{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Chromium: Monthly Vulnerability Updates"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: PAN-SA-2024-0016","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-04-08T08:02:39.534Z","generator":{"date":"2026-04-08T08:02:39.534Z","engine":{"name":"vulnogram","version":"0.1.0-rc1"}},"id":"PAN-SA-2024-0016","initial_release_date":"2024-11-13T18:00:00.000Z","revision_history":[{"number":"1","date":"2024-11-13T09:00:00.000Z","summary":"Initial Publication"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"Prisma Browser","category":"product_name","branches":[{"category":"product_version_range","name":"vers:generic/Prisma Browser<130.59.2920.7","product":{"name":"Palo Alto Networks Prisma Browser","product_id":"PANW-Prisma-Browser-55"}},{"category":"product_version_range","name":"vers:generic/Prisma Browser>=130.117.2920.13","product":{"name":"Palo Alto Networks Prisma Browser","product_id":"PANW-Prisma-Browser-57"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2024-10229","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Inappropriate implementation in Extensions"}],"references":[{"category":"external","summary":"NVD - CVE-2024-10229","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10229"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Inappropriate implementation in Extensions"}]},{"cve":"CVE-2024-10230","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Type Confusion in V8"}],"references":[{"category":"external","summary":"NVD - CVE-2024-10230","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10230"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Type Confusion in V8"}]},{"cve":"CVE-2024-10231","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Type Confusion in V8"}],"references":[{"category":"external","summary":"NVD - CVE-2024-10231","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10231"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Type Confusion in V8"}]},{"cve":"CVE-2024-10487","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Out of bounds write in Dawn"}],"references":[{"category":"external","summary":"NVD - CVE-2024-10487","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10487"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Out of bounds write in Dawn"}]},{"cve":"CVE-2024-10488","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Use after free in WebRTC"}],"references":[{"category":"external","summary":"NVD - CVE-2024-10488","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10488"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Use after free in WebRTC"}]},{"cve":"CVE-2024-9954","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Use after free in AI"}],"references":[{"category":"external","summary":"NVD - CVE-2024-9954","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9954"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Use after free in AI"}]},{"cve":"CVE-2024-9955","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Use after free in WebAuthentication"}],"references":[{"category":"external","summary":"NVD - CVE-2024-9955","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9955"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Use after free in WebAuthentication"}]},{"cve":"CVE-2024-9956","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Inappropriate implementation in WebAuthentication "}],"references":[{"category":"external","summary":"NVD - CVE-2024-9956","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9956"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Inappropriate implementation in WebAuthentication "}]},{"cve":"CVE-2024-9957","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Use after free in UI "}],"references":[{"category":"external","summary":"NVD - CVE-2024-9957","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9957"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Use after free in UI "}]},{"cve":"CVE-2024-9958","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Inappropriate implementation in PictureInPicture"}],"references":[{"category":"external","summary":"NVD - CVE-2024-9958","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9958"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Inappropriate implementation in PictureInPicture"}]},{"cve":"CVE-2024-9959","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Use after free in DevTools"}],"references":[{"category":"external","summary":"NVD - CVE-2024-9959","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9959"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Use after free in DevTools"}]},{"cve":"CVE-2024-9960","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Use after free in Dawn"}],"references":[{"category":"external","summary":"NVD - CVE-2024-9960","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9960"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Use after free in Dawn"}]},{"cve":"CVE-2024-9961","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Use after free in ParcelTracking "}],"references":[{"category":"external","summary":"NVD - CVE-2024-9961","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9961"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Use after free in ParcelTracking "}]},{"cve":"CVE-2024-9962","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Inappropriate implementation in Permissions"}],"references":[{"category":"external","summary":"NVD - CVE-2024-9962","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9962"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Inappropriate implementation in Permissions"}]},{"cve":"CVE-2024-9963","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Insufficient data validation in Downloads"}],"references":[{"category":"external","summary":"NVD - CVE-2024-9963","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9963"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Insufficient data validation in Downloads"}]},{"cve":"CVE-2024-9964","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Inappropriate implementation in Payments"}],"references":[{"category":"external","summary":"NVD - CVE-2024-9964","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9964"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Inappropriate implementation in Payments"}]},{"cve":"CVE-2024-9965","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Insufficient data validation in DevTools "}],"references":[{"category":"external","summary":"NVD - CVE-2024-9965","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9965"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Insufficient data validation in DevTools "}]},{"cve":"CVE-2024-9966","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Inappropriate implementation in Navigations"}],"references":[{"category":"external","summary":"NVD - CVE-2024-9966","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-9966"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Inappropriate implementation in Navigations"}]},{"cve":"CVE-2024-10826","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Use after free in Family Experiences."}],"references":[{"category":"external","summary":"NVD - CVE-2024-10826","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10826"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Use after free in Family Experiences."}]},{"cve":"CVE-2024-10827","product_status":{"fixed":["PANW-Prisma-Browser-57"],"known_affected":["PANW-Prisma-Browser-55"]},"notes":[{"category":"description","text":"Use after free in Serial."}],"references":[{"category":"external","summary":"NVD - CVE-2024-10827","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10827"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0016","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0016"}],"threats":[{"category":"impact","description":"Use after free in Serial."}]}]}