Overview
- pac4j
- pac4j-jwt
Description
Statistics
- 5 Posts
- 8 Interactions
Fediverse
🚨 CRITICAL: pac4j-jwt (pre-4.5.9/5.7.9/6.3.3) vulnerable to auth bypass (CVE-2026-29000). Attackers w/ RSA public key can forge JWTs, impersonate any user. Patch now & audit JWT usage! https://radar.offseq.com/threat/cve-2026-29000-cwe-347-improper-verification-of-cr-c33a53b1 #OffSeq #CVE202629000 #JWT #Security
A critical authentication bypass vulnerability (CVE-2026-29000) in the pac4j-jwt Java library allows attackers to impersonate any user by forging unsigned JSON Web Tokens (JWTs) using only the server's public RSA key. This flaw bypasses signature verification, and patches are available for versions 4.x, 5.x, and 6.x.
https://gbhackers.com/critical-pac4j-jwt-authentication-bypass-vulnerability-allows-attackers-to-impersonate-any-user/
Bluesky
Overview
- Cisco
- Cisco Secure Firewall Management Center (FMC)
Description
Statistics
- 7 Posts
- 4 Interactions
Fediverse
A critical Cisco Secure Firewall Management Vulnerability (CVE-2026-20079) allows unauthenticated attackers to bypass authentication and gain root access by sending crafted HTTP requests. Immediate upgrades to fixed software versions are recommended as no workarounds are available.
https://cybersecuritynews.com/cisco-secure-firewall-management-vulnerability-allow-attackers-to-bypass-authentication/
💥 Cisco warns of max severity Secure FMC flaws giving root access
「 Both vulnerabilities can be exploited remotely by unauthenticated attackers: the authentication bypass flaw (CVE-2026-20079) allows attackers to gain root access to the underlying operating system, while the remote code execution (RCE) vulnerability (CVE-2026-20131) lets them execute arbitrary Java code as root on unpatched devices 」
#cisco #rce #cybersecurity
https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-secure-fmc-flaws-giving-root-access/
yikes.. 50 CVEs for Cisco today incl. two max severity CVE-2026-20131 & CVE-2026-20079 with auth bypass 🫡
🚬
Bluesky
Overview
Description
Statistics
- 3 Posts
- 5 Interactions
Fediverse
Bluesky
Overview
- Cisco
- Cisco Secure Firewall Management Center (FMC)
Description
Statistics
- 5 Posts
- 4 Interactions
Fediverse
💥 Cisco warns of max severity Secure FMC flaws giving root access
「 Both vulnerabilities can be exploited remotely by unauthenticated attackers: the authentication bypass flaw (CVE-2026-20079) allows attackers to gain root access to the underlying operating system, while the remote code execution (RCE) vulnerability (CVE-2026-20131) lets them execute arbitrary Java code as root on unpatched devices 」
#cisco #rce #cybersecurity
https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-secure-fmc-flaws-giving-root-access/
yikes.. 50 CVEs for Cisco today incl. two max severity CVE-2026-20131 & CVE-2026-20079 with auth bypass 🫡
🚬
Bluesky
Overview
- freescout-help-desk
- freescout
Description
Statistics
- 3 Posts
- 2 Interactions
Fediverse
A critical vulnerability (CVE-2026-28289) in the open-source help desk platform FreeScout allows unauthenticated, zero-click Remote Code Execution (RCE) via a specially crafted email. This vulnerability bypasses previous security patches by exploiting a Zero-Width Space character to upload malicious .htaccess files, potentially leading to system takeover and data exfiltration.
https://www.helpnetsecurity.com/2026/03/05/freescout-vulnerability-cve-2026-28289/
Bluesky
Overview
- Huawei
- HarmonyOS
Description
Statistics
- 2 Posts
Fediverse
🚨 CRITICAL auth bypass (CVE-2026-28536) impacts Huawei HarmonyOS 6.0.0 & 5.1.0. Exploitation risks device integrity & confidentiality. No mitigation yet — monitor for updates! https://radar.offseq.com/threat/cve-2026-28536-cwe-305-authentication-bypass-by-pr-3e5ae728 #OffSeq #Huawei #Vuln #InfoSec
Overview
Description
Statistics
- 2 Posts
Bluesky
Overview
Description
Statistics
- 2 Posts
Fediverse
A critical vulnerability, CVE-2026-24061, in GNU InetUtils telnetd allows remote attackers to gain root access by exploiting an argument injection flaw where the USER environment variable is passed unsanitized to the login program. This decade-old flaw was accidentally introduced in a 2015 patch and can be exploited by crafting a malicious payload like '-f root' to bypass authentication.
https://www.picussecurity.com/resource/blog/cve-2026-24061-critical-telnetd-flaw-grants-root-access
Overview
- Cisco
- Cisco Catalyst SD-WAN Manager
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
Cisco has identified two additional Catalyst SD-WAN Manager security flaws (CVE-2026-20128 and CVE-2026-20122) that are being actively exploited in the wild, urging administrators to upgrade vulnerable devices. These vulnerabilities affect the network management software regardless of device configuration, with one allowing arbitrary file overwrite and the other disclosing information.
https://www.bleepingcomputer.com/news/security/cisco-flags-more-sd-wan-flaws-as-actively-exploited-in-attacks/
Overview
Description
Statistics
- 1 Post
- 4 Interactions
Fediverse
Photographers, news orgs, researchers: If you’re using ExifTool on Macintosh update it to version 13.52 (current at this writing). A critical vulnerability in ExifTool is fixed. Maliciously crafted metadata embedded in an image file can run commands on the system. https://www.kaspersky.co.uk/blog/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102/30115/