<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
	<title>The Exploit Database - CXSecurity.com</title>
	<link>https://cxsecurity.com/wlb/</link>
	<description>The Exploit Database - World Laboratory of Bugtraq 2 CXSecurity.com</description>
	<language>en-US</language>
	<lastBuildDate>Fri, 10 Apr 2026 05:05:50 +0000</lastBuildDate>
	<copyright>CXSecurity</copyright>
	<image>
		<title>CXSecurity: World Laboratory of Bugtraq 2</title>
		<link>https://cxsecurity.com/wlb/rss/exploit/</link>
		<url>https://cxsecurity.com/images/wlb/wlblogo.png</url>
		<description>The Exploit Database - World Laboratory of Bugtraq 2 (WLB2)</description>
	</image>
	
		<item>
			<title>Kanboard &lt; = 1.2.50 Authenticated SQL Injection </title>
			<link>https://cxsecurity.com/issue/WLB-2026030027</link>
			<guid>WLB-2026030027</guid>
			<lastBuildDate>2026-03-18 21:17:40 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Kanboard &lt; = 1.2.50 Authenticated SQL Injection  Risk: Medium Text:#!/usr/bin/env python3  # Exploit Title:        Kanboard Authenticated SQL Injection in ProjectPermissionController  # CVE:    ...</description>
			<pubDate>Wed, 18 Mar 2026 21:17:40 +0000</pubDate>	
		</item>
		
		<item>
			<title>OpenClaw tools.exec.safeBins &lt; = 2026.2.22 Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026030004</link>
			<guid>WLB-2026030004</guid>
			<lastBuildDate>2026-03-02 21:11:47 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: OpenClaw tools.exec.safeBins &lt; = 2026.2.22 Remote Code Execution Risk: Low Text:#!/usr/bin/env python3  # Exploit Title: OpenClaw tools.exec.safeBins &lt; = 2026.2.22 Remote Code Execution  # CVE:             CV...</description>
			<pubDate>Mon, 02 Mar 2026 21:11:47 +0000</pubDate>	
		</item>
		
		<item>
			<title>Google Chrome &lt;  145.0.7632.75 - CSSFontFeatureValuesMap Use-After-Free</title>
			<link>https://cxsecurity.com/issue/WLB-2026020022</link>
			<guid>WLB-2026020022</guid>
			<lastBuildDate>2026-02-23 22:18:20 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: Google Chrome &lt;  145.0.7632.75 - CSSFontFeatureValuesMap Use-After-Free Risk: High Text:# Exploit Title: Google Chrome &lt;  145.0.7632.75 - CSSFontFeatureValuesMap Use-After-Free  # Date: 2026-02-23  # Exploit Author: ...</description>
			<pubDate>Mon, 23 Feb 2026 22:18:20 +0000</pubDate>	
		</item>
		
		<item>
			<title>Siklu EtherHaul Series EH-8010 Remote Command Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026020013</link>
			<guid>WLB-2026020013</guid>
			<lastBuildDate>2026-02-14 20:31:45 CET</lastBuildDate>
			<dc:creator>semaja2</dc:creator>
			<description>Topic: Siklu EtherHaul Series EH-8010 Remote Command Execution Risk: High Text:# Exploit Title:Siklu EtherHaul Series EH-8010 - Remote Command Execution  # Shodan Dork: &quot;EH-8010&quot; or &quot;EH-1200&quot;  # Date: 2025-...</description>
			<pubDate>Sat, 14 Feb 2026 20:31:45 +0000</pubDate>	
		</item>
		
		<item>
			<title>aiohttp 3.9.1 Directory Traversal</title>
			<link>https://cxsecurity.com/issue/WLB-2026020007</link>
			<guid>WLB-2026020007</guid>
			<lastBuildDate>2026-02-05 21:43:29 CET</lastBuildDate>
			<dc:creator>Beatriz Fresno Naumova</dc:creator>
			<description>Topic: aiohttp 3.9.1 Directory Traversal Risk: Medium Text:# Exploit Title: Python aiohttp directory traversal PoC (CVE-2024-23334)  # Google Dork: N/A  # Date: 2025-10-06  # Exploit Aut...</description>
			<pubDate>Thu, 05 Feb 2026 21:43:29 +0000</pubDate>	
		</item>
		
