<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 23:40:31 +0000</lastBuildDate>
    <item>
      <title>86c239f6-cbc7-4bf0-af00-899f3346ece4</title>
      <link>https://vulnerability.circl.lu/sighting/86c239f6-cbc7-4bf0-af00-899f3346ece4/export</link>
      <description>{"uuid": "86c239f6-cbc7-4bf0-af00-899f3346ece4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mle7sdx6qb2x", "content": "Alert: Critical zero-day vulnerability CVE-2026-0300 in Palo Alto Networks firewalls exploited by state-sponsored mashers. Immediate action required. #PotatoSecurity #ZeroDay #PaloAltoNetworks Link: thedailytechfeed.com/state-sponso...", "creation_timestamp": "2026-05-08T17:08:06.239950Z"}</description>
      <content:encoded>{"uuid": "86c239f6-cbc7-4bf0-af00-899f3346ece4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mle7sdx6qb2x", "content": "Alert: Critical zero-day vulnerability CVE-2026-0300 in Palo Alto Networks firewalls exploited by state-sponsored mashers. Immediate action required. #PotatoSecurity #ZeroDay #PaloAltoNetworks Link: thedailytechfeed.com/state-sponso...", "creation_timestamp": "2026-05-08T17:08:06.239950Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/86c239f6-cbc7-4bf0-af00-899f3346ece4/export</guid>
      <pubDate>Fri, 08 May 2026 17:08:06 +0000</pubDate>
    </item>
    <item>
      <title>54153004-7469-4c94-bee4-d09006f2f62b</title>
      <link>https://vulnerability.circl.lu/sighting/54153004-7469-4c94-bee4-d09006f2f62b/export</link>
      <description>{"uuid": "54153004-7469-4c94-bee4-d09006f2f62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116540357420563399", "content": "\ud83d\udcf0 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE\n\ud83d\udea8 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS\n\ud83d\udd17 https://cyber.netsecops.io", "creation_timestamp": "2026-05-08T18:25:35.714169Z"}</description>
      <content:encoded>{"uuid": "54153004-7469-4c94-bee4-d09006f2f62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116540357420563399", "content": "\ud83d\udcf0 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE\n\ud83d\udea8 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS\n\ud83d\udd17 https://cyber.netsecops.io", "creation_timestamp": "2026-05-08T18:25:35.714169Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/54153004-7469-4c94-bee4-d09006f2f62b/export</guid>
      <pubDate>Fri, 08 May 2026 18:25:35 +0000</pubDate>
    </item>
    <item>
      <title>01422c7d-9c55-42a3-9f20-f46f9adbc8e9</title>
      <link>https://vulnerability.circl.lu/sighting/01422c7d-9c55-42a3-9f20-f46f9adbc8e9/export</link>
      <description>{"uuid": "01422c7d-9c55-42a3-9f20-f46f9adbc8e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mlee5r52ka2w", "content": "\ud83d\udea8 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS", "creation_timestamp": "2026-05-08T18:26:02.455619Z"}</description>
      <content:encoded>{"uuid": "01422c7d-9c55-42a3-9f20-f46f9adbc8e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mlee5r52ka2w", "content": "\ud83d\udea8 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS", "creation_timestamp": "2026-05-08T18:26:02.455619Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/01422c7d-9c55-42a3-9f20-f46f9adbc8e9/export</guid>
      <pubDate>Fri, 08 May 2026 18:26:02 +0000</pubDate>
    </item>
    <item>
      <title>12e33f91-8383-4f55-94cc-7db82f3ef0bc</title>
      <link>https://vulnerability.circl.lu/sighting/12e33f91-8383-4f55-94cc-7db82f3ef0bc/export</link>
      <description>{"uuid": "12e33f91-8383-4f55-94cc-7db82f3ef0bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://bsky.app/profile/kubonai.bsky.social/post/3mlelzxt3w724", "content": "CVE-2026-0300: Palo Alto PAN-OS Critical Flaw Under Active Exploitation\n\nA critical buffer overflow vulnerability (CVE-2026-0300) in Palo Alto Networks PAN-OS is being actively exploited. CVSS 9...\n\n\ud83d\udd17 https://ipsec.live/blog/2026-05-06-palo-alto-pan-os-cve-2026-0300\n\n#infosec #cybersecurity", "creation_timestamp": "2026-05-08T20:47:05.049780Z"}</description>
