<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Debian Admin</title>
	<atom:link href="http://www.debianadmin.com/feed" rel="self" type="application/rss+xml" />
	<link>http://www.debianadmin.com</link>
	<description>Debian/Ubuntu Linux System Administration Tutorials,Howtos,Tips</description>
	<lastBuildDate>Wed, 08 Apr 2026 16:00:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>CVE-2026-0232 Cortex XDR Agent: Local Administrator can disable the agent on Windows (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/CVE-2026-0232</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/cve-2026-0232-cortex-xdr-agent-local-administrator-can-disable-the-agent-on-windows-severity-medium.html</guid>

					<description><![CDATA[Related content: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH) PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM) PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM) CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM) CVE-2024-3596 PAN-OS: CHAP and PAP When Used with [&#8230;]<br/><a href="https://security.paloaltonetworks.com/CVE-2026-0232" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2026-0234" title="Permanent link to CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)">CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" title="Permanent link to PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)">PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0014" title="Permanent link to PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)">PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4619" title="Permanent link to CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)">CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2024-3596" title="Permanent link to CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)">CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2026-0233 Autonomous Digital Experience Manager: Improper validation of ADEM certificate (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/CVE-2026-0233</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/cve-2026-0233-autonomous-digital-experience-manager-improper-validation-of-adem-certificate-severity-medium.html</guid>

					<description><![CDATA[Related content: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH) PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM) PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM) CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM) CVE-2024-3596 PAN-OS: CHAP and PAP When Used with [&#8230;]<br/><a href="https://security.paloaltonetworks.com/CVE-2026-0233" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2026-0234" title="Permanent link to CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)">CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" title="Permanent link to PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)">PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0014" title="Permanent link to PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)">PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4619" title="Permanent link to CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)">CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2024-3596" title="Permanent link to CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)">CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PAN-SA-2026-0004 Chromium: Monthly Vulnerability Update (April 2026) (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/PAN-SA-2026-0004</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/pan-sa-2026-0004-chromium-monthly-vulnerability-update-april-2026-severity-medium.html</guid>

					<description><![CDATA[Related content: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH) PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM) PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM) CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM) CVE-2024-3596 PAN-OS: CHAP and PAP When Used with [&#8230;]<br/><a href="https://security.paloaltonetworks.com/PAN-SA-2026-0004" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2026-0234" title="Permanent link to CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)">CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" title="Permanent link to PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)">PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0014" title="Permanent link to PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)">PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4619" title="Permanent link to CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)">CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2024-3596" title="Permanent link to CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)">CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PAN-SA-2026-0006 Informational Bulletin: Impact assessment of OSS CVEs in PAN-OS (Severity: INFORMATIONAL)</title>
		<link>https://security.paloaltonetworks.com/PAN-SA-2026-0006</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/pan-sa-2026-0006-informational-bulletin-impact-assessment-of-oss-cves-in-pan-os-severity-informational.html</guid>

					<description><![CDATA[Related content: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH) PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM) PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM) CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM) CVE-2024-3596 PAN-OS: CHAP and PAP When Used with [&#8230;]<br/><a href="https://security.paloaltonetworks.com/PAN-SA-2026-0006" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2026-0234" title="Permanent link to CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)">CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" title="Permanent link to PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)">PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0014" title="Permanent link to PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)">PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4619" title="Permanent link to CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)">CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2024-3596" title="Permanent link to CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)">CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PAN-SA-2026-0005 Informational Bulletin: OSS CVEs Fixed in PAN-OS (Severity: INFORMATIONAL)</title>
		<link>https://security.paloaltonetworks.com/PAN-SA-2026-0005</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/pan-sa-2026-0005-informational-bulletin-oss-cves-fixed-in-pan-os-severity-informational.html</guid>

