24h | 7d | 30d

Overview

  • snapd

17 Mar 2026
Published
18 Mar 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.01%

KEV

Description

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

Statistics

  • 26 Posts
  • 22 Interactions

Last activity: 5 hours ago

Fediverse

Profile picture fallback

Pretty much as expected, Ubuntu running snapd as root was always going to turn out well :-|

discourse.ubuntu.com/t/snapd-l

My friends, time to bring your Ubuntu system up to date:

sudo apt update && sudo apt upgrade && systemctl reboot

  • 3
  • 5
  • 0
  • 8h ago
Profile picture fallback

Quite the Ubuntu 24.04 vulnerability, via snap packages. Surprise surprise.

cdn2.qualys.com/advisory/2026/

#ubuntu #linux #CVE20263888

  • 2
  • 2
  • 0
  • 11h ago
Profile picture fallback

Critical Ubuntu flaw (CVE-2026-3888) enables local root escalation via Snap.

Delayed exploit (10–30 days) makes detection harder.

Patch snapd immediately.
technadu.com/critical-cve-2026

  • 1
  • 0
  • 0
  • 19h ago
Profile picture fallback

🛑 ALERT - A new flaw in 24.04+ lets attackers gain full root access from low privileges.

By timing system cleanup, they replace a snap directory and execute code as root—no user action required.

🔗 Exploit steps and patched versions → thehackernews.com/2026/03/ubun

  • 0
  • 1
  • 0
  • 21h ago
Profile picture fallback

Global tensions heighten as the US-Iran conflict escalates, impacting oil markets via the Strait of Hormuz (March 18). Technology sees continued rapid AI advancement, with OpenAI's GPT-5.4 and Anthropic's Claude Sonnet 4.6 released (March 17). In cybersecurity, the EU sanctioned private cyber offensive groups (March 17), and a critical Ubuntu privilege escalation flaw (CVE-2026-3888) was discovered (March 18). AI-driven threats also increasingly impact M&A security.

#Geopolitics #Cybersecurity #AINews

  • 0
  • 1
  • 0
  • 16h ago
Profile picture fallback

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit
thehackernews.com/2026/03/ubun

  • 0
  • 0
  • 3
  • 23h ago

Bluesky

Profile picture fallback
CVE-2026-3888: Ubuntu Desktop 24.04+ vulnerable to Root exploit securityaffairs.com/189614/secur...
  • 2
  • 0
  • 1
  • 20h ago
Profile picture fallback
CVE-2026-3888 is a high-severity privilege escalation vulnerability in Ubuntu Desktop 24.04+ that allows unprivileged attackers to gain root access through snap-confine and systemd-tmpfiles interaction.
  • 1
  • 1
  • 0
  • 23h ago
Profile picture fallback
Domani mi sa che mi tocca lavorare. Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit thehackernews.com/2026/03/ubun...
  • 1
  • 1
  • 0
  • 11h ago
Profile picture fallback
Good Things Come to Those Who Wait: New Ubuntu ‘Snap’ Exploit Grants Root After 30-Day Countdown (CVE-2026-3888) + Video Introduction: In the world of cybersecurity, patience is a virtue—especially for local attackers targeting Ubuntu Desktop 24.04 and later. A newly disclosed high-severity…
  • 0
  • 1
  • 0
  • 23h ago
Profile picture fallback
Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
Ubuntu vulnerability CVE-2026-3888 allows local users to gain root access. Delayed execution via system cleanup makes it harder to detect. Patch snapd now. #Cybersecurity #Linux
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
Attention System Administrators and Ubuntu Users! A new security update (USN-8102-2) has been released for #Ubuntu 24.04 LTS addressing a high-impact privilege escalation vulnerability in snapd (CVE-2026-3888). Read more: 👉 tinyurl.com/htsw4959 #Security
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root blog.qualys.com/vulnerabilit... (news.ycombinator.com/item?id=4742...)
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
📰 CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root 💬 Exec: Read the Qualys tech brief; article is verbose/ads. Sentiment: skeptical; vibe: wary+snark. 🧐 https://news.ycombinator.com/item?id=47427208
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Ubtuntu 24.04+ Snapd Local Privilege Escalation (CVE-2026-3888)
  • 0
  • 0
  • 1
  • 7h ago
Profile picture fallback
CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root https://news.ycombinator.com/item?id=47427208
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
CVE-2026-3888: Snap Flaw, Local Privilege Escalation to Root https://lobste.rs/s/ccys1t #security
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • GNU
  • inetutils

13 Mar 2026
Published
19 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.04%

KEV

Description

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

Statistics

  • 14 Posts
  • 3 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

RT @TheHackersNews
⚠️ WARNING - An unpatched critical telnetd bug (CVE-2026-32746) lets attackers gain full system access with no credentials.

