<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE Description clarification in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cve-description-clarification/m-p/574370#M115453</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/238781"&gt;@Charlie80&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cwe.mitre.org/data/definitions/78" target="_blank"&gt;https://cwe.mitre.org/data/definitions/78&lt;/A&gt;&amp;nbsp;helps provide a little bit of insight into the type of exploit that leads to the vulnerability. Anyone authenticated to the GUI has the potential to exploit this vulnerability, which would include any read-only permissioned users.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jan 2024 23:07:47 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2024-01-24T23:07:47Z</dc:date>
    <item>
      <title>CVE Description clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-description-clarification/m-p/574249#M115423</link>
      <description>&lt;P&gt;I'm looking at CVE-2023-6795 and in the description I see "enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall"&lt;/P&gt;
&lt;P&gt;This means that all admin included the readonly admin like the SuperUser (ReadOnly) can do the execute arbitrary code?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 08:18:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-description-clarification/m-p/574249#M115423</guid>
      <dc:creator>Charlie80</dc:creator>
      <dc:date>2024-01-24T08:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: CVE Description clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-description-clarification/m-p/574370#M115453</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/238781"&gt;@Charlie80&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cwe.mitre.org/data/definitions/78" target="_blank"&gt;https://cwe.mitre.org/data/definitions/78&lt;/A&gt;&amp;nbsp;helps provide a little bit of insight into the type of exploit that leads to the vulnerability. Anyone authenticated to the GUI has the potential to exploit this vulnerability, which would include any read-only permissioned users.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 23:07:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-description-clarification/m-p/574370#M115453</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-01-24T23:07:47Z</dc:date>
    </item>
  </channel>
</rss>