					<description><![CDATA[Related content: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH) PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM) PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM) CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM) CVE-2024-3596 PAN-OS: CHAP and PAP When Used with [&#8230;]<br/><a href="https://security.paloaltonetworks.com/PAN-SA-2026-0005" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2026-0234" title="Permanent link to CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)">CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" title="Permanent link to PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)">PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0014" title="Permanent link to PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)">PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4619" title="Permanent link to CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)">CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2024-3596" title="Permanent link to CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)">CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration (Severity: HIGH)</title>
		<link>https://security.paloaltonetworks.com/CVE-2026-0234</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/cve-2026-0234-cortex-xsoar-improper-verification-of-cryptographic-signature-in-microsoft-teams-integration-severity-high.html</guid>

					<description><![CDATA[Related content: PAN-SA-2026-0005 Informational Bulletin: OSS CVEs Fixed in PAN-OS (Severity: INFORMATIONAL) PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM) PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM) CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM) CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to [&#8230;]<br/><a href="https://security.paloaltonetworks.com/CVE-2026-0234" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0005" title="Permanent link to PAN-SA-2026-0005 Informational Bulletin: OSS CVEs Fixed in PAN-OS (Severity: INFORMATIONAL)">PAN-SA-2026-0005 Informational Bulletin: OSS CVEs Fixed in PAN-OS (Severity: INFORMATIONAL)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" title="Permanent link to PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)">PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0014" title="Permanent link to PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)">PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4619" title="Permanent link to CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)">CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2024-3596" title="Permanent link to CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)">CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2026-0231 Cortex XDR Broker VM: Sensitive Information Disclosure Vulnerability (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/CVE-2026-0231</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.debianadmin.com/cve-2026-0231-cortex-xdr-broker-vm-sensitive-information-disclosure-vulnerability-severity-medium.html</guid>

					<description><![CDATA[Related content: PAN-SA-2026-0003 Chromium: Monthly Vulnerability Update (March 2026) (Severity: MEDIUM) PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM) PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH) CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW) CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature (Severity: MEDIUM)<br/><a href="https://security.paloaltonetworks.com/CVE-2026-0231" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0003" title="Permanent link to PAN-SA-2026-0003 Chromium: Monthly Vulnerability Update (March 2026) (Severity: MEDIUM)">PAN-SA-2026-0003 Chromium: Monthly Vulnerability Update (March 2026) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" title="Permanent link to PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)">PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0002" title="Permanent link to PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)">PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2026-0228" title="Permanent link to CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW)">CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2026-0229" title="Permanent link to CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature (Severity: MEDIUM)">CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2026-0230 Cortex XDR Agent: Local Administrator can disable the agent on macOS (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/CVE-2026-0230</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.debianadmin.com/cve-2026-0230-cortex-xdr-agent-local-administrator-can-disable-the-agent-on-macos-severity-medium.html</guid>

					<description><![CDATA[Related content: PAN-SA-2026-0003 Chromium: Monthly Vulnerability Update (March 2026) (Severity: MEDIUM) PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM) PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH) CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW) CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature (Severity: MEDIUM)<br/><a href="https://security.paloaltonetworks.com/CVE-2026-0230" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0003" title="Permanent link to PAN-SA-2026-0003 Chromium: Monthly Vulnerability Update (March 2026) (Severity: MEDIUM)">PAN-SA-2026-0003 Chromium: Monthly Vulnerability Update (March 2026) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" title="Permanent link to PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)">PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0002" title="Permanent link to PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)">PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2026-0228" title="Permanent link to CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW)">CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2026-0229" title="Permanent link to CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature (Severity: MEDIUM)">CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PAN-SA-2026-0003 Chromium: Monthly Vulnerability Update (March 2026) (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/PAN-SA-2026-0003</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.debianadmin.com/pan-sa-2026-0003-chromium-monthly-vulnerability-update-march-2026-severity-medium.html</guid>