One connection to port 23 is enough to trigger memory corruption and execute code as root.

No patch yet. Prior telnet flaw is already exploited in the wild.

🔗Read → thehackernews.com/2026/03/crit

  • 2
  • 0
  • 0
  • 12h ago
Profile picture fallback

: Yet Another Critical Unauthenticated Root RCE CVE-2026-32746 discovered in legacy inetUtils Telnet - no user interaction and no special network position required.
Telnet is still in use in old switches, routers, ICS/IoT, cameras:
👇
thehackernews.com/2026/03/crit

  • 0
  • 0
  • 1
  • 23h ago

Bluesky

Profile picture fallback
🌐 Une faille critique non corrigée (CVE-2026-32746) dans telnetd GNU InetUtils permet une exécution distante de code en root via le port 23. Score CVSS: 9,8/10. #CyberSecurity #Automatisation
  • 0
  • 1
  • 0
  • 15h ago
Profile picture fallback
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23 #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 1
  • 21h ago
Profile picture fallback
A critical vulnerability has been discovered in the Telnet Daemon (Telnetd), a widely used protocol for remote access to devices. This flaw, identified as CVE-2026-32746, can allow an unauthenticated attacker to execute arbitrary code on affected systems. References: 1. thehackernews.
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
Critical vulnerability: CVE-2026-32746 is a pre-authentication remote code execution (RCE) in the telnet daemon 🛠️ Affects GNU Inetutils telnetd through version 2.7 🔎 Censys sees ~3,362 exposed hosts 🔴 Exploitation could grant an attacker control of the host censys.com/advisory/cve... #CVE202632746
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE Via Port 23 - https://mwyr.es/FHT9DxFj #thn #infosec
  • 0
  • 0
  • 1
  • 8h ago
Profile picture fallback
CVE-2026-32746 GNU telnetd Buffer Overflow PoC - Critical (9.8)
  • 0
  • 0
  • 1
  • 7h ago
Profile picture fallback
A critical out-of-bounds write in GNU InetUtils telnetd's LINEMODE SLC handler (CVE-2026-32746) allows unauthenticated remote root code execution via initial Telnet handshake. #GNUInetUtils #RemoteExploit #LinuxSecurity
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Cisco
  • Cisco Secure Firewall Management Center (FMC)

04 Mar 2026
Published
05 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.58%

KEV

Description

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced.

Statistics

  • 9 Posts
  • 5 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

The Interlock ransomware group is actively exploiting a Cisco Firewall 0-day vulnerability (CVE-2026-20131) to deploy their ransomware, a flaw that allows unauthenticated remote attackers to execute arbitrary Java code. This exploitation began before the vulnerability's public disclosure, enabling the group to compromise organizations unaware of the threat.
cybersecuritynews.com/cisco-fi

  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback

Cybersecurity: Interlock ransomware is exploiting a critical Cisco FMC zero-day (CVE-2026-20131, CVSS 10.0) for root access, active since January 2026. CISA added a Microsoft SharePoint vulnerability (CVE-2026-20963) to its Known Exploited Vulnerabilities Catalog. Geopolitical: Tensions in the Gulf region are escalating, with Iran reportedly targeting energy sites, leading to a sharp spike in oil prices. These events underscore the urgent need for enhanced digital resilience and geopolitical stability.

#Cybersecurity #Geopolitics #AnonNews_irc

  • 0
  • 0
  • 0
  • Last hour

Bluesky

Profile picture fallback
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 1
  • 2
  • 0
  • 16h ago
Profile picture fallback
Interlock ransomware exploits critical Cisco Secure Firewall vulnerability CVE-2026-20131 as zero-day since January 26, 2026, enabling unauthenticated remote code execution with root privileges.
  • 0
  • 1
  • 0
  • 16h ago
Profile picture fallback
Ransomware group Interlock exploited CVE-2026-20131 in Cisco Secure Firewall Management Center for 36 days before Cisco's patch, enabling remote code execution as root on vulnerable devices.
  • 0
  • 1
  • 0
  • 14h ago
Profile picture fallback
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access thehackernews.com/2026/03/inte...
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
Interlock's post-exploit toolkit exposed Ransomware criminals exploited CVE-2026-20131, a maximum-severity bug in Cisco Secure Firewall Management Center software, as a zero-day vulnerability more than a month before Cisco patched the hole, according to Amazon security boss CJ Moses.…
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
Ciscoの脆弱性(CVE-2026-20131)。悪用されているのを発見したのはAmazonのセキュリティチーム:Ransomware crims abused Cisco 0-day weeks before disclosure • The Register https://www.theregister.com/2026/03/18/amazon_cisco_firewall_0_day_ransomware/
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
The Interlock ransomware gang exploited a zero-day Cisco Secure Firewall flaw (CVE-2026-20131) from Jan 26 to Mar 4, enabling root remote code execution. Targets include DaVita and Texas Tech University. #RansomwareAttack #CiscoFlaw #USA
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Apple
  • macOS

17 Mar 2026
Published
18 Mar 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. Processing maliciously crafted web content may bypass Same Origin Policy.

