<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerable applications under Windows in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerable-applications-under-windows/m-p/585872#M6641</link>
    <description>&lt;P&gt;Thank you! It is working, but my TIGHTVNC vulnerable software is not found?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RFeyertag_0-1715004668339.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59533iCEAEE8786E172512/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="RFeyertag_0-1715004668339.png" alt="RFeyertag_0-1715004668339.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-27830" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2023-27830&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;On my laptop I activated it yesterday 02:14 PM.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How do I double check the functionality of this new feature?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 May 2024 14:12:37 GMT</pubDate>
    <dc:creator>RFeyertag</dc:creator>
    <dc:date>2024-05-06T14:12:37Z</dc:date>
    <item>
      <title>Vulnerable applications under Windows</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerable-applications-under-windows/m-p/585824#M6636</link>
      <description>&lt;P&gt;Hello dear community,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is this now the long awaited feature, which gives us the possibility to have a CVE-scoring on Windows applications?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RFeyertag_0-1714943648245.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59529iD9D6F8E7E089EE87/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="RFeyertag_0-1714943648245.png" alt="RFeyertag_0-1714943648245.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Sun, 05 May 2024 21:14:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerable-applications-under-windows/m-p/585824#M6636</guid>
      <dc:creator>RFeyertag</dc:creator>
      <dc:date>2024-05-05T21:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerable applications under Windows</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerable-applications-under-windows/m-p/585844#M6638</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190671"&gt;@RFeyertag&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes that is the awaited feature. You can crosscheck in your tenant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you feel this has answered your query, please let us know by clicking on "mark this as a Solution". &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2024 07:03:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerable-applications-under-windows/m-p/585844#M6638</guid>
      <dc:creator>aspatil</dc:creator>
      <dc:date>2024-05-06T07:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerable applications under Windows</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerable-applications-under-windows/m-p/585872#M6641</link>
      <description>&lt;P&gt;Thank you! It is working, but my TIGHTVNC vulnerable software is not found?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RFeyertag_0-1715004668339.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59533iCEAEE8786E172512/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="RFeyertag_0-1715004668339.png" alt="RFeyertag_0-1715004668339.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-27830" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2023-27830&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;On my laptop I activated it yesterday 02:14 PM.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How do I double check the functionality of this new feature?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2024 14:12:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerable-applications-under-windows/m-p/585872#M6641</guid>
      <dc:creator>RFeyertag</dc:creator>
      <dc:date>2024-05-06T14:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerable applications under Windows</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerable-applications-under-windows/m-p/586423#M6659</link>
      <description>&lt;P&gt;The question was answered. Other problems with missing CVEs are forwarded to the TAC support.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Sat, 11 May 2024 17:10:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerable-applications-under-windows/m-p/586423#M6659</guid>
      <dc:creator>RFeyertag</dc:creator>
      <dc:date>2024-05-11T17:10:24Z</dc:date>
    </item>
  </channel>
</rss>