		<item>
			<title>deephas &lt; = 1.0.7 - Prototype Pollution leading to Arbitrary Code Execution / DoS</title>
			<link>https://cxsecurity.com/issue/WLB-2026020005</link>
			<guid>WLB-2026020005</guid>
			<lastBuildDate>2026-02-02 21:14:04 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: deephas &lt; = 1.0.7 - Prototype Pollution leading to Arbitrary Code Execution / DoS Risk: High Text:#!/usr/bin/env python3  #  # Exploit Title: deephas &lt; = 1.0.7 - Prototype Pollution leading to Arbitrary Code Execution / DoS  #...</description>
			<pubDate>Mon, 02 Feb 2026 21:14:04 +0000</pubDate>	
		</item>
		
		<item>
			<title>LangChain Core - Serialization Injection to Jinja2 SSTI/RCE </title>
			<link>https://cxsecurity.com/issue/WLB-2026010017</link>
			<guid>WLB-2026010017</guid>
			<lastBuildDate>2026-01-26 19:48:43 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: LangChain Core - Serialization Injection to Jinja2 SSTI/RCE  Risk: High Text:# Exploit Title: LangChain Core - Serialization Injection to Jinja2 SSTI/RCE   # Date: 2025-12-29  # Exploit Author: Mohammed I...</description>
			<pubDate>Mon, 26 Jan 2026 19:48:43 +0000</pubDate>	
		</item>
		
		<item>
			<title>AVideo Notify.ffmpeg.json.php Unauthenticated Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026010010</link>
			<guid>WLB-2026010010</guid>
			<lastBuildDate>2026-01-18 21:49:23 CET</lastBuildDate>
			<dc:creator>Valentin</dc:creator>
			<description>Topic: AVideo Notify.ffmpeg.json.php Unauthenticated Remote Code Execution Risk: High Text:##  # This module requires Metasploit: https://metasploit.com/download  # Current source: https://github.com/rapid7/metasploit-...</description>
			<pubDate>Sun, 18 Jan 2026 21:49:23 +0000</pubDate>	
		</item>
		
		<item>
			<title>Birth Chart Compatibility WordPress Plugin 2.0 Full Path Disclosure</title>
			<link>https://cxsecurity.com/issue/WLB-2025120031</link>
			<guid>WLB-2025120031</guid>
			<lastBuildDate>2025-12-28 10:40:02 CET</lastBuildDate>
			<dc:creator>Byte Reaper</dc:creator>
			<description>Topic: Birth Chart Compatibility WordPress Plugin 2.0 Full Path Disclosure Risk: Low Text:/*   * Exploit Title : Birth Chart Compatibility WordPress Plugin 2.0 - Full Path Disclosure   * Author       : Byte Reaper   *...</description>
			<pubDate>Sun, 28 Dec 2025 10:40:02 +0000</pubDate>	
		</item>
		
		<item>
			<title>dotCMS 25.07.02-1 Authenticated Blind SQL Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2025120017</link>
			<guid>WLB-2025120017</guid>
			<lastBuildDate>2025-12-17 23:01:51 CET</lastBuildDate>
			<dc:creator>Matan Sandori</dc:creator>
			<description>Topic: dotCMS 25.07.02-1 Authenticated Blind SQL Injection Risk: Medium Text:#!/usr/bin/env python3    # Exploit Title: dotCMS 25.07.02-1 - Authenticated Blind SQL Injection  # Google Dork: N/A  # Date: 2...</description>
			<pubDate>Wed, 17 Dec 2025 23:01:51 +0000</pubDate>	
		</item>
		
		<item>
			<title>Mbed TLS 3.6.4 Use-After-Free</title>
			<link>https://cxsecurity.com/issue/WLB-2025120009</link>
			<guid>WLB-2025120009</guid>
			<lastBuildDate>2025-12-09 21:45:49 CET</lastBuildDate>
			<dc:creator>Byte Reaper</dc:creator>
			<description>Topic: Mbed TLS 3.6.4 Use-After-Free Risk: High Text:/*   * Exploit Title: Mbed TLS 3.6.4 - Use-After-Free   * Google Dork: N/A   * Date: 2025-08-29   * Exploit Author: Byte Reaper...</description>
			<pubDate>Tue, 09 Dec 2025 21:45:49 +0000</pubDate>	
		</item>
		
