<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with cve20263055]]></title><description><![CDATA[A list of topics that have been tagged with cve20263055]]></description><link>https://board.circlewithadot.net/tags/cve20263055</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 00:03:42 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/cve20263055.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2)#CVE_2026_3055 https:&#x2F;&#x2F;labs.watchtowr.com&#x2F;please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2&#x2F;]]></title><description><![CDATA[Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2)#CVE_2026_3055 https://labs.watchtowr.com/please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2/]]></description><link>https://board.circlewithadot.net/topic/93203704-3099-4b40-9d3d-558fe138c346/please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2-cve_2026_3055-https-labs.watchtowr.com-please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/93203704-3099-4b40-9d3d-558fe138c346/please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2-cve_2026_3055-https-labs.watchtowr.com-please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2</guid><dc:creator><![CDATA[threatcodex@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[➡️ CVE-2026-3055 👀 👇 https:&#x2F;&#x2F;support.citrix.com&#x2F;support-home&#x2F;kbsearch&#x2F;article?articleNumber=CTX696300]]></title><description><![CDATA[️  CVE-2026-3055 / Citrix NetScaler : la reconnaissance est en cours.Des activités de reconnaissance ciblent déjà les appliances exposées, avec notamment des requêtes vers /cgi/GetAuthMethods pour identifier les configs exploitables, en particulier les environnements SAML IdP. GBHackers relaie ces observations https://gbhackers.com/hackers-probe-citrix-netscaler-systems-cve-2026-3055-exploitation/Côté exposition, ONYPHE recense plus de 18000 IP uniques sur une version vulnérable, (dont environ +800 en Suisse).  https://www.linkedin.com/posts/onyphe_vulnerability-asm-attacksurfacemanagement-activity-7442250727046987776-ofYVLe pattern rappelle clairement les précédents CitrixBleed : si du NetScaler est encore exposé, la fenêtre avant exploitation de masse pourrait être très courte.#CyberVeille #CVE_2026_3055  #Citrix]]></description><link>https://board.circlewithadot.net/topic/1faf2bdb-c945-4543-909e-ba0858a0374e/cve-2026-3055-https-support.citrix.com-support-home-kbsearch-article-articlenumber-ctx696300</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/1faf2bdb-c945-4543-909e-ba0858a0374e/cve-2026-3055-https-support.citrix.com-support-home-kbsearch-article-articlenumber-ctx696300</guid><dc:creator><![CDATA[decio@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>