Statistics

  • 8 Posts
  • 3 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

The vulnerability, tracked as CVE-2026-20643 (CVSS score: N/A), has been described as a cross-origin issue in WebKit's Navigation API that could be exploited to bypass the same-origin policy when processing maliciously crafted web content. thehackernews.com/2026/03/appl

  • 0
  • 0
  • 2
  • 20h ago
Profile picture fallback

Apple has introduced a new update system called Background Security Improvements for delivering faster, lightweight security patches across its platforms.

The first update using this mechanism addressed CVE-2026-20643, a WebKit cross-origin vulnerability that could be exploited through malicious web content.

  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback

Apparently just affects the 26’s ?support.apple.com/en-us/126604 / CVE-2026-20643

  • 0
  • 0
  • 0
  • 16h ago

Bluesky

Profile picture fallback
https://forest.watch.impress.co.jp/docs/news/2094087.html AppleがiOS/iPadOS/macOS向けに「バックグラウンドセキュリティ改善」を実施。 これはSafari(WebKit)などで見つかる小規模なセキュリティ問題に迅速に対処する仕組みです。 Navigation APIの脆弱性(CVE-2026-20643)を解決し、Webサイト間での不正なデータやり取りを防ぎます。
  • 1
  • 1
  • 0
  • 3h ago
Profile picture fallback
iPhone/iPad/Macに脆弱性、Appleが「バックグラウンドセキュリティ改善」を実施/クロスオリジン問題「CVE-2026-20643」を解決 https://forest.watch.impress.co.jp/docs/news/2094087.html
  • 1
  • 0
  • 0
  • 18h ago
Profile picture fallback
Apple released its first Background Security Improvements to patch a cross-origin vulnerability in WebKit. The flaw, CVE-2026-20643, could bypass the […]
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts
  • 11 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture fallback

Earlier today the JRuby team was informed of a low-severity vulnerability in the bcrypt-ruby gem. We worked with the library's maintainers to arrange a fix and disclosure. The issue is now fixed in versions 3.1.22 and higher. Exposure risk is low, but upgrading is recommended.

CVE-2026-33306: Integer Overflow Causes Zero Key-Strengthening Iterations at Cost=31 on JRuby

github.com/bcrypt-ruby/bcrypt-

  • 3
  • 5
  • 0
  • 8h ago

Bluesky

Profile picture fallback
Today we were informed of a low-severity vulnerability in the bcrypt-ruby gem. We worked with the maintainers to arrange a fix. Upgrading is recommended. CVE-2026-33306: Integer Overflow Causes Zero Key-Strengthening Iterations at Cost=31 on JRuby github.com/bcrypt-ruby/...
  • 2
  • 1
  • 0
  • 8h ago

Overview

  • Apple
  • macOS

12 Dec 2025
Published
19 Mar 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.

Statistics

  • 4 Posts
  • 8 Interactions

Last activity: 5 hours ago

Fediverse

Profile picture fallback
wen eta KFD for iOS 26.0.1???????

Seriously, any iOS experts looked into if CVE-2025-43520 from the DarkSword vulns could be used for KFD/MacDirtyCow-style file modding?

https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
  • 2
  • 1
  • 0
  • 6h ago
Profile picture fallback

@agreenberg more in depth analysis from Google.

It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

wired.com/story/hundreds-of-mi

  • 1
  • 1
  • 0
  • 16h ago
Profile picture fallback

According to TAG’s analysis, DarkSword “uses CVE-2025-43520, a kernel-mode race condition in XNU’s virtual filesystem (VFS) implementation” I’m guessing it’s https://github.com/apple-oss-distributions/xnu/blob/bbb1b6f9e71b8cdde6e5cd6f4841f207dee3d828/bsd/vfs/vfs_cluster.c#L3700 ? There’s several VFS changes; not sure if this is the right one.