		<item>
			<title>MonstaFTP Unauthenticated File Upload</title>
			<link>https://cxsecurity.com/issue/WLB-2025120002</link>
			<guid>WLB-2025120002</guid>
			<lastBuildDate>2025-12-01 16:53:54 CET</lastBuildDate>
			<dc:creator>ibrahimsql</dc:creator>
			<description>Topic: MonstaFTP Unauthenticated File Upload Risk: Medium Text:# Titles: MonstaFTP Unauthenticated File Upload CVE-2025-34299  # Author: ibrahimsql  # Date: 11/21/2025  # Vendor: https://www...</description>
			<pubDate>Mon, 01 Dec 2025 16:53:54 +0000</pubDate>	
		</item>
		
		<item>
			<title>Flowise 3.0.4 Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2025110001</link>
			<guid>WLB-2025110001</guid>
			<lastBuildDate>2025-11-01 19:53:50 CET</lastBuildDate>
			<dc:creator>nltt0</dc:creator>
			<description>Topic: Flowise 3.0.4 Remote Code Execution Risk: High Text:# Exploit Title: Flowise 3.0.4 - Remote Code Execution (RCE)  # Date: 10/11/2025  # Exploit Author: [nltt0] (https://github.com...</description>
			<pubDate>Sat, 01 Nov 2025 19:53:49 +0000</pubDate>	
		</item>
		
		<item>
			<title>Swagger UI 1.0.3 Cross-Site Scripting (XSS)</title>
			<link>https://cxsecurity.com/issue/WLB-2025100015</link>
			<guid>WLB-2025100015</guid>
			<lastBuildDate>2025-10-29 20:23:08 CET</lastBuildDate>
			<dc:creator>ByteReaper0</dc:creator>
			<description>Topic: Swagger UI 1.0.3 Cross-Site Scripting (XSS) Risk: Low Text:/*   * Author       : Byte Reaper   * Telegram     : @ByteReaper0   * CVE          : CVE-2025-8191   * Title : Swagger UI 1.0.3...</description>
			<pubDate>Wed, 29 Oct 2025 20:23:07 +0000</pubDate>	
		</item>
		
		<item>
			<title>Vvveb CMS 1.0.5 Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2025100013</link>
			<guid>WLB-2025100013</guid>
			<lastBuildDate>2025-10-24 07:39:12 CET</lastBuildDate>
			<dc:creator>Maksim</dc:creator>
			<description>Topic: Vvveb CMS 1.0.5 Remote Code Execution Risk: High Text:##  # This module requires Metasploit: https://metasploit.com/download  # Current source: https://github.com/rapid7/metasploit-...</description>
			<pubDate>Fri, 24 Oct 2025 07:39:11 +0000</pubDate>	
		</item>
		
		<item>
			<title>SugarCRM unauthenticated Remote Code Execution (RCE)</title>
			<link>https://cxsecurity.com/issue/WLB-2025100006</link>
			<guid>WLB-2025100006</guid>
			<lastBuildDate>2025-10-07 21:08:12 CET</lastBuildDate>
			<dc:creator>DANG</dc:creator>
			<description>Topic: SugarCRM unauthenticated Remote Code Execution (RCE) Risk: High Text:# Exploit Title: SugarCRM unauthenticated Remote Code Execution (RCE)  # Exploit Author: DANG  # Vendor Homepage: https://www.s...</description>
			<pubDate>Tue, 07 Oct 2025 21:08:12 +0000</pubDate>	
		</item>
		
		<item>
			<title>Belkin F9K1009 F9K1010 2.00.04/2.00.09 Hard Coded Credentials</title>
			<link>https://cxsecurity.com/issue/WLB-2025090014</link>
			<guid>WLB-2025090014</guid>
			<lastBuildDate>2025-09-30 20:51:35 CET</lastBuildDate>
			<dc:creator>Byte</dc:creator>
			<description>Topic: Belkin F9K1009 F9K1010 2.00.04/2.00.09 Hard Coded Credentials Risk: High Text:/*   * Title           : Belkin F9K1009 F9K1010 2.00.04/2.00.09 - Hard Coded Credentials   * Author       : Byte Reaper   * CVE...</description>
			<pubDate>Tue, 30 Sep 2025 20:51:34 +0000</pubDate>	
		</item>
		
