<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
	<title>Vulnerabilities Database - CXSecurity.com</title>
	<link>https://cxsecurity.com/wlb/</link>
	<description>Vulnerabilities Database - World Laboratory of Bugtraq 2 CXSecurity.com</description>
	<language>en-US</language>
	<lastBuildDate>Thu, 09 Apr 2026 20:34:42 +0000</lastBuildDate>
	<copyright>CXSecurity</copyright>
	<image>
		<title>CXSecurity: World Laboratory of Bugtraq 2</title>
		<link>https://cxsecurity.com/wlb/rss/vulnerabilities/</link>
		<url>https://cxsecurity.com/images/wlb/wlblogo.png</url>
		<description>Vulnerabilities Database - World Laboratory of Bugtraq 2 (WLB2)</description>
	</image>
	
		<item>
			<title>Linux Kernel mseal Invariant Violation (Linux kernel 6.17-7.0 rc5)</title>
			<link>https://cxsecurity.com/issue/WLB-2026040003</link>
			<guid>WLB-2026040003</guid>
			<lastBuildDate>2026-04-04 16:01:28 CET</lastBuildDate>
			<dc:creator>Antonius</dc:creator>
			<description>Topic: Linux Kernel mseal Invariant Violation (Linux kernel 6.17-7.0 rc5) Risk: High Text:Title : CVE-2026-23416 - Linux Kernel mseal Invariant Violation (Linux kernel 6.17-7.0 rc5)    Exploit Poc : https://github.com...</description>
			<pubDate>Sat, 04 Apr 2026 16:01:28 +0000</pubDate>	
		</item>
		
		<item>
			<title>astrojs/vercel &lt; = 10.0.0 - Unauthenticated x-astro-path Header Path Override</title>
			<link>https://cxsecurity.com/issue/WLB-2026040002</link>
			<guid>WLB-2026040002</guid>
			<lastBuildDate>2026-04-03 20:23:39 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: astrojs/vercel &lt; = 10.0.0 - Unauthenticated x-astro-path Header Path Override Risk: Medium Text:#!/usr/bin/env python3  # Exploit Title:        @astrojs/vercel &lt; = 10.0.0 - Unauthenticated x-astro-path Header Path Override  ...</description>
			<pubDate>Fri, 03 Apr 2026 20:23:39 +0000</pubDate>	
		</item>
		
		<item>
			<title>Microsoft SQL Server Privilege Elevation Through</title>
			<link>https://cxsecurity.com/issue/WLB-2026040001</link>
			<guid>WLB-2026040001</guid>
			<lastBuildDate>2026-04-03 20:23:17 CET</lastBuildDate>
			<dc:creator>Emad Al-Mousa</dc:creator>
			<description>Topic: Microsoft SQL Server Privilege Elevation Through Risk: Medium Text:Title: Microsoft SQL Server Privilege Elevation Through ##MS_DatabaseManager## Role [CVE-2025-24999]  Product: Database  Manufa...</description>
			<pubDate>Fri, 03 Apr 2026 20:23:17 +0000</pubDate>	
		</item>
		
		<item>
			<title>FreeScout Unauthenticated RCE via ZWSP .htaccess Bypass</title>
			<link>https://cxsecurity.com/issue/WLB-2026030038</link>
			<guid>WLB-2026030038</guid>
			<lastBuildDate>2026-03-31 19:40:02 CET</lastBuildDate>
			<dc:creator>offensiveee</dc:creator>
			<description>Topic: FreeScout Unauthenticated RCE via ZWSP .htaccess Bypass Risk: High Text:##  # This module requires Metasploit: https://metasploit.com/download  # Current source: https://github.com/rapid7/metasploit-...</description>
			<pubDate>Tue, 31 Mar 2026 19:40:02 +0000</pubDate>	
		</item>
		
		<item>
			<title>Wavlink WL-WN579X3-C firewall.cgi UPNP Stack-based Buffer Overflow</title>
			<link>https://cxsecurity.com/issue/WLB-2026030037</link>
			<guid>WLB-2026030037</guid>
			<lastBuildDate>2026-03-31 19:38:49 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Wavlink WL-WN579X3-C firewall.cgi UPNP Stack-based Buffer Overflow Risk: Medium Text:# Exploit Title: Wavlink WL-WN579X3-C firewall.cgi UPNP Stack-based Buffer Overflow  # CVE: CVE-2026-5004  # Date: 2026-03-29  ...</description>
			<pubDate>Tue, 31 Mar 2026 19:38:48 +0000</pubDate>	
		</item>
		
