<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[🚨 CVE-2026-0300: CRITICAL PAN-OS vuln in PA-Series &amp;amp; VM-Series.]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f6a8.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--rotating_light" style="height:23px;width:auto;vertical-align:middle" title="🚨" alt="🚨" /> CVE-2026-0300: CRITICAL PAN-OS vuln in PA-Series &amp; VM-Series. Buffer overflow in User-ID Auth Portal enables unauth RCE as root. Restrict portal access ASAP. Prisma Access &amp; Cloud NGFW not impacted. Details: <a href="https://radar.offseq.com/threat/cve-2026-0300-cwe-787-out-of-bounds-write-in-palo--a6a99009" rel="nofollow noopener"><span>https://</span><span>radar.offseq.com/threat/cve-20</span><span>26-0300-cwe-787-out-of-bounds-write-in-palo--a6a99009</span></a> <a href="https://infosec.exchange/tags/OffSeq" rel="tag">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/PaloAltoNetworks" rel="tag">#<span>PaloAltoNetworks</span></a> <a href="https://infosec.exchange/tags/Vuln" rel="tag">#<span>Vuln</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/530/703/707/746/581/original/3d29b65a1866b60c.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/0837932c-10e5-4ddf-95f9-145a1fb9170e/cve-2026-0300-critical-pan-os-vuln-in-pa-series-amp-vm-series.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:24:39 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/0837932c-10e5-4ddf-95f9-145a1fb9170e.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 07 May 2026 01:30:27 GMT</pubDate><ttl>60</ttl></channel></rss>