Those are Unique Threat IDs. https://threatvault.paloaltonetworks.com/?query=86759&type=
https://threatvault.paloaltonetworks.com/?query=86760&type=
Sometimes, multiple PoCs (Proof of Concept) exist for a particular vulnerability. In other words, there are multiple ways to detect the threat. So, it's normal to see more than one signatures for the same vulnerability. Even if the Threat name is the same, the detection logics are different.
The Security Profile is basically configured to block threats based on the Severity (not the ID). Please refer to the Security Policy Best Practice. https://docs.paloaltonetworks.com/best-practices/security-policy-best-practices/security-policy-best-practices/deploy-security-policy-best-practices/security-policy-rule-best-practices
The ID can be used when you want to set an exception. - How to Use Anti-Spyware, Vulnerability and Antivirus Exceptions to Block or Allow Threats https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcrCAC
... View more