		<item>
			<title>esiclivre 0.2.2 SQL Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2026030036</link>
			<guid>WLB-2026030036</guid>
			<lastBuildDate>2026-03-26 08:58:54 CET</lastBuildDate>
			<dc:creator>Bryan</dc:creator>
			<description>Topic: esiclivre 0.2.2 SQL Injection Risk: Medium Text:# CVE-2026-30655 — SQL Injection in esiclivre (password reset)    ## Summary  A SQL injection vulnerability exists in the pas...</description>
			<pubDate>Thu, 26 Mar 2026 08:58:54 +0000</pubDate>	
		</item>
		
		<item>
			<title>Payara Server Cross Site Scripting</title>
			<link>https://cxsecurity.com/issue/WLB-2026030035</link>
			<guid>WLB-2026030035</guid>
			<lastBuildDate>2026-03-26 08:56:48 CET</lastBuildDate>
			<dc:creator>DeepSecurity Research</dc:creator>
			<description>Topic: Payara Server Cross Site Scripting Risk: Low Text:# XSS to Admin account takeover (CVE-2025-14340)    A Cross-Site Scripting vulnerability in Payara’s Administration Rest Inte...</description>
			<pubDate>Thu, 26 Mar 2026 08:56:48 +0000</pubDate>	
		</item>
		
		<item>
			<title>esiclivre 0.2.2 SQL Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2026030034</link>
			<guid>WLB-2026030034</guid>
			<lastBuildDate>2026-03-26 08:55:51 CET</lastBuildDate>
			<dc:creator>Bryan</dc:creator>
			<description>Topic: esiclivre 0.2.2 SQL Injection Risk: Medium Text:# CVE-2026-30655 — SQL Injection in esiclivre (password reset)    ## Summary  A SQL injection vulnerability exists in the pas...</description>
			<pubDate>Thu, 26 Mar 2026 08:55:51 +0000</pubDate>	
		</item>
		
		<item>
			<title>SiYuan &lt; = v3.6.1 Note unauthenticated arbitrary file read (path traversal)</title>
			<link>https://cxsecurity.com/issue/WLB-2026030033</link>
			<guid>WLB-2026030033</guid>
			<lastBuildDate>2026-03-26 08:55:06 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: SiYuan &lt; = v3.6.1 Note unauthenticated arbitrary file read (path traversal) Risk: Medium Text:#!/usr/bin/env python3  # Exploit Title: SiYuan &lt; = v3.6.1 Note unauthenticated arbitrary file read (path traversal)  # CVE: CVE...</description>
			<pubDate>Thu, 26 Mar 2026 08:55:06 +0000</pubDate>	
		</item>
		
		<item>
			<title>Tenda AC21 V1.0 V16.03.08.16 - Stack Buffer Overflow in SetNetControlList</title>
			<link>https://cxsecurity.com/issue/WLB-2026030032</link>
			<guid>WLB-2026030032</guid>
			<lastBuildDate>2026-03-26 08:54:45 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Tenda AC21 V1.0 V16.03.08.16 - Stack Buffer Overflow in SetNetControlList Risk: High Text:#!/usr/bin/env python3  # Exploit Title: Tenda AC21 - Stack Buffer Overflow in SetNetControlList  # CVE: CVE-2026-4565  # Date:...</description>
			<pubDate>Thu, 26 Mar 2026 08:54:45 +0000</pubDate>	
		</item>
		
		<item>
			<title>WWBN AVideo &lt; = 26.0 - Authenticated SQL Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2026030031</link>
			<guid>WLB-2026030031</guid>
			<lastBuildDate>2026-03-26 08:54:07 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: WWBN AVideo &lt; = 26.0 - Authenticated SQL Injection Risk: Medium Text:Exploit Title: WWBN AVideo &lt; = 26.0 - Authenticated SQL Injection  CVE: CVE-2026-33723  Date: 2026-03-25  Exploit Author: Mohamm...</description>
			<pubDate>Thu, 26 Mar 2026 08:54:07 +0000</pubDate>	
		</item>
		
		<item>
			<title>Windows RRAS Remote Code Execution Vulnerability (CVE-2026-26111) - SE-RCE Exploit</title>
			<link>https://cxsecurity.com/issue/WLB-2026030030</link>
			<guid>WLB-2026030030</guid>
			<lastBuildDate>2026-03-21 22:02:08 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: Windows RRAS Remote Code Execution Vulnerability (CVE-2026-26111) - SE-RCE Exploit Risk: High Text:# Titles: Windows RRAS Remote Code Execution Vulnerability (CVE-2026-26111) - SE-RCE Exploit  # Author: nu11secur1ty  # Date: 1...</description>
			<pubDate>Sat, 21 Mar 2026 22:02:08 +0000</pubDate>	
		</item>
		