		<item>
			<title>Commvault CLI Argument Injection / Traversal / Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2025090011</link>
			<guid>WLB-2025090011</guid>
			<lastBuildDate>2025-09-21 17:30:38 CET</lastBuildDate>
			<dc:creator>Piotr Bazydlo</dc:creator>
			<description>Topic: Commvault CLI Argument Injection / Traversal / Remote Code Execution Risk: High Text:##  # This module requires Metasploit: https://metasploit.com/download  # Current source: https://github.com/rapid7/metasploit-...</description>
			<pubDate>Sun, 21 Sep 2025 17:30:38 +0000</pubDate>	
		</item>
		
		<item>
			<title>Sitecore XP Post-Authentication File Upload</title>
			<link>https://cxsecurity.com/issue/WLB-2025090008</link>
			<guid>WLB-2025090008</guid>
			<lastBuildDate>2025-09-14 16:43:46 CET</lastBuildDate>
			<dc:creator>Piotr Bazydlo</dc:creator>
			<description>Topic: Sitecore XP Post-Authentication File Upload Risk: High Text:##  # This module requires Metasploit: https://metasploit.com/download  # Current source: https://github.com/rapid7/metasploit-...</description>
			<pubDate>Sun, 14 Sep 2025 16:43:46 +0000</pubDate>	
		</item>
		
		<item>
			<title>Ultimate Member WordPress Plugin 2.6.6 Privilege Escalation</title>
			<link>https://cxsecurity.com/issue/WLB-2025080025</link>
			<guid>WLB-2025080025</guid>
			<lastBuildDate>2025-08-28 11:18:51 CET</lastBuildDate>
			<dc:creator>Gurjot Singh</dc:creator>
			<description>Topic: Ultimate Member WordPress Plugin 2.6.6 Privilege Escalation Risk: Medium Text:#!/usr/bin/env python3    # Exploit Title: Ultimate Member WordPress Plugin 2.6.6 - Privilege Escalation  # Exploit Author: Gur...</description>
			<pubDate>Thu, 28 Aug 2025 11:18:51 +0000</pubDate>	
		</item>
		
		<item>
			<title>Ghost CMS 5.59.1 Arbitrary File Read</title>
			<link>https://cxsecurity.com/issue/WLB-2025080024</link>
			<guid>WLB-2025080024</guid>
			<lastBuildDate>2025-08-28 11:18:21 CET</lastBuildDate>
			<dc:creator>ibrahimsql</dc:creator>
			<description>Topic: Ghost CMS 5.59.1 Arbitrary File Read Risk: Medium Text:#!/usr/bin/env python3  # -*- coding: utf-8 -*-  &quot;&quot;&quot;  # Exploit Title: Ghost CMS 5.59.1 - Arbitrary File Read  # Date: 2023-09-...</description>
			<pubDate>Thu, 28 Aug 2025 11:18:21 +0000</pubDate>	
		</item>
		
		<item>
			<title>DOS Baby POP3 Server 1.04</title>
			<link>https://cxsecurity.com/issue/WLB-2025080022</link>
			<guid>WLB-2025080022</guid>
			<lastBuildDate>2025-08-28 11:16:57 CET</lastBuildDate>
			<dc:creator>Érick Sousa</dc:creator>
			<description>Topic: DOS Baby POP3 Server 1.04 Risk: Medium Text:# Exploit Title: DOS Baby POP3 Server 1.04  # Date: 12/08/2025  # Exploit Author: Érick Sousa (https://www.linkedin.com/in/eri...</description>
			<pubDate>Thu, 28 Aug 2025 11:16:57 +0000</pubDate>	
		</item>
		
