24h | 7d | 30d

Overview

  • Cisco
  • Cisco Secure Firewall Management Center (FMC)

04 Mar 2026
Published
20 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
5.60%

Description

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced.

Statistics

  • 6 Posts
  • 10 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

"CISA orders feds to patch max-severity Cisco flaw by Sunday"

"[...] The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a maximum-severity vulnerability, CVE-2026-20131, in Cisco Secure Firewall Management Center (FMC) by Sunday, March 22."

bleepingcomputer.com/news/secu

  • 1
  • 1
  • 0
  • 4h ago

Bluesky

Profile picture fallback
The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a maximum-severity vulnerability, CVE-2026-20131, in Cisco Secure Firewall Management Center (FMC) by Sunday, March 22.
  • 2
  • 4
  • 0
  • 7h ago
Profile picture fallback
CISA mandates federal agencies patch critical Cisco Secure Firewall flaw CVE-2026-20131 by March 22. Exploited by Interlock ransomware via insecure Java deserialization, allowing root remote code execution. #CVE202620131 #Interlock #USA
  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback
Cisco FMC flaw was exploited by Interlock weeks before patch (CVE-2026-20131) 📖 Read more: www.helpnetsecurity.com/2026/03/20/c... #cybersecurity #cybersecuritynews #0day #firewall #ransomware @cisco.com
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
Active exploits target Microsoft SharePoint RCE (CVE-2026-20963) and Cisco Secure FMC zero-day (CVE-2026-20131) used by Interlock ransomware. CISA urges patches for Zimbra XSS and UniFi flaws amid Marquis and Aura breaches. #SharePointFlaw #CiscoFMC
  • 0
  • 1
  • 0
  • 14h ago

Overview

  • Microsoft
  • Microsoft SharePoint Enterprise Server 2016

13 Jan 2026
Published
19 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
5.21%

Description

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Statistics

  • 7 Posts
  • 21 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

CVE-2026-20963 Sharepoint Insecure Deserialization 8.8/10

Weekend soon. Where @watchTowr blog? Need lolz. I can has?

  • 6
  • 6
  • 0
  • 8h ago
Profile picture fallback

Geopolitical tensions surged as Iran targeted Gulf energy after Israeli strikes, spiking oil prices to $118/barrel (March 18-19). In cybersecurity, CISA warned of actively exploited SharePoint flaws (CVE-2026-20963), critical Ubiquiti UniFi (CVE-2026-22557), and Telnetd root-access vulnerabilities (CVE-2026-32746). NVIDIA forecasts $1T AI demand by 2027.
#AnonNews_irc #Cybersecurity #News

  • 0
  • 1
  • 0
  • 22h ago

Bluesky

Profile picture fallback
We added Microsoft SharePoint CVE-2026-20963 (post-auth deserialization RCE) to our scanning & daily feeds. 1109 IPs found running vulnerable instances worldwide (close to 1900 FQDNs) on 2026-03-19, with 510 IPs in the US. Dashboard World Map: dashboard.shadowserver.org/statistics/c...
  • 2
  • 5
  • 0
  • 9h ago
Profile picture fallback
CVE-2026-20963 Dashboard Tracker: dashboard.shadowserver.org/statistics/c... Dashboard Tree Map view: dashboard.shadowserver.org/statistics/c... #CyberCivilDefense
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Vulnerable IPs (tagged 'cve-2026-20963') shared daily in our Vulnerable HTTP reporting: www.shadowserver.org/what-we-do/n... CVE-2026-20963 is known exploited in the wild and on CISA KEV: www.cisa.gov/known-exploi... Check for compromise. Microsoft Advisory: msrc.microsoft.com/update-guide...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
CISA warns of an active exploit targeting a vulnerability in Microsoft SharePoint (CVE-2026-20963) affecting SharePoint Server Subscription Edition, Server 2019, and Enterprise Server 2016.
  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback
Active exploits target Microsoft SharePoint RCE (CVE-2026-20963) and Cisco Secure FMC zero-day (CVE-2026-20131) used by Interlock ransomware. CISA urges patches for Zimbra XSS and UniFi flaws amid Marquis and Aura breaches. #SharePointFlaw #CiscoFMC
  • 0
  • 1
  • 0
  • 14h ago

Overview

  • GNU
  • inetutils

13 Mar 2026
Published
19 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.05%

KEV

Description

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

Statistics

  • 5 Posts
  • 16 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Fun #HaikuOS fact of the day: for the first time (as far as I know), we are listed in the affected systems for a CVE. Upon closer inspection, it turns out the affected code (a bug in telnetd dating back to 1994) is behindea compiler guard and not actually enabled in our version. So, Haiku is actually safe from this CVE for which there is no actual exploit also on other systems.