					<description><![CDATA[Related content: CVE-2026-0230 Cortex XDR Agent: Local Administrator can disable the agent on macOS (Severity: MEDIUM) PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM) PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH) CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW) CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature [&#8230;]<br/><a href="https://security.paloaltonetworks.com/PAN-SA-2026-0003" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2026-0230" title="Permanent link to CVE-2026-0230 Cortex XDR Agent: Local Administrator can disable the agent on macOS (Severity: MEDIUM)">CVE-2026-0230 Cortex XDR Agent: Local Administrator can disable the agent on macOS (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" title="Permanent link to PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)">PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0002" title="Permanent link to PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)">PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2026-0228" title="Permanent link to CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW)">CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2026-0229" title="Permanent link to CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature (Severity: MEDIUM)">CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/CVE-2026-0229</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 11 Feb 2026 17:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/cve-2026-0229-pan-os-denial-of-service-in-advanced-dns-security-feature-severity-medium.html</guid>

					<description><![CDATA[Related content: PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH) CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM) CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM) CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH) PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update [&#8230;]<br/><a href="https://security.paloaltonetworks.com/CVE-2026-0229" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0002" title="Permanent link to PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)">PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4235" title="Permanent link to CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)">CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-0140" title="Permanent link to CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)">CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2026-0227" title="Permanent link to CVE-2026-0227  PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)">CVE-2026-0227  PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0001" title="Permanent link to PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) (Severity: MEDIUM)">PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW)</title>
		<link>https://security.paloaltonetworks.com/CVE-2026-0228</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 11 Feb 2026 17:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/cve-2026-0228-pan-os-improper-validation-of-terminal-server-agent-certificate-severity-low.html</guid>

					<description><![CDATA[Related content: PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH) CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM) CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM) CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH) PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update [&#8230;]<br/><a href="https://security.paloaltonetworks.com/CVE-2026-0228" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0002" title="Permanent link to PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)">PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4235" title="Permanent link to CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)">CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-0140" title="Permanent link to CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)">CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2026-0227" title="Permanent link to CVE-2026-0227  PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)">CVE-2026-0227  PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0001" title="Permanent link to PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) (Severity: MEDIUM)">PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026) (Severity: HIGH)</title>
		<link>https://security.paloaltonetworks.com/PAN-SA-2026-0002</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 11 Feb 2026 17:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/pan-sa-2026-0002-chromium-monthly-vulnerability-update-february-2026-severity-high.html</guid>

					<description><![CDATA[Related content: CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW) CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM) CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM) CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH) PAN-SA-2026-0001 Chromium: Monthly [&#8230;]<br/><a href="https://security.paloaltonetworks.com/PAN-SA-2026-0002" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2026-0228" title="Permanent link to CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW)">CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4235" title="Permanent link to CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)">CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-0140" title="Permanent link to CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)">CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2026-0227" title="Permanent link to CVE-2026-0227  PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)">CVE-2026-0227  PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0001" title="Permanent link to PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) (Severity: MEDIUM)">PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/PAN-SA-2026-0001</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 14 Jan 2026 17:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/pan-sa-2026-0001-chromium-monthly-vulnerability-update-january-2026-severity-medium.html</guid>

					<description><![CDATA[Related content: CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH) CVE-2025-2182 PAN-OS: Firewall Clusters using the MACsec Protocol Expose the Connectivity Association Key (CAK) (Severity: LOW) CVE-2025-4227 GlobalProtect App: Interception in Endpoint Traffic Policy Enforcement (Severity: LOW) CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: [&#8230;]<br/><a href="https://security.paloaltonetworks.com/PAN-SA-2026-0001" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2026-0227" title="Permanent link to CVE-2026-0227  PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)">CVE-2026-0227  PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-2182" title="Permanent link to CVE-2025-2182 PAN-OS: Firewall Clusters using the MACsec Protocol Expose the Connectivity Association Key (CAK) (Severity: LOW)">CVE-2025-2182 PAN-OS: Firewall Clusters using the MACsec Protocol Expose the Connectivity Association Key (CAK) (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4227" title="Permanent link to CVE-2025-4227 GlobalProtect App: Interception in Endpoint Traffic Policy Enforcement  (Severity: LOW)">CVE-2025-4227 GlobalProtect App: Interception in Endpoint Traffic Policy Enforcement  (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4619" title="Permanent link to CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)">CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4615" title="Permanent link to CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: INFORMATIONAL)">CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: INFORMATIONAL)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2026-0227  PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)</title>
		<link>https://security.paloaltonetworks.com/CVE-2026-0227</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 14 Jan 2026 17:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/cve-2026-0227-pan-os-firewall-denial-of-service-dos-in-globalprotect-gateway-and-portal-severity-high.html</guid>

