<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with paloaltonetwork]]></title><description><![CDATA[A list of topics that have been tagged with paloaltonetwork]]></description><link>https://board.circlewithadot.net/tags/paloaltonetwork</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 00:17:44 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/paloaltonetwork.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[🚨 CVE-2026-0300: CRITICAL PAN-OS vuln in PA-Series &amp;amp; VM-Series.]]></title><description><![CDATA[ CVE-2026-0300: CRITICAL PAN-OS vuln in PA-Series &amp; VM-Series. Buffer overflow in User-ID Auth Portal enables unauth RCE as root. Restrict portal access ASAP. Prisma Access &amp; Cloud NGFW not impacted. Details: https://radar.offseq.com/threat/cve-2026-0300-cwe-787-out-of-bounds-write-in-palo--a6a99009 #OffSeq #PaloAltoNetworks #Vuln]]></description><link>https://board.circlewithadot.net/topic/0837932c-10e5-4ddf-95f9-145a1fb9170e/cve-2026-0300-critical-pan-os-vuln-in-pa-series-amp-vm-series.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/0837932c-10e5-4ddf-95f9-145a1fb9170e/cve-2026-0300-critical-pan-os-vuln-in-pa-series-amp-vm-series.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>