      <content:encoded>{"uuid": "12e33f91-8383-4f55-94cc-7db82f3ef0bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://bsky.app/profile/kubonai.bsky.social/post/3mlelzxt3w724", "content": "CVE-2026-0300: Palo Alto PAN-OS Critical Flaw Under Active Exploitation\n\nA critical buffer overflow vulnerability (CVE-2026-0300) in Palo Alto Networks PAN-OS is being actively exploited. CVSS 9...\n\n\ud83d\udd17 https://ipsec.live/blog/2026-05-06-palo-alto-pan-os-cve-2026-0300\n\n#infosec #cybersecurity", "creation_timestamp": "2026-05-08T20:47:05.049780Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/12e33f91-8383-4f55-94cc-7db82f3ef0bc/export</guid>
      <pubDate>Fri, 08 May 2026 20:47:05 +0000</pubDate>
    </item>
    <item>
      <title>d0d9def2-c90a-468d-8178-3d2be68c6d9e</title>
      <link>https://vulnerability.circl.lu/sighting/d0d9def2-c90a-468d-8178-3d2be68c6d9e/export</link>
      <description>{"uuid": "d0d9def2-c90a-468d-8178-3d2be68c6d9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mlesdr46ys2g", "content": "Nation-state actors exploit Palo Alto PAN-OS zero-day for weeks\n\nPalo Alto says hackers exploited PAN-OS zero-day CVE-2026-0300 for weeks, gaining root access to exposed firewalls and hiding traces. Palo Alto Networks warned that suspected state-sponsored hackers have been exploit\u2026\n#hackernews #news", "creation_timestamp": "2026-05-08T22:39:56.316195Z"}</description>
      <content:encoded>{"uuid": "d0d9def2-c90a-468d-8178-3d2be68c6d9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mlesdr46ys2g", "content": "Nation-state actors exploit Palo Alto PAN-OS zero-day for weeks\n\nPalo Alto says hackers exploited PAN-OS zero-day CVE-2026-0300 for weeks, gaining root access to exposed firewalls and hiding traces. Palo Alto Networks warned that suspected state-sponsored hackers have been exploit\u2026\n#hackernews #news", "creation_timestamp": "2026-05-08T22:39:56.316195Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d0d9def2-c90a-468d-8178-3d2be68c6d9e/export</guid>
      <pubDate>Fri, 08 May 2026 22:39:56 +0000</pubDate>
    </item>
    <item>
      <title>e5415b1c-6e36-4293-bf50-7c80c0507088</title>
      <link>https://vulnerability.circl.lu/sighting/e5415b1c-6e36-4293-bf50-7c80c0507088/export</link>
      <description>{"uuid": "e5415b1c-6e36-4293-bf50-7c80c0507088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mlg3wkumcc2j", "content": "Palo Alto Networks PAN-OS firewalls are under active exploitation via CVE-2026-0300, a critical buffer overflow in the User-ID Auth Portal rated CVSS 9.3. Unauthenticated attackers can run code as root. CISA's federal patch deadline is today. Vendor fixes expected May 13.", "creation_timestamp": "2026-05-09T11:04:10.715119Z"}</description>
      <content:encoded>{"uuid": "e5415b1c-6e36-4293-bf50-7c80c0507088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mlg3wkumcc2j", "content": "Palo Alto Networks PAN-OS firewalls are under active exploitation via CVE-2026-0300, a critical buffer overflow in the User-ID Auth Portal rated CVSS 9.3. Unauthenticated attackers can run code as root. CISA's federal patch deadline is today. Vendor fixes expected May 13.", "creation_timestamp": "2026-05-09T11:04:10.715119Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e5415b1c-6e36-4293-bf50-7c80c0507088/export</guid>
      <pubDate>Sat, 09 May 2026 11:04:10 +0000</pubDate>
    </item>
    <item>
      <title>614f3c4b-cd60-4bd6-b820-eea9f5f2df96</title>
      <link>https://vulnerability.circl.lu/sighting/614f3c4b-cd60-4bd6-b820-eea9f5f2df96/export</link>
      <description>{"uuid": "614f3c4b-cd60-4bd6-b820-eea9f5f2df96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mlgww5k2q32v", "content": "\ud83d\udccc Palo Alto Networks Issues Alert for Actively Exploited Zero-Day Vulnerability (CVE-2026-0300) https://www.cyberhub.blog/article/25615-palo-alto-networks-issues-alert-for-actively-exploited-zero-day-vulnerability-cve-2026-0300", "creation_timestamp": "2026-05-09T19:07:08.978967Z"}</description>
      <content:encoded>{"uuid": "614f3c4b-cd60-4bd6-b820-eea9f5f2df96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mlgww5k2q32v", "content": "\ud83d\udccc Palo Alto Networks Issues Alert for Actively Exploited Zero-Day Vulnerability (CVE-2026-0300) https://www.cyberhub.blog/article/25615-palo-alto-networks-issues-alert-for-actively-exploited-zero-day-vulnerability-cve-2026-0300", "creation_timestamp": "2026-05-09T19:07:08.978967Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/614f3c4b-cd60-4bd6-b820-eea9f5f2df96/export</guid>
