Overview
- NetScaler
- ADC
Description
Statistics
- 20 Posts
- 11 Interactions
Fediverse
It just never stops those Citrix vulnerabilities...
https://thecyberexpress.com/cve-2026-3055-citrix-netscaler-saml-idp/
#citrix #cybersecurity #cve
Urgent Alert: NetScaler bug CVE-2026-3055 probed by attackers could leak sensitive data https://securityaffairs.com/190131/hacking/urgent-alert-netscaler-bug-cve-2026-3055-probed-by-attackers-could-leak-sensitive-data.html
⚠️ CVE-2026-3055 / Citrix NetScaler : la reconnaissance est en cours.
Des activités de reconnaissance ciblent déjà les appliances exposées, avec notamment des requêtes vers /cgi/GetAuthMethods pour identifier les configs exploitables, en particulier les environnements SAML IdP.
GBHackers relaie ces observations
👇
https://gbhackers.com/hackers-probe-citrix-netscaler-systems-cve-2026-3055-exploitation/
Côté exposition, ONYPHE recense plus de 18000 IP uniques sur une version vulnérable, (dont environ +800 en Suisse).
👇
https://www.linkedin.com/posts/onyphe_vulnerability-asm-attacksurfacemanagement-activity-7442250727046987776-ofYV
Le pattern rappelle clairement les précédents CitrixBleed : si du NetScaler est encore exposé, la fenêtre avant exploitation de masse pourrait être très courte.
la vulnérabilité est à considérer comme activement exploitée selon watchTowr.
ils ont publié une analyse technique détaillée de la faille, utile pour mieux comprendre le mécanisme d’exploitation
👇
https://labs.watchtowr.com/please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2/
Pour les équipes concernées, on n’est plus dans l’anticipation mais dans la réaction rapide.
Bluesky
Overview
Description
Statistics
- 10 Posts
Fediverse
Critical alert: Attackers are actively exploiting a remote code execution vulnerability in BIG-IP APM systems (CVE-2025-53521). Financial services, government, and public sector organizations are targeted. Understand the threat landscape and essential defensive measures.
@offseq There has literally been a CVE and patch for this since October - https://www.runzero.com/blog/f5-bigip-instances/#latest-f5-big-ip-vulnerability-cve-2025-53521
Bluesky
Overview
- Fortinet
- FortiClientEMS
Description
Statistics
- 5 Posts
- 1 Interaction
Bluesky
Overview
- WAGO
- Lean Managed Switch 852-1812
Description
Statistics
- 1 Post
- 21 Interactions
Overview
Description
Statistics
- 1 Post
- 5 Interactions
Fediverse
Anyone knows anything more about this #Tunnelblick #vulnerability?
"CVE-2026-31893 describes a serious Tunnelblick vulnerability.
This vulnerability is present in all versions of all Tunnelblick versions 3.3beta26 through 9.0beta01.
Tunnelblick 8.0.1 and 9.0beta02 contain fixes for the vulnerability.
The CVE is expected to be published and this page updated on or before 2026-03-27."
Overview
- mlflow
- mlflow/mlflow
Description
Statistics
- 1 Post
- 3 Interactions
Bluesky
Overview
- End-of-Train and Head-of-Train remote linking protocol
- End-of-Train and Head-of-Train remote linking protocol
Description
Statistics
- 1 Post
- 3 Interactions
Overview
- nltk
- nltk/nltk
Description
Statistics
- 1 Post
- 1 Interaction
Overview
Description
Statistics
- 1 Post
- 5 Interactions
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
⚠️ CVE-2026-4176 (HIGH): Perl Compress::Raw::Zlib uses a vulnerable zlib, risking memory corruption or code execution. Affects 5.9.4 – 5.43.0. Update to Compress::Raw::Zlib 2.221+ ASAP! https://radar.offseq.com/threat/cve-2026-4176-cwe-1395-dependency-on-vulnerable-th-556b643e #OffSeq #Perl #Vuln #SysAdmin