discuss.haiku-os.org/t/cve-202

  • 14
  • 0
  • 0
  • 8h ago
Profile picture fallback

Geopolitical tensions surged as Iran targeted Gulf energy after Israeli strikes, spiking oil prices to $118/barrel (March 18-19). In cybersecurity, CISA warned of actively exploited SharePoint flaws (CVE-2026-20963), critical Ubiquiti UniFi (CVE-2026-22557), and Telnetd root-access vulnerabilities (CVE-2026-32746). NVIDIA forecasts $1T AI demand by 2027.
#AnonNews_irc #Cybersecurity #News

  • 0
  • 1
  • 0
  • 22h ago

Bluesky

Profile picture fallback
📢 CVE-2026-32746 : débordement de tampon pré-auth dans GNU InetUtils telnetd (PoC disponible) 📝 Source: pwn.guide — Publication technique pré… https://cyberveille.ch/posts/2026-03-19-cve-2026-32746-debordement-de-tampon-pre-auth-dans-gnu-inetutils-telnetd-poc-disponible/ #CVE_2026_32746 #Cyberveille
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746)" and "Emerging Threat: Microsoft SQL Server Elevation of Privilege Vulnerability (CVE-2026-21262)". #cybersecurity #AttackSurfaceManagement https://opsmtrs.com/44Srq0X
  • 0
  • 1
  • 0
  • 20h ago
Profile picture fallback
省流:不开 Telnet 服务无任何影响。去检查下吧 最近几日,群晖的 DSM 系统接连更新,修复了 CVE-2026-24061 / CVE-2026-32746 两个涉及 Telnetd 的高危漏洞。 在 CVE-2026-24061 刚刚爆出之后,群晖就修复了这个错误(7.3.2-86009 Update
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Oracle Corporation
  • Oracle Identity Manager

20 Mar 2026
Published
20 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.04%

KEV

Description

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Identity Manager and Oracle Web Services Manager. Successful attacks of this vulnerability can result in takeover of Oracle Identity Manager and Oracle Web Services Manager. Note: Oracle Web Services Manager is installed with an Oracle Fusion Middleware Infrastructure. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Statistics

  • 3 Posts
  • 10 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Oracle issues an out-of-band security update for a pre-auth RCE in Oracle Identity Manager

oracle.com/security-alerts/ale

  • 5
  • 2
  • 0
  • 6h ago

Bluesky

Profile picture fallback
Oracle has released an out-of-band security update to fix a critical unauthenticated remote code execution vulnerability in Identity Manager and Web Services Manager tracked as CVE-2026-21992.
  • 0
  • 3
  • 0
  • 3h ago
Profile picture fallback
~Cybergcca~ Oracle patched a critical flaw in Identity Manager and Web Services Manager. - IOCs: CVE-2026-21992 - #CVE2026_21992 #Oracle #threatintel
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Ubiquiti Inc
  • UniFi Network Application

19 Mar 2026
Published
19 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.05%

KEV

Description

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 5 hours ago

Fediverse

Profile picture fallback

Geopolitical tensions surged as Iran targeted Gulf energy after Israeli strikes, spiking oil prices to $118/barrel (March 18-19). In cybersecurity, CISA warned of actively exploited SharePoint flaws (CVE-2026-20963), critical Ubiquiti UniFi (CVE-2026-22557), and Telnetd root-access vulnerabilities (CVE-2026-32746). NVIDIA forecasts $1T AI demand by 2027.
#AnonNews_irc #Cybersecurity #News

  • 0
  • 1
  • 0
  • 22h ago

Bluesky

Profile picture fallback
CVE-2026-22557 はCVSSv3.1で10.0です。外部アクセス可な環境は即時対応を:Critical Ubiquiti UniFi Vulnerabilities Allow Attackers to Seize Full Control of Underlying Systems https://cybersecuritynews.com/ubiquiti-unifi-vulnerabilities/
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
🛑 Ubiquiti – CVE-2026-22557 : cette faille critique menace votre réseau UniFi Ma publication à ce sujet 👇 - www.it-connect.fr/ubiquiti-cve... #ubiquiti #infosec #cybersecurite #reseau
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • snapd

17 Mar 2026
Published
18 Mar 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.01%

KEV

Description

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 8 hours ago

Fediverse

Profile picture fallback

Ubuntu har rettet en bug i Snap-pakke-installations-programmet, som kunne have været udnyttet til root-angreb med privilege root attacks
blog.qualys.com/vulnerabilitie

  • 0
  • 1
  • 0
  • 14h ago
Profile picture fallback

This Week in Security: Linux Flaws, Python Ownage, and a Botnet Shutdown

The ides of security March are upon us — Qualys reports the discovery by their threat research unit of vulnerabilities in the Linux AppArmor system used by SUSE, Debian, Ubuntu, and Kubernetes as an additional security mechanism and application firewall.