					<description><![CDATA[Related content: PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) (Severity: MEDIUM) CVE-2025-2182 PAN-OS: Firewall Clusters using the MACsec Protocol Expose the Connectivity Association Key (CAK) (Severity: LOW) CVE-2025-4227 GlobalProtect App: Interception in Endpoint Traffic Policy Enforcement (Severity: LOW) CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM) CVE-2025-4615 PAN-OS: Improper Neutralization [&#8230;]<br/><a href="https://security.paloaltonetworks.com/CVE-2026-0227" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/PAN-SA-2026-0001" title="Permanent link to PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) (Severity: MEDIUM)">PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-2182" title="Permanent link to CVE-2025-2182 PAN-OS: Firewall Clusters using the MACsec Protocol Expose the Connectivity Association Key (CAK) (Severity: LOW)">CVE-2025-2182 PAN-OS: Firewall Clusters using the MACsec Protocol Expose the Connectivity Association Key (CAK) (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4227" title="Permanent link to CVE-2025-4227 GlobalProtect App: Interception in Endpoint Traffic Policy Enforcement  (Severity: LOW)">CVE-2025-4227 GlobalProtect App: Interception in Endpoint Traffic Policy Enforcement  (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4619" title="Permanent link to CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)">CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4615" title="Permanent link to CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: INFORMATIONAL)">CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: INFORMATIONAL)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/CVE-2025-4619</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 12 Nov 2025 17:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/cve-2025-4619-pan-os-firewall-denial-of-service-dos-using-specially-crafted-packets-severity-medium.html</guid>

					<description><![CDATA[Related content: PAN-SA-2025-0018 Chromium and Prisma Browser: Monthly Vulnerability Update (November 2025) (Severity: MEDIUM) CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM) CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM) CVE-2024-9473 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: LOW) CVE-2025-2180 Checkov by Prisma Cloud: Unsafe [&#8230;]<br/><a href="https://security.paloaltonetworks.com/CVE-2025-4619" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0018" title="Permanent link to PAN-SA-2025-0018 Chromium and Prisma Browser: Monthly Vulnerability Update (November 2025) (Severity: MEDIUM)">PAN-SA-2025-0018 Chromium and Prisma Browser: Monthly Vulnerability Update (November 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4235" title="Permanent link to CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)">CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4615" title="Permanent link to CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)">CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2024-9473" title="Permanent link to CVE-2024-9473 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: LOW)">CVE-2024-9473 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-2180" title="Permanent link to CVE-2025-2180 Checkov by Prisma Cloud: Unsafe Deserialization of Terraform Files Allows Code Execution (Severity: LOW)">CVE-2025-2180 Checkov by Prisma Cloud: Unsafe Deserialization of Terraform Files Allows Code Execution (Severity: LOW)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PAN-SA-2025-0018 Chromium and Prisma Browser: Monthly Vulnerability Update (November 2025) (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/PAN-SA-2025-0018</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 12 Nov 2025 17:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/pan-sa-2025-0018-chromium-and-prisma-browser-monthly-vulnerability-update-november-2025-severity-medium.html</guid>

