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in ANGLE"}]},{"cve":"CVE-2026-7361","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in iOS"}],"references":[{"category":"external","summary":"NVD - CVE-2026-7361","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-7361"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in iOS"}]},{"cve":"CVE-2026-7363","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Use after free in Canvas"}],"references":[{"category":"external","summary":"NVD - CVE-2026-7363","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-7363"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Use after free in Canvas"}]},{"cve":"CVE-2026-7981","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Out of bounds read in Codecs"}],"references":[{"category":"external","summary":"NVD - CVE-2026-7981","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-7981"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Out of bounds read in Codecs"}]},{"cve":"CVE-2026-8018","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Insufficient policy enforcement in DevTools"}],"references":[{"category":"external","summary":"NVD - CVE-2026-8018","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-8018"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Insufficient policy enforcement in DevTools"}]},{"cve":"CVE-2026-8022","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Inappropriate implementation in MHTML"}],"references":[{"category":"external","summary":"NVD - CVE-2026-8022","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-8022"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Inappropriate implementation in MHTML"}]},{"cve":"CVE-2026-0237","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Prisma Browser: Improperly Restricted Automation Bridge Allows Security Bypass"}],"references":[{"category":"external","summary":"NVD - CVE-2026-0237","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0237"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Prisma Browser: Improperly Restricted Automation Bridge Allows Security Bypass"}]},{"cve":"CVE-2026-0236","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Prisma Browser: Code Injection Enables Security Controls Bypass"}],"references":[{"category":"external","summary":"NVD - CVE-2026-0236","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0236"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Prisma Browser: Code Injection Enables Security Controls Bypass"}]},{"cve":"CVE-2026-0235","product_status":{"fixed":["PANW-Prisma-Browser-66"],"known_affected":["PANW-Prisma-Browser-65"]},"notes":[{"category":"description","text":"Prisma Browser: Access and Data Rule Bypass"}],"references":[{"category":"external","summary":"NVD - CVE-2026-0235","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0235"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0007"}],"threats":[{"category":"impact","description":"Prisma Browser: Access and Data Rule Bypass"}]}]}