AppArmor was added to Linux in 2010, and the vulnerabilities Qualys discovered have been present since 2017, and allow unprivileged (non-root) local users to elevate privileges by executing arbitrary code in the kernel, gaining root access, or perform a denial-of-service attack across the entire system by replacing all AppArmor behavior with “deny all” rules.

All Linux kernels since Linux 4.11 are vulnerable. If your Linux distribution enables AppArmor, and quite a few do, you’ll want to be updating as soon as fixes are available from your distribution maintainers. On systems with untrusted users, such as shared environments, VPS server environments, and the like, this is even more critical and urgent. Even on single-user systems, vulnerabilities like these allow other exploits, like the Python attack below, mechanisms to elevate their access and persistence.

At the time of writing, the full details of the AppArmor vulnerability are limited until the Linux Kernel team releases a stable version with the fixes for distribution maintainers. Qualys has published the technical write-up with the currently public information.

Python Projects Compromised


StepSecurity reports on a new campaign to infect Python projects on GitHub with a complex malware that, once deployed, appears to be yet another crypto and login stealer.

The attacker first gains access to the GitHub credentials via another info stealing worm – the Glassworm stealer infects VSCode extensions with over 35,000 downloads of infected extensions in October of 2025. Glassworm harvests NPM, GitHub, and OpenVSX credentials and sends them to a remote command and control (C2) server. It also harvests a wide range of crypto currency wallet extensions to steal crypto directly.

Once it’s harvested all the credentials it can find, Glassworm then installs a SOCKS proxy, a standard connection proxy protocol used to re-route connections, multiple remote desktop control tools, and redundant control networks. The “ForceMemo” worm (as StepSecurity dubs it) then targets Python repositories, infecting every repository the credentials have access to, using credentials from VS Code, git credential storage, GITHUB_TOKEN, and any other discovered credentials.

The actual mechanism of compromise is the most interesting aspect of what is otherwise an aggressive malware, but in many ways, just another crypto stealer. ForceMemo gains its name by using a series of Git tricks to attempt to hide its activity: instead of simply generating a git push or GitHub pull request, the malware rebases the last commit in the repository, injects the malware into the Python scripts, and performs a force push to silently replace the last commit record.

Once infected, a Python project runs the payload as soon as a consumer runs the setup.py command to build and install the package. The payloads are heavily obfuscated and encrypted, but StepSecurity believes once triggered, ForceMemo harvests SSH keys, GitHub tokens, and crypto wallet tokens, as well as connecting to multiple C2 servers and installing remote access and proxy tools for future activity.

With the malware infecting Python projects indiscriminately, this exposes developer workstations with internal credentials and CI/CD environments with production credentials equally.

Ubuntu Snapd flaws


Apparently on a roll, Qualys also discovered that the Ubuntu Snapd system — the service responsible for managing packages and services in the Snap format — allows for privilege escalation. The Ubuntu report is low on details, stating only that improper handling of “certain operations” in a snap package tmp directory could cause systemd-tmpfiles to recreate the files, allowing replaying commands and gaining “escalated privileges”.

Fixes are available for all recent Ubuntu releases, however Ubuntu 20.04 and older require the paid “Ubuntu Pro” subscription to get them. As always, the advice is to patch as soon as possible – once a vulnerability is known it becomes a vector for malware and other attacks, such as a credential stealer gaining root access to reinstall itself.

UniFi Network Application


UniFi is often a popular networking choice for home lab and networking geeks, and probably has a higher-than-average usage rate among readers here. The company reports a high-risk vulnerability in the UniFi Network Application component of the management service and a second high risk vulnerability in the NoSQL implementation.

UniFi lists the vulnerability as a path traversal bug allowing access to files on the server. Path traversal bugs are validation bugs involve forming URLs which reference files outside of directories the web server would normally be allowed to serve files from. In a properly paranoid server, paths are resolved to the final file, then checked to make sure that serving that file is allowed, but in a naive implementation the paths are simply concatenated, allowing a requested file path – for instance “../../../../../../../../../etc/passwd” – to escape the web server directory and serve a file directly from the filesystem. Because it’s always possible to go back a directory, even from the base of the filesystem, so often an attacker will simply add a dozen, or more, “../” references to brute force assume that it will find the root of the system eventually.