					<description><![CDATA[Related content: CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM) CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM) CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM) CVE-2024-9473 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: LOW) CVE-2025-2180 Checkov by Prisma Cloud: [&#8230;]<br/><a href="https://security.paloaltonetworks.com/PAN-SA-2025-0018" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2025-4619" title="Permanent link to CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)">CVE-2025-4619 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4235" title="Permanent link to CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)">CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4615" title="Permanent link to CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)">CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2024-9473" title="Permanent link to CVE-2024-9473 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: LOW)">CVE-2024-9473 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-2180" title="Permanent link to CVE-2025-2180 Checkov by Prisma Cloud: Unsafe Deserialization of Terraform Files Allows Code Execution (Severity: LOW)">CVE-2025-2180 Checkov by Prisma Cloud: Unsafe Deserialization of Terraform Files Allows Code Execution (Severity: LOW)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: INFORMATIONAL)</title>
		<link>https://security.paloaltonetworks.com/CVE-2025-4615</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Tue, 11 Nov 2025 19:15:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/cve-2025-4615-pan-os-improper-neutralization-of-input-in-the-management-web-interface-severity-informational.html</guid>

					<description><![CDATA[Related content: PAN-SA-2025-0017 Informational Bulletin: Impact of OSS CVEs in Prisma SD-WAN ION (Severity: INFORMATIONAL) PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM) PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM) CVE-2025-4614 PAN-OS: Session Token Disclosure Vulnerability (Severity: LOW) CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)<br/><a href="https://security.paloaltonetworks.com/CVE-2025-4615" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0017" title="Permanent link to PAN-SA-2025-0017 Informational Bulletin: Impact of OSS CVEs in Prisma SD-WAN ION (Severity: INFORMATIONAL)">PAN-SA-2025-0017 Informational Bulletin: Impact of OSS CVEs in Prisma SD-WAN ION (Severity: INFORMATIONAL)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0014" title="Permanent link to PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)">PAN-SA-2025-0014 Chromium: Monthly Vulnerability Update (August 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" title="Permanent link to PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)">PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4614" title="Permanent link to CVE-2025-4614 PAN-OS: Session Token Disclosure Vulnerability (Severity: LOW)">CVE-2025-4614 PAN-OS: Session Token Disclosure Vulnerability (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4235" title="Permanent link to CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)">CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PAN-SA-2025-0017 Informational Bulletin: Impact of OSS CVEs in Prisma SD-WAN ION (Severity: INFORMATIONAL)</title>
		<link>https://security.paloaltonetworks.com/PAN-SA-2025-0017</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Mon, 03 Nov 2025 17:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/pan-sa-2025-0017-informational-bulletin-impact-of-oss-cves-in-prisma-sd-wan-ion-severity-informational.html</guid>

					<description><![CDATA[Related content: CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM) PAN-SA-2025-0003 Informational: PAN-OS BIOS and Bootloader Security Bulletin (Severity: INFORMATIONAL) CVE-2023-48795 Impact of Terrapin SSH Attack (Severity: MEDIUM) CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM) PAN-SA-2025-0013 Chromium: Monthly Vulnerability Update (July 2025) (Severity: HIGH)<br/><a href="https://security.paloaltonetworks.com/PAN-SA-2025-0017" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2025-4615" title="Permanent link to CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)">CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0003" title="Permanent link to PAN-SA-2025-0003 Informational: PAN-OS BIOS and Bootloader Security Bulletin (Severity: INFORMATIONAL)">PAN-SA-2025-0003 Informational: PAN-OS BIOS and Bootloader Security Bulletin (Severity: INFORMATIONAL)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2023-48795" title="Permanent link to CVE-2023-48795 Impact of Terrapin SSH Attack (Severity: MEDIUM)">CVE-2023-48795 Impact of Terrapin SSH Attack (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4235" title="Permanent link to CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)">CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0013" title="Permanent link to PAN-SA-2025-0013 Chromium: Monthly Vulnerability Update (July 2025) (Severity: HIGH)">PAN-SA-2025-0013 Chromium: Monthly Vulnerability Update (July 2025) (Severity: HIGH)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2025-4614 PAN-OS: Session Token Disclosure Vulnerability (Severity: LOW)</title>
		<link>https://security.paloaltonetworks.com/CVE-2025-4614</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 08 Oct 2025 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/cve-2025-4614-pan-os-session-token-disclosure-vulnerability-severity-low.html</guid>