		<item>
			<title>Tenda AC20 16.03.08.12 Command Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2025080017</link>
			<guid>WLB-2025080017</guid>
			<lastBuildDate>2025-08-20 19:34:44 CET</lastBuildDate>
			<dc:creator></dc:creator>
			<description>Topic: Tenda AC20 16.03.08.12 Command Injection Risk: Medium Text:/*   * Exploit Title : Tenda AC20 16.03.08.12 - Command Injection   * Author       : Byte Reaper   * CVE          : CVE-2025-90...</description>
			<pubDate>Wed, 20 Aug 2025 19:34:42 +0000</pubDate>	
		</item>
		
		<item>
			<title>Projectworlds Online Admission System 1.0 SQL Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2025080011</link>
			<guid>WLB-2025080011</guid>
			<lastBuildDate>2025-08-11 20:53:04 CET</lastBuildDate>
			<dc:creator>Byte Reaper</dc:creator>
			<description>Topic: Projectworlds Online Admission System 1.0 SQL Injection Risk: Medium Text:/*   * Title           : projectworlds Online Admission System 1.0 - SQL Injection   * Author       : Byte Reaper   * CVE      ...</description>
			<pubDate>Mon, 11 Aug 2025 20:53:04 +0000</pubDate>	
		</item>
		
		<item>
			<title>JetBrains TeamCity 2023.11.4 Authentication Bypass</title>
			<link>https://cxsecurity.com/issue/WLB-2025080010</link>
			<guid>WLB-2025080010</guid>
			<lastBuildDate>2025-08-11 20:50:58 CET</lastBuildDate>
			<dc:creator>ibrahimsql (https://github.com/ibrahimsql)</dc:creator>
			<description>Topic: JetBrains TeamCity 2023.11.4 Authentication Bypass Risk: High Text:#!/usr/bin/env python3  # -*- coding: utf-8 -*-  &quot;&quot;&quot;  # Exploit Title: JetBrains TeamCity 2023.11.4 - Authentication Bypass  # ...</description>
			<pubDate>Mon, 11 Aug 2025 20:50:58 +0000</pubDate>	
		</item>
		
		<item>
			<title>Cisco ISE 3.0 Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2025080009</link>
			<guid>WLB-2025080009</guid>
			<lastBuildDate>2025-08-11 20:50:08 CET</lastBuildDate>
			<dc:creator>ibrahimsql</dc:creator>
			<description>Topic: Cisco ISE 3.0 Remote Code Execution Risk: High Text:# Exploit Title: Cisco ISE 3.0 - Remote Code Execution (RCE)  # Exploit Author: @ibrahimsql ibrahimsql.com  # Exploit Author&#039;s ...</description>
			<pubDate>Mon, 11 Aug 2025 20:50:08 +0000</pubDate>	
		</item>
		
		<item>
			<title>Pandora ITSM Authenticated Command Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2025080007</link>
			<guid>WLB-2025080007</guid>
			<lastBuildDate>2025-08-10 21:39:55 CET</lastBuildDate>
			<dc:creator>h00die-gr3y</dc:creator>
			<description>Topic: Pandora ITSM Authenticated Command Injection Risk: High Text:##  # This module requires Metasploit: https://metasploit.com/download  # Current source: https://github.com/rapid7/metasploit-...</description>
			<pubDate>Sun, 10 Aug 2025 21:39:55 +0000</pubDate>	
		</item>
		
		<item>
			<title>Shenzhen Aitemi M300 Wi-Fi Repeater Unauthenticated RCE</title>
			<link>https://cxsecurity.com/issue/WLB-2025080006</link>
			<guid>WLB-2025080006</guid>
			<lastBuildDate>2025-08-08 23:13:17 CET</lastBuildDate>
			<dc:creator>Anonymous</dc:creator>
			<description>Topic: Shenzhen Aitemi M300 Wi-Fi Repeater Unauthenticated RCE Risk: High Text:package main    import (  	&quot;flag&quot;  	&quot;fmt&quot;  	&quot;io&quot;  	&quot;net/http&quot;  	&quot;net/url&quot;  	&quot;os&quot;  	&quot;strings&quot;  )    /*  Shenzhen Aitemi M300 Wi-...</description>
			<pubDate>Fri, 08 Aug 2025 23:13:16 +0000</pubDate>	
		</item>
		