On the NoSQL side, there are even fewer details, but UniFi lists it as a SQL injection vulnerability which can lead to elevated privileges. Fortunately, the vulnerability seems to require access to a network which can reach the UniFi controller – this won’t open every install to a drive-by attack from the parking lot or the Internet at large.

If you run a UniFi system, still be sure to get the latest updates – it’s never a good idea to leave vulnerabilities in place, even on an internal network. Increasingly, complex attacks are taking advantage of multiple vulnerabilities to access internal services once a single external vulnerability is found, and this is taking place on home networks as well as corporate!

Gov Collab Shuts Down Botnets


Finally, Brian Krebs reports on a multi-national effort by Germany, Canada, and the United States to shut down the Kimwolf, Aisuru, Jackskid, and Mossad botnets, credited with being the source of world-record-breaking denial of service attacks.

The majority of devices forming the Kimwolf botnet appear to be Android TV devices with poor security, sold by major US retailers. Residential proxy networks, malware disguised as cheap or free VPNs, or other malware infections installing proxy servers, allowed attackers access to the internal home networks of infected users, exposing the vulnerable set-top boxes.

The shutdown of the botnets appear to be coordinated with the arrests of operators of the botnet services in multiple countries and seizure or shutdown of the C2 servers operating the network. When patching hundreds of thousands of infected devices is impractical, taking control of the infrastructure to prevent further abuse is usually the next best step.

hackaday.com/2026/03/20/this-w…

  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Microsoft
  • ASP.NET Core 10.0

10 Mar 2026
Published
20 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
1.59%

KEV

Description

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

Statistics

  • 2 Posts

Last activity: 5 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2026-26130 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/448 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
🔐 Critical .NET 10.0 Security Update for Fedora 43: CVE-2026-26130 (ASP.NET Core DoS) If you're running .NET applications on |#Fedora 43, apply this patch now to prevent a Denial of Service attack that can crash your services. Read more: 👉 tinyurl.com/37p329k3 #Security
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • anthropics
  • claude-code

20 Mar 2026
Published
20 Mar 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
0.14%

KEV

Description

Claude Code is an agentic coding tool. Versions prior to 2.1.53 resolved the permission mode from settings files, including the repo-controlled .claude/settings.json, before determining whether to display the workspace trust confirmation dialog. A malicious repository could set permissions.defaultMode to bypassPermissions in its committed .claude/settings.json, causing the trust dialog to be silently skipped on first open. This allowed a user to be placed into a permissive mode without seeing the trust confirmation prompt, making it easier for an attacker-controlled repository to gain tool execution without explicit user consent. This issue has been patched in version 2.1.53.

Statistics

  • 3 Posts

Last activity: 1 hour ago

Bluesky

Profile picture fallback
Claude Code workspace trust dialog bypass via repository settings loading order [CVE-2026-33068, CVSS 7.7]. Settings resolved before trust dialog shown.
  • 0
  • 0
  • 1
  • 4h ago

Overview

  • astroidframe.work
  • Astroid Template Framework

05 Mar 2026
Published
05 Mar 2026
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
0.23%

KEV

Description

A improperly secured file management feature allows uploads of dangerous data types for unauthenticated users, leading to remote code execution.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture fallback

Jemand mit #Joomla im Web unterwegs? Im #Astroid Framework gibt es eine kritische Sicherheitslücke, die gerade aktiv für Angriffe genutzt wird.

borncity.com/blog/2026/03/20/j

  • 2
  • 1
  • 0
  • 11h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 22 hours ago

Fediverse

Profile picture fallback

ZAST engine has identified and verified CVE-2026-1829 in Content Visibility for Divi Builder 4.01, along with one additional verified vulnerability in the same plugin.

Project page: wordpress.org/plugins/content- Project footprint: 2,000+ active installations on WordPress.org.

The critical issue is a code-execution path where user-controlled visibility expressions reach eval() through multiple application features. This is a representative example of why security teams need autonomous verification: dangerous APIs alone do not define risk. Reachability, privilege boundaries, and runtime behavior do.

ZAST.AI promotes findings into reports only after successful PoC validation, which supports a zero-false-positive operating model and helps enterprise teams prioritize remediation on verified issues.

Full report: blog.zast.ai/vulnerability%20r

@wordfence @WordPress@mastodon.world @wordpress@lemmy.world

  • 1
  • 1
  • 0
  • 22h ago
Showing 1 to 10 of 49 CVEs