<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo High vulnerability issue. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25277#M18422</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Couple of clarification questions&lt;/P&gt;&lt;P&gt;What version of PANOS are you running and which VPN/GP client do you have installed - we are running 4.0.11 with NetConnect 1.3.3&lt;/P&gt;&lt;P&gt;Who is you scan provider?&amp;nbsp; We are using Qualys (I believe)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Jun 2012 16:06:13 GMT</pubDate>
    <dc:creator>jcostello</dc:creator>
    <dc:date>2012-06-08T16:06:13Z</dc:date>
    <item>
      <title>Palo High vulnerability issue.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25275#M18420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the palo's on our public internet are being scanned for vulnerabilities and other open issues. Last week scanning a issue regarding "&lt;SPAN style="font-size: 8.0pt; font-family: &amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; mso-fareast-font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;; color: black; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"&gt;OpenSSL ASN.1 Parsing Vulnerabilities port 443/tcp over SSL" &lt;SPAN style="font-size: 10pt;"&gt; on the portal website of the Palo for ssl-vpn access was detected and marked high.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; color: black; font-size: 10pt; sans-serif&amp;amp;quot: ; Times New Roman&amp;amp;quot: ; mso-ansi-language: EN-US; font-family: &amp;amp;quot; Arial&amp;amp;quot: ; ,&amp;amp;quot: ; mso-fareast-font-family: &amp;amp;quot; "&gt;The security officer now wants to get this solved in a few days. What can we do about it as shutting down SSL portal is not possible either.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; color: black; font-size: 10pt; sans-serif&amp;amp;quot: ; Times New Roman&amp;amp;quot: ; mso-ansi-language: EN-US; font-family: &amp;amp;quot; Arial&amp;amp;quot: ; ,&amp;amp;quot: ; mso-fareast-font-family: &amp;amp;quot; "&gt;Here the full data from this report.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; color: black; font-size: 10pt; sans-serif&amp;amp;quot: ; Times New Roman&amp;amp;quot: ; mso-ansi-language: EN-US; font-family: &amp;amp;quot; Arial&amp;amp;quot: ; ,&amp;amp;quot: ; mso-fareast-font-family: &amp;amp;quot; "&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;QID: 38224&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;Category: General remote services&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;CVE ID: &lt;/SPAN&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color:blue;mso-ansi-language:EN-US"&gt;CVE-2003-0543&lt;/SPAN&gt;&lt;SPAN style="font-size: 8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language:EN-US"&gt;, &lt;/SPAN&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:blue;mso-ansi-language: EN-US"&gt;CVE-2003-0544&lt;/SPAN&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color:black;mso-ansi-language:EN-US"&gt;, &lt;/SPAN&gt;&lt;SPAN style="font-size:8.0pt; font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:blue;mso-ansi-language:EN-US"&gt;CVE-2003-0545&lt;/SPAN&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;, &lt;/SPAN&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color:blue;mso-ansi-language:EN-US"&gt;CVE-2005-1730&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;Vendor Reference: -&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;Bugtraq ID: &lt;/SPAN&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color:blue;mso-ansi-language:EN-US"&gt;8732&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;Service Modified: 11/06/2009&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;User Modified: -&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;Edited: No&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;PCI Vuln: Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;First Detected: 06/05/2012 at 18:01:45 (GMT+0200) Last Detected: 06/05/2012 at 18:01:45 (GMT+0200) Times Detected: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;SOLUTION:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;The OpenSSL Project released OpenSSL versions 0.9.6k and 0.9.7c to address these issues. Any application dynamically linked to OpenSSL&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;libraries should be restarted after applying fixes. Applications that are statically linked to OpenSSL libraries should be recompiled after upgrading&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;OpenSSL.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;Red Hat released an advisory (RHSA-2003:291-01) to address these issues. Fixes may be applied with the Red Hat Update Agent. Manual fixes are&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;also listed in the advisory.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;OpenPKG released advisory OpenPKG-SA-2003.044 to address these issues. Please see the advisory for details on obtaining and applying fixes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;Apple addressed these issues in MacOS X 10.2.8."&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;Anyone had the same issue ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="mso-layout-grid-align:none;text-autospace:none"&gt;&lt;SPAN style="font-size:8.0pt;font-family:&amp;amp;quot;Arial&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:black;mso-ansi-language: EN-US"&gt;Geert&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 11:23:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25275#M18420</guid>
      <dc:creator>gejac</dc:creator>
      <dc:date>2012-06-08T11:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: Palo High vulnerability issue.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25276#M18421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;+1 to this.&lt;/P&gt;&lt;P&gt;I have an open ticket in regard to this as well.&lt;/P&gt;&lt;P&gt;If you have not opened a ticket with support, please do so it should help with the escalation for resolution&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 15:59:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25276#M18421</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2012-06-08T15:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: Palo High vulnerability issue.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25277#M18422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Couple of clarification questions&lt;/P&gt;&lt;P&gt;What version of PANOS are you running and which VPN/GP client do you have installed - we are running 4.0.11 with NetConnect 1.3.3&lt;/P&gt;&lt;P&gt;Who is you scan provider?&amp;nbsp; We are using Qualys (I believe)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 16:06:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25277#M18422</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2012-06-08T16:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Palo High vulnerability issue.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25278#M18423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Geert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As of PAN-OS 4.0.0, we use OpenSLL 0.9.8p, which is not affected by this vulnerability.&amp;nbsp; The Qualys scan cannot confirm the vulnerability exists, so it states it just to be thorough.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 17:00:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25278#M18423</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2012-06-08T17:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Palo High vulnerability issue.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25279#M18424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes we are running 4.0.9 and 4.0.10 ont two different cluster&amp;nbsp; with both 1.3.3, and yes it is Qualys doing the scans.&lt;/P&gt;&lt;P&gt;So suppose we are safe, as since 4.0.0 the updated openssl is being used.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2012 15:22:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25279#M18424</guid>
      <dc:creator>gejac</dc:creator>
      <dc:date>2012-06-10T15:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: Palo High vulnerability issue.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25280#M18425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI on 4.1.X the OpenSSL version is also &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt; OpenSLL 0.9.8&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2012 05:05:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25280#M18425</guid>
      <dc:creator>vkelley</dc:creator>
      <dc:date>2012-09-07T05:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: Palo High vulnerability issue.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25281#M18426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version is open SSL Library in PANOS 5.0.x???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2014 07:49:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25281#M18426</guid>
      <dc:creator>KiCheon.Lee</dc:creator>
      <dc:date>2014-06-10T07:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: Palo High vulnerability issue.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25282#M18427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PANOS have been used for OPEN SSL 0.9.8 and that has not vulnerability of Open SSL issue. But newer OpenSSL issue has got a problem of PAN and you should call and question your local SE and He can provide you proper information for the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been always monitoring for you on the PAN community. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2014 07:56:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25282#M18427</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-06-10T07:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: Palo High vulnerability issue.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25283#M18428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Roh.&lt;/P&gt;&lt;P&gt;Your monitoring always gives me a scare.&lt;/P&gt;&lt;P&gt;Anyway, I need a detail version. For example, 0.9.8p or 0.9.8za or etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2014 09:33:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-high-vulnerability-issue/m-p/25283#M18428</guid>
      <dc:creator>KiCheon.Lee</dc:creator>
      <dc:date>2014-06-10T09:33:25Z</dc:date>
    </item>
  </channel>
</rss>