      <pubDate>Sat, 09 May 2026 19:07:08 +0000</pubDate>
    </item>
    <item>
      <title>5cc9f2c5-12e2-4eed-95be-31bd5d387a88</title>
      <link>https://vulnerability.circl.lu/sighting/5cc9f2c5-12e2-4eed-95be-31bd5d387a88/export</link>
      <description>{"uuid": "5cc9f2c5-12e2-4eed-95be-31bd5d387a88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mljakc7cyz25", "content": "CISA has added Palo Alto Networks PAN-OS flaw CVE-2026-0300 to its known-exploited vulnerabilities list. The buffer overflow in the User-ID Authentication Portal allows unauthenticated remote code execution with root privileges. CVSS 9.3. Patches expected May 13. (Palo Alto, Hacker News)", "creation_timestamp": "2026-05-10T17:04:46.847557Z"}</description>
      <content:encoded>{"uuid": "5cc9f2c5-12e2-4eed-95be-31bd5d387a88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mljakc7cyz25", "content": "CISA has added Palo Alto Networks PAN-OS flaw CVE-2026-0300 to its known-exploited vulnerabilities list. The buffer overflow in the User-ID Authentication Portal allows unauthenticated remote code execution with root privileges. CVSS 9.3. Patches expected May 13. (Palo Alto, Hacker News)", "creation_timestamp": "2026-05-10T17:04:46.847557Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5cc9f2c5-12e2-4eed-95be-31bd5d387a88/export</guid>
      <pubDate>Sun, 10 May 2026 17:04:46 +0000</pubDate>
    </item>
    <item>
      <title>06d5f636-c936-40ce-b5a0-e8e1f831cde8</title>
      <link>https://vulnerability.circl.lu/sighting/06d5f636-c936-40ce-b5a0-e8e1f831cde8/export</link>
      <description>{"uuid": "06d5f636-c936-40ce-b5a0-e8e1f831cde8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mljs7mlvfv2e", "content": "Palo Alto Networks\u88fdPAN-OS\u306e\u8106\u5f31\u6027\u5bfe\u7b56\u306b\u3064\u3044\u3066(CVE-2026-0300)  #IPA (May 8)\n\nwww.ipa.go.jp/security/sec...", "creation_timestamp": "2026-05-10T22:20:55.863620Z"}</description>
      <content:encoded>{"uuid": "06d5f636-c936-40ce-b5a0-e8e1f831cde8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mljs7mlvfv2e", "content": "Palo Alto Networks\u88fdPAN-OS\u306e\u8106\u5f31\u6027\u5bfe\u7b56\u306b\u3064\u3044\u3066(CVE-2026-0300)  #IPA (May 8)\n\nwww.ipa.go.jp/security/sec...", "creation_timestamp": "2026-05-10T22:20:55.863620Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/06d5f636-c936-40ce-b5a0-e8e1f831cde8/export</guid>
      <pubDate>Sun, 10 May 2026 22:20:55 +0000</pubDate>
    </item>
    <item>
      <title>c161a43e-b697-417f-bf52-7b70643249ed</title>
      <link>https://vulnerability.circl.lu/sighting/c161a43e-b697-417f-bf52-7b70643249ed/export</link>
      <description>{"uuid": "c161a43e-b697-417f-bf52-7b70643249ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3mljsxqugic2a", "content": "Palo Alto PAN-OS\u306e\u30bc\u30ed\u30c7\u30a4 \u8106\u5f31\u6027 CVE-2026-0300\u3001\u30cf\u30c3\u30ab\u30fc\u304c\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u60aa\u7528 \u30d1\u30c3\u30c1\u306f5\u670813\u65e5\u4e88\u5b9a\n\nrocket-boys.co.jp/security-mea...\n\n#\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56Lab #security #securitynews", "creation_timestamp": "2026-05-10T22:34:29.767009Z"}</description>
      <content:encoded>{"uuid": "c161a43e-b697-417f-bf52-7b70643249ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3mljsxqugic2a", "content": "Palo Alto PAN-OS\u306e\u30bc\u30ed\u30c7\u30a4 \u8106\u5f31\u6027 CVE-2026-0300\u3001\u30cf\u30c3\u30ab\u30fc\u304c\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u60aa\u7528 \u30d1\u30c3\u30c1\u306f5\u670813\u65e5\u4e88\u5b9a\n\nrocket-boys.co.jp/security-mea...\n\n#\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56Lab #security #securitynews", "creation_timestamp": "2026-05-10T22:34:29.767009Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c161a43e-b697-417f-bf52-7b70643249ed/export</guid>
      <pubDate>Sun, 10 May 2026 22:34:29 +0000</pubDate>
    </item>
  </channel>
</rss>
