{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Chromium: Monthly Vulnerability Updates"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: PAN-SA-2024-0011","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-03-11T22:30:00.185Z","generator":{"date":"2026-03-11T22:30:00.185Z","engine":{"name":"vulnogram","version":"0.1.0-rc1"}},"id":"PAN-SA-2024-0011","initial_release_date":"2024-10-09T16:00:00.000Z","revision_history":[{"number":"1","date":"2024-10-09T09:00:00.000Z","summary":"Initial publication"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"Prisma Browser","category":"product_name","branches":[{"category":"product_version_range","name":"vers:generic/Prisma Browser<129.59.2896.5","product":{"name":"Palo Alto Networks Prisma Browser","product_id":"PANW-Prisma-Access-Browser-22"}},{"category":"product_version_range","name":"vers:generic/Prisma Browser>=129.101.2913.3","product":{"name":"Palo Alto Networks Prisma Browser","product_id":"PANW-Prisma-Access-Browser-23"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2024-8904","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Type Confusion in V8."}],"references":[{"category":"external","summary":"NVD - CVE-2024-8904","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8904"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Type Confusion in V8."}]},{"cve":"CVE-2024-8905","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Inappropriate implementation in V8."}],"references":[{"category":"external","summary":"NVD - CVE-2024-8905","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8905"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Inappropriate implementation in V8."}]},{"cve":"CVE-2024-8906","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Incorrect security UI in Downloads."}],"references":[{"category":"external","summary":"NVD - CVE-2024-8906","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8906"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Incorrect security UI in Downloads."}]},{"cve":"CVE-2024-8907","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Insufficient data validation in Omnibox."}],"references":[{"category":"external","summary":"NVD - CVE-2024-8907","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8907"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Insufficient data validation in Omnibox."}]},{"cve":"CVE-2024-8908","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Inappropriate implementation in Autofill."}],"references":[{"category":"external","summary":"NVD - CVE-2024-8908","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8908"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Inappropriate implementation in Autofill."}]},{"cve":"CVE-2024-8909","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Inappropriate implementation in UI."}],"references":[{"category":"external","summary":"NVD - CVE-2024-8909","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-8909"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Inappropriate implementation in UI."}]},{"cve":"CVE-2024-9120","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Use after free in Dawn."}],"references":[{"category":"external","summary":"NVD - CVE-2024-9120","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9120"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Use after free in Dawn."}]},{"cve":"CVE-2024-9121","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Inappropriate implementation in V8."}],"references":[{"category":"external","summary":"NVD - CVE-2024-9121","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9121"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Inappropriate implementation in V8."}]},{"cve":"CVE-2024-9122","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Type Confusion in V8."}],"references":[{"category":"external","summary":"NVD - CVE-2024-9122","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9122"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Type Confusion in V8."}]},{"cve":"CVE-2024-9123","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Integer overflow in Skia."}],"references":[{"category":"external","summary":"NVD - CVE-2024-9123","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9123"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Integer overflow in Skia."}]},{"cve":"CVE-2024-7025","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Integer overflow in Layout."}],"references":[{"category":"external","summary":"NVD - CVE-2024-7025","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7025"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Integer overflow in Layout."}]},{"cve":"CVE-2024-9369","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Insufficient data validation in Mojo."}],"references":[{"category":"external","summary":"NVD - CVE-2024-9369","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9369"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Insufficient data validation in Mojo."}]},{"cve":"CVE-2024-9370","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Inappropriate implementation in V8."}],"references":[{"category":"external","summary":"NVD - CVE-2024-9370","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9370"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Inappropriate implementation in V8."}]},{"cve":"CVE-2024-9602","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Type Confusion in V8."}],"references":[{"category":"external","summary":"NVD - CVE-2024-9602","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9602"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Type Confusion in V8."}]},{"cve":"CVE-2024-9603","product_status":{"fixed":["PANW-Prisma-Access-Browser-23"],"known_affected":["PANW-Prisma-Access-Browser-22"]},"notes":[{"category":"description","text":"Type Confusion in V8."}],"references":[{"category":"external","summary":"NVD - CVE-2024-9603","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9603"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0011","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0011"}],"threats":[{"category":"impact","description":"Type Confusion in V8."}]}]}