24h | 7d | 30d

Overview

  • GNU
  • inetutils

13 Mar 2026
Published
23 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.03%

KEV

Description

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

Statistics

  • 3 Posts
  • 136 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

enjoyed this telnetd analysis. (if you can’t believe anyone has a legitimate operational reason to run telnet, you live in a cozy world indeed) labs.watchtowr.com/a-32-year-o

  • 46
  • 65
  • 0
  • 4h ago
Profile picture fallback

Yes, the vulnerability is so old, it dates from a time when networks charged on a ‘per-packet basis’.

labs.watchtowr.com/a-32-year-o

  • 7
  • 18
  • 0
  • 4h ago

Bluesky

Profile picture fallback
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils CVE-2026-32746) https://lobste.rs/s/udbivp #security #c
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • NetScaler
  • ADC

23 Mar 2026
Published
24 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.02%

KEV

Description

Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread

Statistics

  • 8 Posts
  • 2 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

📰 Citrix Scrambles to Patch Critical 'CitrixBleed'-like Flaw in NetScaler Products

⚠️ Critical Citrix NetScaler flaw CVE-2026-3055 (CVSS 9.3) allows data theft, drawing comparisons to CitrixBleed. Unauthenticated attackers can read sensitive memory. Patch immediately! #Citrix #NetScaler #CyberSecurity #CVE

🔗 cyber.netsecops.io/articles/cr

  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback

Urges Patching Critical NetScaler Vulnerabilities CVE-2026-3055 & CVE-2026-4368 Allowing Unauthenticated Data Leaks. This looks like another incarnation of !

Defenders need to act quickly. Patch Now!
👇
thehackernews.com/2026/03/citr

  • 0
  • 1
  • 1
  • 21h ago

Bluesky

Profile picture fallback
Critical NetScaler ADC, Gateway flaw may soon be exploited (CVE-2026-3055) 📖 Read more: www.helpnetsecurity.com/2026/03/24/n... #cybersecurity #cybersecuritynews #vulnerability @rapid7.com
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
NetScaler ADCおよびゲートウェイの重大な脆弱性が悪用される可能性あり(CVE-2026-3055) Critical NetScaler ADC, Gateway flaw may soon be exploited (CVE-2026-3055) #HelpNetSecurity (Mar 24) www.helpnetsecurity.com/2026/03/24/n...
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Citrix NetScalerに新たな脆弱性、悪用される可能性危惧する声も:CVE-2026-3055 | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/44790/
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
Critical NetScaler Flaws Expose Enterprise Networks: Immediate Patching Required for CVE-2026-3055 and CVE-2026-4368 + Video Introduction: NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway serve as critical infrastructure components, acting as the front door for application delivery, VPN…
  • 1
  • 0
  • 0
  • 16h ago
Profile picture fallback
Citrix fixed CVE-2026-3055 (9.3) & CVE-2026-4368 (7.7) in NetScaler ADC/Gateway. A memory overread may leak data and a race condition can cause session mix-up. Check - (SAML IdP / Gateway / AAA). Query: product="Citrix Gateway" OR product="Citrix ADC" OR web.title~"NetScaler Gateway" tag!=honeypot
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Oracle Corporation
  • Oracle Identity Manager

20 Mar 2026
Published
24 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.04%

KEV

Description

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Identity Manager and Oracle Web Services Manager. Successful attacks of this vulnerability can result in takeover of Oracle Identity Manager and Oracle Web Services Manager. Note: Oracle Web Services Manager is installed with an Oracle Fusion Middleware Infrastructure. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Statistics

  • 4 Posts

Last activity: 17 hours ago

Fediverse

Profile picture fallback

CVE-2026-21992 can be used without authentication for remote code execution and it may have been exploited in the wild. securityweek.com/oracle-releas

  • 0
  • 0
  • 1
  • 22h ago

Bluesky

Profile picture fallback
Oracle releases urgent patch for CVE-2026-21992, a critical unauthenticated remote code execution flaw in Oracle Identity Manager 12.2.1.4.0 exploitable via HTTP. #OraclePatch #RemoteCodeExec #USA
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
📢 Oracle alerte sur CVE-2026-21992 : RCE critique sans authentification dans Fusion Middleware 📝 ## 🔔 Contexte Oracle a publié le 19 mars… https://cyberveille.ch/posts/2026-03-24-oracle-alerte-sur-cve-2026-21992-rce-critique-sans-authentification-dans-fusion-middleware/ #CVE_2026_21992 #Cyberveille
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Apple
  • iOS and iPadOS

