<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[This morning we decided to launch a &quot;Vulnerabilities&quot; category to track vulns without further actionable intelligence besides patching and monitoring.]]></title><description><![CDATA[<p>This morning we decided to launch a "Vulnerabilities" category to track vulns without further actionable intelligence besides patching and monitoring. And wouldn't you know it, a crit on Palo Alto's User-ID portal showed up to ring it in!</p><p><a href="https://discourse.ifin.network/t/cve-2026-0300-9-3-cvss-pan-os-unauthenticated-user-initiated-buffer-overflow-captive-portal/382" rel="nofollow noopener"><span>https://</span><span>discourse.ifin.network/t/cve-2</span><span>026-0300-9-3-cvss-pan-os-unauthenticated-user-initiated-buffer-overflow-captive-portal/382</span></a></p><p><a href="https://infosec.exchange/tags/CVE" rel="tag">#<span>CVE</span></a>-2026-0300 <a href="https://infosec.exchange/tags/CVE" rel="tag">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/IFIN" rel="tag">#<span>IFIN</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/de58d1ae-5076-49cd-a113-1369deb2815d/this-morning-we-decided-to-launch-a-vulnerabilities-category-to-track-vulns-without-further-actionable-intelligence-besides-patching-and-monitoring.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:05:28 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/de58d1ae-5076-49cd-a113-1369deb2815d.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 06 May 2026 13:57:47 GMT</pubDate><ttl>60</ttl></channel></rss>