					<description><![CDATA[Related content: CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM) CVE-2025-2184 Cortex XDR Broker VM: Secrets Shared Across Multiple Broker VM Images (Severity: MEDIUM) CVE-2025-4234 Cortex XDR Microsoft 365 Defender Pack: Cleartext Exposure of Credentials (Severity: LOW) CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM) [&#8230;]<br/><a href="https://security.paloaltonetworks.com/CVE-2025-4614" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2025-4615" title="Permanent link to CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)">CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-2184" title="Permanent link to CVE-2025-2184 Cortex XDR Broker VM: Secrets Shared Across Multiple Broker VM Images (Severity: MEDIUM)">CVE-2025-2184 Cortex XDR Broker VM: Secrets Shared Across Multiple Broker VM Images (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4234" title="Permanent link to CVE-2025-4234 Cortex XDR Microsoft 365 Defender Pack: Cleartext Exposure of Credentials (Severity: LOW)">CVE-2025-4234 Cortex XDR Microsoft 365 Defender Pack: Cleartext Exposure of Credentials (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-0140" title="Permanent link to CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)">CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4232" title="Permanent link to CVE-2025-4232 GlobalProtect: Authenticated Code Injection Through Wildcard on macOS (Severity: MEDIUM)">CVE-2025-4232 GlobalProtect: Authenticated Code Injection Through Wildcard on macOS (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PAN-SA-2025-0016 Chromium: Monthly Vulnerability Update (October 2025) (Severity: MEDIUM)</title>
		<link>https://security.paloaltonetworks.com/PAN-SA-2025-0016</link>
		
		<dc:creator><![CDATA[debianfix]]></dc:creator>
		<pubDate>Wed, 08 Oct 2025 16:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.debianadmin.com/pan-sa-2025-0016-chromium-monthly-vulnerability-update-october-2025-severity-medium.html</guid>

					<description><![CDATA[Related content: CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM) CVE-2025-2184 Cortex XDR Broker VM: Secrets Shared Across Multiple Broker VM Images (Severity: MEDIUM) CVE-2025-4234 Cortex XDR Microsoft 365 Defender Pack: Cleartext Exposure of Credentials (Severity: LOW) CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM) [&#8230;]<br/><a href="https://security.paloaltonetworks.com/PAN-SA-2025-0016" class="more-link" >Continue reading...</a>]]></description>
										<content:encoded><![CDATA[<div class="betterrelated"><p><strong>Related content:</strong></p>
<ol><li> <a href="https://security.paloaltonetworks.com/CVE-2025-4615" title="Permanent link to CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)">CVE-2025-4615 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-2184" title="Permanent link to CVE-2025-2184 Cortex XDR Broker VM: Secrets Shared Across Multiple Broker VM Images (Severity: MEDIUM)">CVE-2025-2184 Cortex XDR Broker VM: Secrets Shared Across Multiple Broker VM Images (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4234" title="Permanent link to CVE-2025-4234 Cortex XDR Microsoft 365 Defender Pack: Cleartext Exposure of Credentials (Severity: LOW)">CVE-2025-4234 Cortex XDR Microsoft 365 Defender Pack: Cleartext Exposure of Credentials (Severity: LOW)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-0140" title="Permanent link to CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)">CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)</a>  </li>
<li> <a href="https://security.paloaltonetworks.com/CVE-2025-4232" title="Permanent link to CVE-2025-4232 GlobalProtect: Authenticated Code Injection Through Wildcard on macOS (Severity: MEDIUM)">CVE-2025-4232 GlobalProtect: Authenticated Code Injection Through Wildcard on macOS (Severity: MEDIUM)</a>  </li>
</ol></div>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