25 Mar 2026
Published
25 Mar 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This issue was addressed with improved permissions checking. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4, watchOS 26.4. A local attacker may gain access to user's Keychain items.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

🔒 CVE-2026-28864 (HIGH): Local attackers can access Apple Keychain items on iOS, iPadOS, macOS, visionOS, watchOS. Patch to latest OS releases now to protect credentials. No known exploits yet. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 4h ago
Profile picture fallback

【セキュリティ ニュース】「iOS 26.4」公開、脆弱性38件を修正 – 旧端末向け「iOS 18.7.7」も(1ページ目 / 全1ページ):Security NEXT yayafa.com/2759965/ #Apple #CVE202628864 #IOS264セキュリティアップデート #IPadOS264 #SCIENCE #Science&Technology #SECURITY #Technology #WebKit脆弱性 #カーネル脆弱性 #キーチェーンアクセス問題 #セキュリティ #テクノロジー #ニュース #対策 #旧端末向けiOS1877 #科学 #科学&テクノロジー

  • 1
  • 0
  • 0
  • 2h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Turning an encrypted backup into Remote Code Execution in Stackfield’s desktop app (CVE-2026-28373).

rcesecurity.com/2026/03/stackf

  • 0
  • 1
  • 1
  • 20h ago

Bluesky

Profile picture fallback
Stackfield Desktop App: RCE via Path Traversal and Arbitrary File Write (CVE-2026-28373)
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • ISC
  • Kea

25 Mar 2026
Published
25 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

KEV

Description

Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error. This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: Last hour

Fediverse

Profile picture fallback

ISC is pleased to announce the releases of Kea 2.6.5 and 3.0.3 (stable) and 3.1.7 (development).

Both stable versions address a vulnerability in Kea DHCP; see our published advisory at kb.isc.org/docs/cve-2026-3608 . Kea 3.1.7 is not susceptible to this CVE, but development versions are not suitable for production use.

The releases are available from the ISC download page at isc.org/download/#Kea.

Thank you for using ISC’s software!

  • 0
  • 1
  • 0
  • 2h ago
Profile picture fallback

🚨 CVE-2026-3608: HIGH-severity vuln in ISC Kea DHCP (2.6.0 – 2.6.4, 3.0.0 – 3.0.2). Remote attackers can crash daemons, causing DoS. Restrict API/HA access, monitor traffic, and prep failover. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • Last hour

Overview

  • NetScaler
  • ADC

23 Mar 2026
Published
24 Mar 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
0.02%

KEV

Description

Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server leading to User Session Mixup

Statistics

  • 4 Posts
  • 2 Interactions

Last activity: 16 hours ago

Fediverse

Profile picture fallback

Urges Patching Critical NetScaler Vulnerabilities CVE-2026-3055 & CVE-2026-4368 Allowing Unauthenticated Data Leaks. This looks like another incarnation of !

Defenders need to act quickly. Patch Now!
👇
thehackernews.com/2026/03/citr

  • 0
  • 1
  • 1
  • 21h ago

Bluesky

Profile picture fallback
Critical NetScaler Flaws Expose Enterprise Networks: Immediate Patching Required for CVE-2026-3055 and CVE-2026-4368 + Video Introduction: NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway serve as critical infrastructure components, acting as the front door for application delivery, VPN…
  • 1
  • 0
  • 0
  • 16h ago
Profile picture fallback
Citrix fixed CVE-2026-3055 (9.3) & CVE-2026-4368 (7.7) in NetScaler ADC/Gateway. A memory overread may leak data and a race condition can cause session mix-up. Check - (SAML IdP / Gateway / AAA). Query: product="Citrix Gateway" OR product="Citrix ADC" OR web.title~"NetScaler Gateway" tag!=honeypot
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Microsoft
  • Microsoft SharePoint Enterprise Server 2016

13 Jan 2026
Published
19 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
7.10%

Description

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Statistics

  • 2 Posts

Last activity: 6 hours ago

Bluesky

Profile picture fallback
CVE-2026-20963: SharePointの逆シリアル化におけるリモートコード実行の脆弱性 CVE-2026-20963: SharePoint Deserialization Remote Code Execution Vulnerability #SecurityBoulevard (Mar 24) securityboulevard.com/2026/03/cve-...
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
The latest update for #Indusface includes "CVE-2026-20963: SharePoint Deserialization Remote Code Execution Vulnerability" and "CVE-2026-27739: Angular SSR Request Vulnerability Enabling Server-Side Request Forgery". #cybersecurity #infosec https://opsmtrs.com/3ySs2VF
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • snapd