		<item>
			<title>Malicious XDG Desktop File</title>
			<link>https://cxsecurity.com/issue/WLB-2025080005</link>
			<guid>WLB-2025080005</guid>
			<lastBuildDate>2025-08-05 12:00:26 CET</lastBuildDate>
			<dc:creator>Brendan coles</dc:creator>
			<description>Topic: Malicious XDG Desktop File Risk: Medium Text:##  # This module requires Metasploit: https://metasploit.com/download  # Current source: https://github.com/rapid7/metasploit-...</description>
			<pubDate>Tue, 05 Aug 2025 12:00:26 +0000</pubDate>	
		</item>
		
		<item>
			<title>Langflow 1.2.x Remote Code Execution (RCE)</title>
			<link>https://cxsecurity.com/issue/WLB-2025080001</link>
			<guid>WLB-2025080001</guid>
			<lastBuildDate>2025-08-03 15:18:20 CET</lastBuildDate>
			<dc:creator>Raghad Abdallah Al-syouf</dc:creator>
			<description>Topic: Langflow 1.2.x Remote Code Execution (RCE) Risk: High Text:#!/usr/bin/env python3  # Exploit Title: Langflow 1.2.x - Remote Code Execution (RCE)  # Date: 2025-07-11  # Exploit Author: Ra...</description>
			<pubDate>Sun, 03 Aug 2025 15:18:19 +0000</pubDate>	
		</item>
		
		<item>
			<title>Microsoft Excel LTSC 2024 Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2025070040</link>
			<guid>WLB-2025070040</guid>
			<lastBuildDate>2025-07-31 15:32:12 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: Microsoft Excel LTSC 2024 Remote Code Execution Risk: High Text:# Titles: Microsoft Excel LTSC 2024 - Remote Code Execution (RCE)  # Author: nu11secur1ty  # Date: 06/16/2025  # Vendor: Micros...</description>
			<pubDate>Thu, 31 Jul 2025 15:32:12 +0000</pubDate>	
		</item>
		
		<item>
			<title>Adobe ColdFusion 2023.6 Remote File Read</title>
			<link>https://cxsecurity.com/issue/WLB-2025070036</link>
			<guid>WLB-2025070036</guid>
			<lastBuildDate>2025-07-28 21:37:58 CET</lastBuildDate>
			<dc:creator>@İbrahimsql</dc:creator>
			<description>Topic: Adobe ColdFusion 2023.6 Remote File Read Risk: High Text:# Exploit Title: Adobe ColdFusion 2023.6 - Remote File Read  # Exploit Author: @İbrahimsql  # Exploit Author&#039;s github: https:/...</description>
			<pubDate>Mon, 28 Jul 2025 21:37:58 +0000</pubDate>	
		</item>
		
		<item>
			<title>Malicious Windows Registration Entries (.reg) File</title>
			<link>https://cxsecurity.com/issue/WLB-2025070033</link>
			<guid>WLB-2025070033</guid>
			<lastBuildDate>2025-07-24 19:42:45 CET</lastBuildDate>
			<dc:creator>bcoles</dc:creator>
			<description>Topic: Malicious Windows Registration Entries (.reg) File Risk: Medium Text:##  # This module requires Metasploit: https://metasploit.com/download  # Current source: https://github.com/rapid7/metasploit-...</description>
			<pubDate>Thu, 24 Jul 2025 19:42:45 +0000</pubDate>	
		</item>
		
		<item>
			<title>Microsoft PowerPoint 2019 Remote Code Execution (RCE)</title>
			<link>https://cxsecurity.com/issue/WLB-2025070032</link>
			<guid>WLB-2025070032</guid>
			<lastBuildDate>2025-07-24 19:41:18 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Microsoft PowerPoint 2019 Remote Code Execution (RCE) Risk: High Text:#!/usr/bin/env python3  # Exploit Title: Microsoft PowerPoint 2019 - Remote Code Execution (RCE)  # Author: Mohammed Idrees Ban...</description>
			<pubDate>Thu, 24 Jul 2025 19:41:18 +0000</pubDate>	
		</item>
		
