<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2024-0010 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0010/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sun, 19 Apr 2026 05:03:33 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2024-0010</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0010/#post-330</link>
                        <pubDate>Tue, 07 May 2024 12:44:46 +0000</pubDate>
                        <description><![CDATA[Description 
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the...]]></description>
                        <content:encoded><![CDATA[<p><strong>Description </strong></p>
<p><span>A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of a user&#8217;s browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft.</span></p>
<p><strong>References</strong></p>
<ul>
<li><a href="https://security.paloaltonetworks.com/CVE-2024-0010" target="_blank" rel="noopener">MISC:https://security.paloaltonetworks.com/CVE-2024-0010</a></li>
<li><a href="https://security.paloaltonetworks.com/CVE-2024-0010" target="_blank" rel="noopener">URL:https://security.paloaltonetworks.com/CVE-2024-0010</a></li>
</ul>
<h3>Required Configuration for Exposure</h3>
<p><span>This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal enabled. You can verify whether you have a GlobalProtect portal configured by checking for entries in your firewall web interface (Network &gt; GlobalProtect &gt; Portals).</span></p>
<h3><span style="font-size: 10pt">Severity: MEDIUM</span></h3>
<h3>Solution</h3>
<p>This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.11-h1, PAN-OS 10.1.12, and all later PAN-OS versions.</p>
<p> </p>
<p> </p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>Ivan Lon</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0010/#post-330</guid>
                    </item>
							        </channel>
        </rss>
		