Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems https://thehackernews.com/2026/03/hackers-exploit-cve-2025-32975-cvss-100.html
Overview
- Palo Alto Networks
- Cloud NGFW
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Fediverse
CISA just added CVE-2023-4966 to its Known Exploited Vulnerabilities catalog and is giving federal agencies until Thursday to patch Citrix Net Scaler devices.
Read more: https://steelefortress.com/botzi1
InfoSec #Cybersecurity #Security
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 2 Posts
Fediverse
🚨 High-severity security fix in lodash@4.18.0 just released!
Patches CVE-2026-4800 — lodash vulnerable to Code Injection via _.template imports key names
https://github.com/lodash/lodash/security/advisories/GHSA-r5fr-rjxr-66jc
Overview
Description
Statistics
- 1 Post
Bluesky
Overview
- GNU
- inetutils
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Fediverse
ZAST.AI has identified and verified CVE-2026-33419 in MinIO, a widely used Go object storage project.
Project page: https://github.com/minio/minio
Project footprint: 60.5k+ GitHub stars as of March 31, 2026.
The verified issue affects the LDAP-backed STS authentication flow. The endpoint disclosed whether a username existed, accepted repeated password attempts without effective throttling, and returned temporary AWS-style credentials when authentication succeeded.
This is a representative example of why enterprise security teams need automated exploit verification. Individual signals such as distinct error messages or missing throttling can be easy to underestimate in isolation. The real risk emerges when those behaviors compose into a working path that produces valid credentials.
ZAST.AI promotes findings into reports only after successful PoC validation, which supports a zero-false-positive operating model and helps teams prioritize what is demonstrably real.
Full report: https://blog.zast.ai/security%20research/CVE-2026-33419-Analysis/
Overview
Description
Statistics
- 1 Post
Overview
- Joomla! Project
- Joomla! CMS
Description
Statistics
- 1 Post
Fediverse
⚠️ CVE-2026-23898: HIGH-severity flaw in Joomla! CMS (4.0.0-5.4.3, 6.0.0-6.0.3) lets admin-level attackers delete arbitrary files, risking DoS or system compromise. Patch ASAP, restrict high-priv accounts, monitor for deletions. https://radar.offseq.com/threat/cve-2026-23898-cwe-73-destructive-file-deletion-an-4b16a48a #OffSeq #Joomla #Vuln