17 Mar 2026
Published
18 Mar 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.00%

KEV

Description

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

Statistics

  • 1 Post
  • 9 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

A new Ubuntu vulnerability (CVE-2026-3888) allows local users to escalate privileges to root via a timing-based exploit in Ubuntu Desktop 24.04 and newer. ⏱️
The flaw affects systems using older versions of snapd and requires immediate patching. 🔐

🔗 infosecurity-magazine.com/news

#TechNews #Ubuntu #Linux #SecurityFlaw #CVE #PrivilegeEscalation #RootAccess #Cybersecurity #LinuxSecurity #PatchNow #Snap #SystemVulnerabilities #DataProtection #TechUpdates #Privacy #OpenSource #Canonical

  • 3
  • 6
  • 0
  • 15h ago

Overview

  • mpetroff
  • pannellum

21 Feb 2026
Published
25 Feb 2026
Updated

CVSS v4.0
MEDIUM (5.3)
EPSS
0.03%

KEV

Description

Pannellum is a lightweight, free, and open source panorama viewer for the web. In versions 3.5.0 through 2.5.6, the hot spot attributes configuration property allowed any attribute to be set, including HTML event handler attributes, allowing for potential XSS attacks. This affects websites hosting the standalone viewer HTML file and any other use of untrusted JSON config files (bypassing the protections of the escapeHTML parameter). As certain events fire without any additional user interaction, visiting a standalone viewer URL that points to a malicious config file — without additional user interaction — is sufficient to trigger the vulnerability and execute arbitrary JavaScript code, which can, for example, replace the contents of the page with arbitrary content and make it appear to be hosted by the website hosting the standalone viewer HTML file. This issue has been fixed in version 2.5.7. To workaround, setting the Content-Security-Policy header to script-src-attr 'none' will block execution of inline event handlers, mitigating this vulnerability. Don't host pannellum.htm on a domain that shares cookies with user authentication to mitigate XSS risk.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture fallback

Dios mio! While researching a particular type of Colombian folk music, we stumbled across a .edu domain selling... accordions? Our first thought was potentially domain hijacking, but it appears to be more likely an exploitation of CVE-2026-27210 (TLDR; cross-site scripting). While the vulnerability has been patched in the plugin itself, not all pages have updated their plugins, and search engines have already indexed the poisoned pages! Pivoting led to 50+ additional domains found spread across three risky TLDs: .sbs, .pics, and .shop. The domains on .sbs and .pics appear to be config servers to exploit the vulnerability; the domains on .shop are the landing pages where victims can be scammed.

IOCs:
000o[.]sbs,0pen[.]sbs,123buys[.]shop,123me[.]shop,1bg[.]pics,1ki[.]pics,1mage[.]sbs,1ql[.]pics,1ty[.]pics,1vi[.]pics,1wr[.]pics,2ty[.]pics,569oagri[.]shop,66buys[.]shop,6ip[.]pics,6ym[.]pics,7rt[.]pics,8pi[.]pics,99buys[.]shop,99i[.]pics,9gwe[.]shop,a25n[.]shop,bk2[.]pics,bk59t[.]shop,buysok[.]shop,c68k[.]shop,cc1[.]pics,doo[.]pics,ep7[.]pics,estore-1[.]com,g9gvv[.]sbs,gaer896[.]shop,gm5[.]pics,gosok[.]shop,gt3[.]pics,h66p[.]shop,hh6[.]pics,iilvw[.]sbs,im9[.]pics,img1[.]sbs,in6[.]pics,jj3[.]pics,kk9[.]pics,lilil[.]sbs,llvvw[.]sbs,m66p6[.]shop,mebuys[.]shop,mg6[.]pics,mh8f6k[.]shop,mkk[.]pics,ms1[.]pics,nn6[.]pics,onsgs[.]com,p6[.]pics,p888p[.]shop,pan1[.]top,pic1[.]sbs,pic2[.]sbs,pt11[.]sbs,py3y[.]com,qq1[.]pics,rey89p[.]shop,shop56[.]shop,t88t8[.]shop,tp1[.]pics,tp9[.]pics,trues[.]sbs,up9[.]pics,upimg[.]sbs,uu2[.]pics,vt5[.]pics,vteyu[.]shop,vvf1[.]sbs,vvp1[.]sbs,w2w[.]pics,w88p[.]shop,wp59q[.]shop,wvlll[.]sbs,wvv1[.]sbs,wvvvv[.]sbs,x2p[.]pics,xyaer548[.]shop,yi1[.]pics

  • 2
  • 5
  • 0
  • 19h ago
Showing 1 to 10 of 47 CVEs