		<item>
			<title>Discourse 3.2.x Anonymous Cache Poisoning</title>
			<link>https://cxsecurity.com/issue/WLB-2025070012</link>
			<guid>WLB-2025070012</guid>
			<lastBuildDate>2025-07-11 21:16:20 CET</lastBuildDate>
			<dc:creator>ibrahimsql</dc:creator>
			<description>Topic: Discourse 3.2.x Anonymous Cache Poisoning Risk: Low Text:#!/usr/bin/env python3  &quot;&quot;&quot;  Exploit Title: Discourse 3.2.x - Anonymous Cache Poisoning  Date: 2024-10-15  Exploit Author: ibra...</description>
			<pubDate>Fri, 11 Jul 2025 21:16:20 +0000</pubDate>	
		</item>
		
		<item>
			<title>VBA Bypass Windows Defender Exploit PoC </title>
			<link>https://cxsecurity.com/issue/WLB-2025070006</link>
			<guid>WLB-2025070006</guid>
			<lastBuildDate>2025-07-02 11:12:26 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: VBA Bypass Windows Defender Exploit PoC  Risk: High Text:# CVE-2025-47170 Exploit PoC VBA Bypass Windows Defender  - Overview  This Python script is a proof-of-concept (PoC) exploit de...</description>
			<pubDate>Wed, 02 Jul 2025 11:12:26 +0000</pubDate>	
		</item>
		
		<item>
			<title>Social Warfare WordPress Plugin 3.5.2 Remote Code Execution (RCE)</title>
			<link>https://cxsecurity.com/issue/WLB-2025070002</link>
			<guid>WLB-2025070002</guid>
			<lastBuildDate>2025-07-01 18:43:33 CET</lastBuildDate>
			<dc:creator>Huseyin Mardini</dc:creator>
			<description>Topic: Social Warfare WordPress Plugin 3.5.2 Remote Code Execution (RCE) Risk: High Text:#!/usr/bin/env python3    # Exploit Title: Social Warfare WordPress Plugin 3.5.2 - Remote Code Execution (RCE)  # Date: 25-06-2...</description>
			<pubDate>Tue, 01 Jul 2025 18:43:33 +0000</pubDate>	
		</item>
		
		<item>
			<title>PHP CGI Module 8.3.4 Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2025070001</link>
			<guid>WLB-2025070001</guid>
			<lastBuildDate>2025-07-01 18:42:45 CET</lastBuildDate>
			<dc:creator>ibrahimsql</dc:creator>
			<description>Topic: PHP CGI Module 8.3.4 Remote Code Execution Risk: High Text:#!/usr/bin/env python3    # Exploit Title: PHP CGI Module 8.3.4 - Remote Code Execution (RCE)  # Date: 2025-06-13  # Exploit Au...</description>
			<pubDate>Tue, 01 Jul 2025 18:42:44 +0000</pubDate>	
		</item>
		
		<item>
			<title>Grandstream GSD3710 1.0.11.13 Stack Overflow</title>
			<link>https://cxsecurity.com/issue/WLB-2025060031</link>
			<guid>WLB-2025060031</guid>
			<lastBuildDate>2025-06-29 19:42:24 CET</lastBuildDate>
			<dc:creator>Pepelux</dc:creator>
			<description>Topic: Grandstream GSD3710 1.0.11.13 Stack Overflow Risk: Medium Text:#!/usr/bin/env python3    # Exploit Title:  Grandstream GSD3710 1.0.11.13 - Stack Overflow   # Date: 2025-05-29  # Exploit Auth...</description>
			<pubDate>Sun, 29 Jun 2025 19:42:24 +0000</pubDate>	
		</item>
		
		<item>
			<title>Parrot and DJI variants Drone OSes Kernel Panic Exploit</title>
			<link>https://cxsecurity.com/issue/WLB-2025060026</link>
			<guid>WLB-2025060026</guid>
			<lastBuildDate>2025-06-26 21:43:59 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Parrot and DJI variants Drone OSes Kernel Panic Exploit Risk: Low Text:#!/usr/bin/env python3  # Exploit Title: Parrot and DJI variants Drone OSes - Kernel Panic Exploit  # Author: Mohammed Idrees B...</description>
			<pubDate>Thu, 26 Jun 2025 21:43:59 +0000</pubDate>	
		</item>
		
</channel>
</rss>

