<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability alerts in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-alerts/m-p/254970#M511</link>
    <description>&lt;P&gt;&lt;STRONG&gt;There is a web site &lt;A href="http://www.vpnranks.com(35.170.95.4" target="_blank"&gt;www.vpnranks.com(35.170.95.4&lt;/A&gt;) that is identified as type=THREAT and App=HAS KNOWN VULNERABILITY.&amp;nbsp; As a result, it is blocked by our PAN firewalls (i.e. this is the info&amp;nbsp;in the logs when I ping 35.175.95.4).&amp;nbsp; According to the PAN&amp;nbsp;web&amp;nbsp;site, I see this may indicate 35.170.95.4 has a publicly reported vulnerability. The owner of the site &lt;A href="http://www.vpnranks.com" target="_blank"&gt;www.vpnranks.com&lt;/A&gt; is asking for an explanation.&amp;nbsp; This is just one example of several VPN sites that report similar blocking.&amp;nbsp; I am happy to continue blocking the sites since there is some suspicion, however, it would help to know more about publicly reported vulnerabilities if that is the trigger,&amp;nbsp;or what really is the trigger.&amp;nbsp;&amp;nbsp;Also, the site owner knowing the issue would like, if reasonably possible, to remedy the situation.&amp;nbsp; If this is not the right way to reports this, then please let me&amp;nbsp;know where to pose the question. Many thanks.&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 25 Mar 2019 21:35:47 GMT</pubDate>
    <dc:creator>cottrell</dc:creator>
    <dc:date>2019-03-25T21:35:47Z</dc:date>
    <item>
      <title>Vulnerability alerts</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-alerts/m-p/254970#M511</link>
      <description>&lt;P&gt;&lt;STRONG&gt;There is a web site &lt;A href="http://www.vpnranks.com(35.170.95.4" target="_blank"&gt;www.vpnranks.com(35.170.95.4&lt;/A&gt;) that is identified as type=THREAT and App=HAS KNOWN VULNERABILITY.&amp;nbsp; As a result, it is blocked by our PAN firewalls (i.e. this is the info&amp;nbsp;in the logs when I ping 35.175.95.4).&amp;nbsp; According to the PAN&amp;nbsp;web&amp;nbsp;site, I see this may indicate 35.170.95.4 has a publicly reported vulnerability. The owner of the site &lt;A href="http://www.vpnranks.com" target="_blank"&gt;www.vpnranks.com&lt;/A&gt; is asking for an explanation.&amp;nbsp; This is just one example of several VPN sites that report similar blocking.&amp;nbsp; I am happy to continue blocking the sites since there is some suspicion, however, it would help to know more about publicly reported vulnerabilities if that is the trigger,&amp;nbsp;or what really is the trigger.&amp;nbsp;&amp;nbsp;Also, the site owner knowing the issue would like, if reasonably possible, to remedy the situation.&amp;nbsp; If this is not the right way to reports this, then please let me&amp;nbsp;know where to pose the question. Many thanks.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 21:35:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-alerts/m-p/254970#M511</guid>
      <dc:creator>cottrell</dc:creator>
      <dc:date>2019-03-25T21:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability alerts</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-alerts/m-p/255945#M526</link>
      <description>&lt;P&gt;Please open a case with Support&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 17:39:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-alerts/m-p/255945#M526</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2019-04-03T17:39:26Z</dc:date>
    </item>
  </channel>
</rss>

