Overview
Description
Statistics
- 16 Posts
- 16 Interactions
Fediverse
https://www.openwall.com/lists/oss-security/2026/03/17/8
Qualys just can't stop!
Critical Ubuntu flaw (CVE-2026-3888) enables local root escalation via Snap.
Delayed exploit (10–30 days) makes detection harder.
Patch snapd immediately.
https://www.technadu.com/critical-cve-2026-3888-vulnerability-exposes-ubuntu-to-root-escalation/623670/
Looks like removing files from /tmp on a running system is racy and risky:
https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root
Someone on oss-sec shared a very similar issue from 2002 (‘tmpwatch’ instead of ‘systemd-tmpfiles’):
https://lcamtuf.coredump.cx/tmp_paper.txt
🛑 ALERT - A new flaw in #Ubuntu 24.04+ lets attackers gain full root access from low privileges.
By timing system cleanup, they replace a snap directory and execute code as root—no user action required.
🔗 Exploit steps and patched versions → https://thehackernews.com/2026/03/ubuntu-cve-2026-3888-bug-lets-attackers.html
Global tensions heighten as the US-Iran conflict escalates, impacting oil markets via the Strait of Hormuz (March 18). Technology sees continued rapid AI advancement, with OpenAI's GPT-5.4 and Anthropic's Claude Sonnet 4.6 released (March 17). In cybersecurity, the EU sanctioned private cyber offensive groups (March 17), and a critical Ubuntu privilege escalation flaw (CVE-2026-3888) was discovered (March 18). AI-driven threats also increasingly impact M&A security.
Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit
https://thehackernews.com/2026/03/ubuntu-cve-2026-3888-bug-lets-attackers.html
CVE-2026-3888 : quand le nettoyage système d’Ubuntu offre un accès root https://www.it-connect.fr/cve-2026-3888-quand-le-nettoyage-systeme-dubuntu-offre-un-acces-root/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Linux
Bluesky
Overview
Description
Statistics
- 9 Posts
- 13 Interactions
Fediverse
The vulnerability, tracked as CVE-2026-20643 (CVSS score: N/A), has been described as a cross-origin issue in WebKit's Navigation API that could be exploited to bypass the same-origin policy when processing maliciously crafted web content. https://thehackernews.com/2026/03/apple-fixes-webkit-vulnerability.html
Apple has introduced a new update system called Background Security Improvements for delivering faster, lightweight security patches across its platforms.
The first update using this mechanism addressed CVE-2026-20643, a WebKit cross-origin vulnerability that could be exploited through malicious web content.
Bluesky
Overview
- GNU
- inetutils
Description
Statistics
- 11 Posts
Fediverse
#telnet: Yet Another Critical Unauthenticated Root RCE #vulnerability CVE-2026-32746 discovered in legacy inetUtils Telnet - no user interaction and no special network position required.
Telnet is still in use in old switches, routers, ICS/IoT, cameras:
👇
https://thehackernews.com/2026/03/critical-telnetd-flaw-cve-2026-32746.html
CVE-2026-32746 : les serveurs Linux menacés par une nouvelle faille Telnet https://www.it-connect.fr/cve-2026-32746-les-serveurs-linux-menaces-par-une-nouvelle-faille-telnet/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Linux
Bluesky
Overview
- Cisco
- Cisco Secure Firewall Management Center (FMC)
Description
Statistics
- 4 Posts
- 5 Interactions
Bluesky
Overview
Description
Statistics
- 1 Post
- 14 Interactions
Fediverse
Jail chroot escape via fd exchange with a different jail
CVE-2025-15576
"Note that in order to exploit this problem, an attacker requires control over processes in two jails which share a nullfs mount in which a unix socket can be installed."
https://www.freebsd.org/security/advisories/FreeBSD-SA-26:04.jail.asc
Overview
- AdguardTeam
- AdGuardHome
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
Votre AdGuard Home est vulnérable à une compromission totale : CVE-2026-32136 https://www.it-connect.fr/votre-adguard-home-est-vulnerable-a-une-compromission-totale-cve-2026-32136/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
Overview
Description
Statistics
- 2 Posts
- 3 Interactions
Fediverse
@agreenberg more in depth analysis from Google.
It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).
As usual, Wired is… not great 🙄
Regarding DarkSword, the latest objectively bad exploit affecting iOS and Safari, Google has a more in depth analysis, with a lot more informations on the specific versions of iOS that are affected.
TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).
Overview
- parallax
- jsPDF
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
⚠️ CRITICAL XSS (CVE-2026-31938) in parallax jsPDF <4.2.1 allows attackers to inject scripts via PDF options — exploited when victims open crafted PDFs. Upgrade to 4.2.1+ ASAP! https://radar.offseq.com/threat/cve-2026-31938-cwe-79-improper-neutralization-of-i-32085433 #OffSeq #XSS #jsPDF #Infosec
Overview
- langchain-ai
- helm
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
"Hack the #AI Brain: Uncovering an Account Takeover Vulnerability in LangSmith" Miggo Security discovered a critical account takeover vulnerability (CVE-2026-25750) in LangSmith. Learn how this flaw exposed proprietary AI data. https://api.cyfluencer.com/s/hack-the-ai-brain-uncovering-an-account-takeover-vulnerability-in-langsmith-25858
Overview
Description
Statistics
- 1 Post
- 3 Interactions
Fediverse
Oh no/lmao
I've just seen the GitLab's CVE-2026-0723 - January vuln with 2FA bypass involving FIDO2. So that applies to passkey login and 2FA with a security key. Given it's open source I've checked for the commit and uh. They ran the check for "hey is passkey response valid" and then just ignored the result
The fix changes it to check the return and throw. Wonder if someone thought the function would throw inside of it or something? Hmmmm
Really just doing everything right except for the last little bit x3