<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T02:57:22.984963+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/86c239f6-cbc7-4bf0-af00-899f3346ece4/export</id>
    <title>86c239f6-cbc7-4bf0-af00-899f3346ece4</title>
    <updated>2026-05-11T02:57:22.995902+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "86c239f6-cbc7-4bf0-af00-899f3346ece4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mle7sdx6qb2x", "content": "Alert: Critical zero-day vulnerability CVE-2026-0300 in Palo Alto Networks firewalls exploited by state-sponsored mashers. Immediate action required. #PotatoSecurity #ZeroDay #PaloAltoNetworks Link: thedailytechfeed.com/state-sponso...", "creation_timestamp": "2026-05-08T17:08:06.239950Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/86c239f6-cbc7-4bf0-af00-899f3346ece4/export"/>
    <published>2026-05-08T17:08:06.239950+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/54153004-7469-4c94-bee4-d09006f2f62b/export</id>
    <title>54153004-7469-4c94-bee4-d09006f2f62b</title>
    <updated>2026-05-11T02:57:22.995780+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "54153004-7469-4c94-bee4-d09006f2f62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116540357420563399", "content": "\ud83d\udcf0 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE\n\ud83d\udea8 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS\n\ud83d\udd17 https://cyber.netsecops.io", "creation_timestamp": "2026-05-08T18:25:35.714169Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/54153004-7469-4c94-bee4-d09006f2f62b/export"/>
    <published>2026-05-08T18:25:35.714169+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/01422c7d-9c55-42a3-9f20-f46f9adbc8e9/export</id>
    <title>01422c7d-9c55-42a3-9f20-f46f9adbc8e9</title>
    <updated>2026-05-11T02:57:22.995300+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "01422c7d-9c55-42a3-9f20-f46f9adbc8e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mlee5r52ka2w", "content": "\ud83d\udea8 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS", "creation_timestamp": "2026-05-08T18:26:02.455619Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/01422c7d-9c55-42a3-9f20-f46f9adbc8e9/export"/>
    <published>2026-05-08T18:26:02.455619+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/12e33f91-8383-4f55-94cc-7db82f3ef0bc/export</id>
    <title>12e33f91-8383-4f55-94cc-7db82f3ef0bc</title>
    <updated>2026-05-11T02:57:22.995154+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "12e33f91-8383-4f55-94cc-7db82f3ef0bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://bsky.app/profile/kubonai.bsky.social/post/3mlelzxt3w724", "content": "CVE-2026-0300: Palo Alto PAN-OS Critical Flaw Under Active Exploitation\n\nA critical buffer overflow vulnerability (CVE-2026-0300) in Palo Alto Networks PAN-OS is being actively exploited. CVSS 9...\n\n\ud83d\udd17 https://ipsec.live/blog/2026-05-06-palo-alto-pan-os-cve-2026-0300\n\n#infosec #cybersecurity", "creation_timestamp": "2026-05-08T20:47:05.049780Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/12e33f91-8383-4f55-94cc-7db82f3ef0bc/export"/>
    <published>2026-05-08T20:47:05.049780+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d0d9def2-c90a-468d-8178-3d2be68c6d9e/export</id>
    <title>d0d9def2-c90a-468d-8178-3d2be68c6d9e</title>
    <updated>2026-05-11T02:57:22.994990+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d0d9def2-c90a-468d-8178-3d2be68c6d9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mlesdr46ys2g", "content": "Nation-state actors exploit Palo Alto PAN-OS zero-day for weeks\n\nPalo Alto says hackers exploited PAN-OS zero-day CVE-2026-0300 for weeks, gaining root access to exposed firewalls and hiding traces. Palo Alto Networks warned that suspected state-sponsored hackers have been exploit\u2026\n#hackernews #news", "creation_timestamp": "2026-05-08T22:39:56.316195Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d0d9def2-c90a-468d-8178-3d2be68c6d9e/export"/>
    <published>2026-05-08T22:39:56.316195+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e5415b1c-6e36-4293-bf50-7c80c0507088/export</id>
