cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-9470,https://securityvulnerability.io/vulnerability/CVE-2024-9470,Cortex XSOAR: Information Disclosure Vulnerability,A vulnerability in Cortex XSOAR allows the disclosure of incident data to users who do not have the privilege to view the data.,Palo Alto Networks,Cortex Xsoar,,,0.0004299999854993075,false,,false,false,true,2024-10-10T18:15:16.000Z,,false,false,,2024-10-09T17:15:00.000Z,0 CVE-2024-5914,https://securityvulnerability.io/vulnerability/CVE-2024-5914,Unauthenticated Command Injection Vulnerability in Palo Alto Networks Cortex XSOAR CommonScripts Pack,"A command injection vulnerability exists within the Palo Alto Networks Cortex XSOAR CommonScripts Pack. This issue enables unauthenticated attackers to execute arbitrary commands in the context of an integration container, potentially compromising the integrity and security of the application. The vulnerability underscores the importance of secure coding practices in developing integrations for security solutions, as any exploitation may lead to unauthorized actions that could affect the broader security posture of an organization.",Palo Alto Networks,Cortex Xsoar Commonscripts,9.8,CRITICAL,0.0012799999676644802,false,,false,false,false,,,false,false,,2024-08-14T17:15:00.000Z,0 CVE-2023-3282,https://securityvulnerability.io/vulnerability/CVE-2023-3282,Cortex XSOAR: Local Privilege Escalation (PE) Vulnerability in Cortex XSOAR Engine,A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system enables a local attacker to execute programs with elevated privileges if the attacker has shell access to the engine.,Palo Alto Networks,Cortex Xsoar,6.4,MEDIUM,0.0004199999966658652,false,,false,false,true,2024-06-14T04:15:03.000Z,,false,false,,2023-11-08T18:15:00.000Z,0 CVE-2023-0003,https://securityvulnerability.io/vulnerability/CVE-2023-0003,Cortex XSOAR: Local File Disclosure Vulnerability in the Cortex XSOAR Server,"A file disclosure vulnerability in the Palo Alto Networks Cortex XSOAR server software enables an authenticated user with access to the web interface to read local files from the server. ",Palo Alto Networks,Cortex Xsoar,6.5,MEDIUM,0.001230000052601099,false,,false,false,false,,,false,false,,2023-02-08T18:15:00.000Z,0 CVE-2022-0031,https://securityvulnerability.io/vulnerability/CVE-2022-0031,Cortex XSOAR: Local Privilege Escalation (PE) Vulnerability in Cortex XSOAR Engine,A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system allows a local attacker with shell access to the engine to execute programs with elevated privileges.,Palo Alto Networks,Cortex Xsoar,6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-11-09T17:24:34.557Z,0 CVE-2022-0027,https://securityvulnerability.io/vulnerability/CVE-2022-0027,Cortex XSOAR: Incorrect Authorization Vulnerability When Generating Reports,"An improper authorization vulnerability in Palo Alto Network Cortex XSOAR software enables authenticated users in non-Read-Only groups to generate an email report that contains summary information about all incidents in the Cortex XSOAR instance, including incidents to which the user does not have access. This issue impacts: All versions of Cortex XSOAR 6.1; All versions of Cortex XSOAR 6.2; All versions of Cortex XSOAR 6.5; Cortex XSOAR 6.6 versions earlier than Cortex XSOAR 6.6.0 build 6.6.0.2585049.",Palo Alto Networks,Cortex Xsoar,4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-05-11T00:00:00.000Z,0 CVE-2022-0020,https://securityvulnerability.io/vulnerability/CVE-2022-0020,Cortex XSOAR: Stored Cross-Site Scripting (XSS) Vulnerability in Web Interface,A stored cross-site scripting (XSS) vulnerability in Palo Alto Network Cortex XSOAR web interface enables an authenticated network-based attacker to store a persistent javascript