Event JSON
{
"id": "caf2fa66ac0c64fb08f6fa94e17a18243eb93663cd4c6e7a34a42f2c11c4321b",
"pubkey": "1de437389bfb27cbe608cf603cb5597c51f9ccdae849c4995f6fc436b18d4708",
"created_at": 1776528032,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@Javvad/116426541162541978",
"web"
],
[
"proxy",
"https://infosec.exchange/users/Javvad/statuses/116426541162541978",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/Javvad/statuses/116426541162541978",
"pink.momostr"
],
[
"-"
]
],
"content": "NetScaler is doing it again. Third time in three years we're patching memory leaks that hand attackers your session tokens on a plate. CISA's already got it on the emergency list. If you run one, stop reading this and patch now.\n\nhttps://cybersec.picussecurity.com/s/cve-2026-3055-cve-2026-4368-inside-the-netscaler-citrixbleed-3-memory-overread-26799",
"sig": "5037dc6fa60ac6f87d04d37413fed7d6c962535586a94047c54471574a557cb7c2c6df6282b797864696b95bb7169879c51e3c9f82b5bfb0de820e55be8a55e3"
}