    <title>e5415b1c-6e36-4293-bf50-7c80c0507088</title>
    <updated>2026-05-11T02:57:22.994808+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e5415b1c-6e36-4293-bf50-7c80c0507088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mlg3wkumcc2j", "content": "Palo Alto Networks PAN-OS firewalls are under active exploitation via CVE-2026-0300, a critical buffer overflow in the User-ID Auth Portal rated CVSS 9.3. Unauthenticated attackers can run code as root. CISA's federal patch deadline is today. Vendor fixes expected May 13.", "creation_timestamp": "2026-05-09T11:04:10.715119Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e5415b1c-6e36-4293-bf50-7c80c0507088/export"/>
    <published>2026-05-09T11:04:10.715119+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/614f3c4b-cd60-4bd6-b820-eea9f5f2df96/export</id>
    <title>614f3c4b-cd60-4bd6-b820-eea9f5f2df96</title>
    <updated>2026-05-11T02:57:22.994654+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "614f3c4b-cd60-4bd6-b820-eea9f5f2df96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mlgww5k2q32v", "content": "\ud83d\udccc Palo Alto Networks Issues Alert for Actively Exploited Zero-Day Vulnerability (CVE-2026-0300) https://www.cyberhub.blog/article/25615-palo-alto-networks-issues-alert-for-actively-exploited-zero-day-vulnerability-cve-2026-0300", "creation_timestamp": "2026-05-09T19:07:08.978967Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/614f3c4b-cd60-4bd6-b820-eea9f5f2df96/export"/>
    <published>2026-05-09T19:07:08.978967+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5cc9f2c5-12e2-4eed-95be-31bd5d387a88/export</id>
    <title>5cc9f2c5-12e2-4eed-95be-31bd5d387a88</title>
    <updated>2026-05-11T02:57:22.994429+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5cc9f2c5-12e2-4eed-95be-31bd5d387a88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mljakc7cyz25", "content": "CISA has added Palo Alto Networks PAN-OS flaw CVE-2026-0300 to its known-exploited vulnerabilities list. The buffer overflow in the User-ID Authentication Portal allows unauthenticated remote code execution with root privileges. CVSS 9.3. Patches expected May 13. (Palo Alto, Hacker News)", "creation_timestamp": "2026-05-10T17:04:46.847557Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5cc9f2c5-12e2-4eed-95be-31bd5d387a88/export"/>
    <published>2026-05-10T17:04:46.847557+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/06d5f636-c936-40ce-b5a0-e8e1f831cde8/export</id>
    <title>06d5f636-c936-40ce-b5a0-e8e1f831cde8</title>
    <updated>2026-05-11T02:57:22.994177+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "06d5f636-c936-40ce-b5a0-e8e1f831cde8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mljs7mlvfv2e", "content": "Palo Alto Networks\u88fdPAN-OS\u306e\u8106\u5f31\u6027\u5bfe\u7b56\u306b\u3064\u3044\u3066(CVE-2026-0300)  #IPA (May 8)\n\nwww.ipa.go.jp/security/sec...", "creation_timestamp": "2026-05-10T22:20:55.863620Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/06d5f636-c936-40ce-b5a0-e8e1f831cde8/export"/>
    <published>2026-05-10T22:20:55.863620+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c161a43e-b697-417f-bf52-7b70643249ed/export</id>
    <title>c161a43e-b697-417f-bf52-7b70643249ed</title>
    <updated>2026-05-11T02:57:22.991104+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c161a43e-b697-417f-bf52-7b70643249ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3mljsxqugic2a", "content": "Palo Alto PAN-OS\u306e\u30bc\u30ed\u30c7\u30a4 \u8106\u5f31\u6027 CVE-2026-0300\u3001\u30cf\u30c3\u30ab\u30fc\u304c\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u60aa\u7528 \u30d1\u30c3\u30c1\u306f5\u670813\u65e5\u4e88\u5b9a\n\nrocket-boys.co.jp/security-mea...\n\n#\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56Lab #security #securitynews", "creation_timestamp": "2026-05-10T22:34:29.767009Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c161a43e-b697-417f-bf52-7b70643249ed/export"/>
    <published>2026-05-10T22:34:29.767009+00:00</published>
  </entry>
</feed>