If it is this one, I guess you’d somehow

  • Make a contiguous memory region,
  • start reading a file into it,
  • then switch it to a non-contiguous region after it’s validated the region, but before it actually starts reading the file,
  • so it ends up writing what it thinks is your contiguous area, but actually is the first part of your area followed by some other memory?
  • 1
  • 1
  • 0
  • 5h ago
Profile picture fallback

As usual, Wired is… not great 🙄

Regarding DarkSword, the latest objectively bad exploit affecting iOS and Safari, Google has a more in depth analysis, with a lot more informations on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

wired.com/story/hundreds-of-mi

  • 0
  • 1
  • 0
  • 16h ago

Overview

  • Zimbra
  • Collaboration

05 Jan 2026
Published
19 Mar 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
0.05%

Description

Zimbra Collaboration (ZCS) 10 before 10.0.18 and 10.1 before 10.1.13 allows Classic UI stored XSS via Cascading Style Sheets (CSS) @import directives in an HTML e-mail message.

Statistics

  • 2 Posts

Last activity: 10 hours ago

Bluesky

Profile picture fallback
~Cisa~ CISA added an actively exploited Zimbra Collaboration Suite XSS flaw to its KEV catalog. - IOCs: CVE-2025-66376 - #CVE2025_66376 #ThreatIntel #Zimbra
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
CISA mandates federal agencies to patch Zimbra Collaboration Suite servers by April 1 due to active exploitation of a stored XSS flaw via CSS @import in HTML emails (CVE-2025-66376). #ZimbraFlaw #USFed #XSSVulnerability
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Microsoft
  • Microsoft SharePoint Enterprise Server 2016

13 Jan 2026
Published
19 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
1.63%

Description

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Statistics

  • 2 Posts

Last activity: Last hour

Fediverse

Profile picture fallback

Cybersecurity: Interlock ransomware is exploiting a critical Cisco FMC zero-day (CVE-2026-20131, CVSS 10.0) for root access, active since January 2026. CISA added a Microsoft SharePoint vulnerability (CVE-2026-20963) to its Known Exploited Vulnerabilities Catalog. Geopolitical: Tensions in the Gulf region are escalating, with Iran reportedly targeting energy sites, leading to a sharp spike in oil prices. These events underscore the urgent need for enhanced digital resilience and geopolitical stability.

#Cybersecurity #Geopolitics #AnonNews_irc

  • 0
  • 0
  • 0
  • Last hour

Bluesky

Profile picture fallback
~Cisa~ CISA added actively exploited Microsoft SharePoint flaw CVE-2026-20963 to its KEV catalog. - IOCs: CVE-2026-20963 - #CVE202620963 #SharePoint #ThreatIntel
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • VMware
  • Spring AI
  • Spring AI

18 Mar 2026
Published
18 Mar 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
0.05%

KEV

Description

A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authenticated users to bypass metadata-based access controls through crafted filter expressions. User-controlled input passed to FilterExpressionBuilder is concatenated into JSONPath queries without proper escaping, enabling attackers to inject arbitrary JSONPath logic and access unauthorized documents. This vulnerability affects applications using vector stores that extend AbstractFilterExpressionConverter for multi-tenant isolation, role-based access control, or document filtering based on metadata. The vulnerability occurs when user-supplied values in filter expressions are not escaped before being inserted into JSONPath queries. Special characters like ", ||, and && are passed through unescaped, allowing injection of arbitrary JSONPath logic that can alter the intended query semantics.

Statistics

  • 2 Posts

Last activity: 6 hours ago

Fediverse

Profile picture fallback

🔒 HIGH: CVE-2026-22729 in VMware Spring AI (1.0.x, 1.1.x) enables JSONPath injection, letting authenticated users bypass access controls and access sensitive docs. Patch or sanitize input! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 23h ago

Bluesky

Profile picture fallback
Java Spring AIにSQLインジェクションとJSONPathインジェクションの脆弱性(CVE-2026-22730、CVE-2026-22729) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • VMware
  • Spring AI
  • Spring AI

18 Mar 2026
Published
19 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.04%

KEV

Description

A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands. The vulnerability exists due to missing input sanitization.

Statistics

  • 2 Posts

Last activity: 6 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-22730: HIGH-severity SQL injection in VMware Spring AI (1.0.x, 1.1.x) lets users with limited privileges run arbitrary SQL via MariaDBFilterExpressionConverter. Patch ASAP & harden input validation! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 21h ago

Bluesky

Profile picture fallback
Java Spring AIにSQLインジェクションとJSONPathインジェクションの脆弱性(CVE-2026-22730、CVE-2026-22729) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 6h ago
Showing 1 to 10 of 46 CVEs