payload that will perform arbitrary actions in the Cortex XSOAR web interface on behalf of authenticated administrators who encounter the payload during normal operations. This issue impacts: All builds of Cortex XSOAR 6.1.0; Cortex XSOAR 6.2.0 builds earlier than build 1958888.,Palo Alto Networks,Cortex Xsoar,6.8,MEDIUM,0.000539999979082495,false,,false,false,true,2024-09-16T17:15:57.000Z,,false,false,,2022-02-10T00:00:00.000Z,0 CVE-2021-3051,https://securityvulnerability.io/vulnerability/CVE-2021-3051,Cortex XSOAR: Authentication Bypass in SAML Authentication,An improper verification of cryptographic signature vulnerability exists in Cortex XSOAR SAML authentication that enables an unauthenticated network-based attacker with specific knowledge of the Cortex XSOAR instance to access protected resources and perform unauthorized actions on the Cortex XSOAR server. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 1578677; Cortex XSOAR 6.0.2 builds earlier than 1576452; Cortex XSOAR 6.1.0 builds earlier than 1578663; Cortex XSOAR 6.2.0 builds earlier than 1578666. All Cortex XSOAR instances hosted by Palo Alto Networks are protected from this vulnerability; no additional action is required for these instances.,Palo Alto Networks,Cortex Xsoar,8.1,HIGH,0.002219999907538295,false,,false,false,true,2024-08-03T17:16:36.000Z,,false,false,,2021-09-08T00:00:00.000Z,0 CVE-2021-3049,https://securityvulnerability.io/vulnerability/CVE-2021-3049,Cortex XSOAR: Improper Authorization of Incident Investigations Vulnerability,An improper authorization vulnerability in the Palo Alto Networks Cortex XSOAR server enables an authenticated network-based attacker with investigation read permissions to download files from incident investigations of which they are aware but are not a part of. This issue impacts: All Cortex XSOAR 5.5.0 builds; Cortex XSOAR 6.1.0 builds earlier than 12099345. This issue does not impact Cortex XSOAR 6.2.0 versions.,Palo Alto Networks,Cortex Xsoar,2.6,LOW,0.000539999979082495,false,,false,false,true,2024-08-03T17:16:36.000Z,,false,false,,2021-09-08T00:00:00.000Z,0 CVE-2021-3044,https://securityvulnerability.io/vulnerability/CVE-2021-3044,Cortex XSOAR: Unauthorized Usage of the REST API,"An improper authorization vulnerability in Palo Alto Networks Cortex XSOAR enables a remote unauthenticated attacker with network access to the Cortex XSOAR server to perform unauthorized actions through the REST API. This issue impacts: Cortex XSOAR 6.1.0 builds later than 1016923 and earlier than 1271064; Cortex XSOAR 6.2.0 builds earlier than 1271065. This issue does not impact Cortex XSOAR 5.5.0, Cortex XSOAR 6.0.0, Cortex XSOAR 6.0.1, or Cortex XSOAR 6.0.2 versions. All Cortex XSOAR instances hosted by Palo Alto Networks are upgraded to resolve this vulnerability. No additional action is required for these instances.",Palo Alto Networks,Cortex Xsoar,9.8,CRITICAL,0.0043299999088048935,false,,false,false,true,2024-08-03T17:16:36.000Z,,false,false,,2021-06-22T00:00:00.000Z,0 CVE-2021-3034,https://securityvulnerability.io/vulnerability/CVE-2021-3034,Cortex XSOAR: Secrets for SAML single sign-on (SSO) integration may be logged in system logs,An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the '/var/log/demisto/' server logs when testing the integration during setup. This logged information includes the private key and identity provider certificate used to configure the SAML SSO integration. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 98622; Cortex XSOAR 6.0.1 builds earlier than 830029; Cortex XSOAR 6.0.2 builds earlier than 98623; Cortex XSOAR 6.1.0 builds earlier than 848144.,Palo Alto Networks,Cortex Xsoar,5.1,MEDIUM,0.0004400000034365803,false,,false,false,true,2024-08-03T17:16:35.000Z,,false,false,,2021-03-10T00:00:00.000Z,0