<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2024-0011 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0011/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sun, 19 Apr 2026 05:21:25 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2024-0011</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0011/#post-331</link>
                        <pubDate>Tue, 07 May 2024 13:59:22 +0000</pubDate>
                        <description><![CDATA[Description:-
A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the cont...]]></description>
                        <content:encoded><![CDATA[<p><strong>Description:-</strong></p>
<p><span>A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of an authenticated Captive Portal user&#8217;s browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft.</span></p>
<p><strong>References</strong></p>
<ul>
<li><a href="https://security.paloaltonetworks.com/CVE-2024-0011" target="_blank" rel="noopener">MISC:https://security.paloaltonetworks.com/CVE-2024-0011</a></li>
<li><a href="https://security.paloaltonetworks.com/CVE-2024-0011" target="_blank" rel="noopener">URL:https://security.paloaltonetworks.com/CVE-2024-0011</a></li>
</ul>
<p> </p>
<h3>Required Configuration for Exposure</h3>
<p><span>This issue is applicable only to firewalls that are configured to use Captive Portal authentication. You can verify whether you have Captive Portal configured in the Captive Portal Settings page (Device &gt; User Identification &gt; Captive Portal Settings).</span></p>
<h3>Solution</h3>
<p>This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.13, PAN-OS 10.0.11, PAN-OS 10.1.3, and all later PAN-OS versions.</p>
<p> </p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>Ivan Lon</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0011/#post-331</guid>
                    </item>
							        </channel>
        </rss>
		