Looking for more?

Let us help you track the cyber-threat landscape

  • base

    $15/mo

    Cancel anytime

    • Daily news: Keep up to date on cyber-security and ensure that you are not going to miss any of the big news

    • Deep search: Get access to a large, historical archive of more than 50.000 news articles and a set of advanced search options

    • User customization: Gives you the ability to cut out the noise and focus on the important stuff

  • pro

    $29/mo

    Cancel anytime

    • Dashboard access: Keep up to date on the news-cycle and track the ever-evolving threat landscape

    • Trending CVE's: See what CVE's are currently being exploited and researched, and get insights into how they appear in the wild

    • Cutting-edge AI: We don't pretend that AI is going to solve all your problems, but it sure does help.

  • enterprise

    Starting at

    $200/mo

    Contact us for a qoute

    • Service integration: Access a range of integration options, from API access to Slack and Teams integration

    • Team-wide Pro access: Onboard your whole team in OSINTer. No extra seat expenses, usage costs or other hidden fees

    • Custom deployment: Need on-prem deployment for data-protection? Or maybe a custom solution? Contact us, and experience a sea of opportunities

    Contact us

Trending CVE's

Track their ever-evolving media presence

CVE-2025-0108: Authentication bypass in Palo Alto PAN-OS compromises integrity and confidentiality.

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.



BaseScore:

9.1

CVE:

CVE-2025-0108

Weaknesses:

CWE-306

CWE-306

Keywords:



Loading CVE articles.

Frequently asked questions

Yes! For a long period OSINTer was without license, but has recently been licensed under Affero GPL v3. This means that you not only can take a peak in the inner-workings of OSINTer at the public Github repos, but also that we highly encourage participating in the developemnt of OSINTer.