		<item>
			<title>Linux Kernel 5.8 &lt;  5.15.25 - Local Privilege Escalation  Exploit</title>
			<link>https://cxsecurity.com/issue/WLB-2026030029</link>
			<guid>WLB-2026030029</guid>
			<lastBuildDate>2026-03-21 22:01:47 CET</lastBuildDate>
			<dc:creator>Antonius</dc:creator>
			<description>Topic: Linux Kernel 5.8 &lt;  5.15.25 - Local Privilege Escalation  Exploit Risk: High Text:/*  Exploit Title: Linux Kernel 5.8 &lt;  5.15.25 - Local Privilege Escalation (DirtyPipe 2)  Exploit Author: Antonius (w1sdom)  gi...</description>
			<pubDate>Sat, 21 Mar 2026 22:01:47 +0000</pubDate>	
		</item>
		
		<item>
			<title>Discourse &lt; = 2026.2.1 Authenticated Missing Authorization</title>
			<link>https://cxsecurity.com/issue/WLB-2026030028</link>
			<guid>WLB-2026030028</guid>
			<lastBuildDate>2026-03-21 22:01:37 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Discourse &lt; = 2026.2.1 Authenticated Missing Authorization Risk: Medium Text:#!/usr/bin/env python3  # Exploit Title: Discourse &lt; = 2026.2.1 Authenticated Missing Authorization (Official Warnings Bypass)  ...</description>
			<pubDate>Sat, 21 Mar 2026 22:01:36 +0000</pubDate>	
		</item>
		
		<item>
			<title>Glances &lt; = 4.5.2  OS Command Injection via Mustache Template Fields</title>
			<link>https://cxsecurity.com/issue/WLB-2026030026</link>
			<guid>WLB-2026030026</guid>
			<lastBuildDate>2026-03-18 21:17:23 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Glances &lt; = 4.5.2  OS Command Injection via Mustache Template Fields Risk: High Text:#!/usr/bin/env python3  # Exploit Title:        Glances &lt; = 4.5.2  OS Command Injection via Mustache Template Fields  # CVE:    ...</description>
			<pubDate>Wed, 18 Mar 2026 21:17:22 +0000</pubDate>	
		</item>
		
		<item>
			<title>LB-LINK BL-WR9000 V2.4.9 - Stack-based Buffer Overflow in /goform/get_hidessid_cfg</title>
			<link>https://cxsecurity.com/issue/WLB-2026030025</link>
			<guid>WLB-2026030025</guid>
			<lastBuildDate>2026-03-17 22:04:23 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: LB-LINK BL-WR9000 V2.4.9 - Stack-based Buffer Overflow in /goform/get_hidessid_cfg Risk: High Text:#!/usr/bin/env python3  # Exploit Title:        LB-LINK BL-WR9000 HideSSID Stack Overflow  # CVE:                   CVE-2026-42...</description>
			<pubDate>Tue, 17 Mar 2026 22:04:23 +0000</pubDate>	
		</item>
		
		<item>
			<title>LB-LINK BL-WR9000 V2.4.9 - Unauthenticated / Post-Auth Stack-based Buffer Overflow</title>
			<link>https://cxsecurity.com/issue/WLB-2026030024</link>
			<guid>WLB-2026030024</guid>
			<lastBuildDate>2026-03-17 22:04:08 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: LB-LINK BL-WR9000 V2.4.9 - Unauthenticated / Post-Auth Stack-based Buffer Overflow Risk: High Text:#!/usr/bin/env python3  # Exploit Title:        LB-LINK BL-WR9000 - Stack-based Buffer Overflow in /goform/get_virtual_cfg  # C...</description>
			<pubDate>Tue, 17 Mar 2026 22:04:07 +0000</pubDate>	
		</item>
		
		<item>
			<title>zumba/json-serializer zumba/json-serializer &lt;  3.2.3 RCE</title>
			<link>https://cxsecurity.com/issue/WLB-2026030023</link>
			<guid>WLB-2026030023</guid>
			<lastBuildDate>2026-03-15 16:26:34 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: zumba/json-serializer zumba/json-serializer &lt;  3.2.3 RCE Risk: High Text:#!/usr/bin/env python3  # Exploit Title: zumba/json-serializer zumba/json-serializer &lt;  3.2.3 RCE  # CVE: CVE-2026-27206  # Date...</description>
			<pubDate>Sun, 15 Mar 2026 16:26:34 +0000</pubDate>	
		</item>
		
		<item>
			<title>Wekan 8.31.0 - 8.33Meteor DDP notificationUsers Sensitive Data Leak</title>
			<link>https://cxsecurity.com/issue/WLB-2026030022</link>
			<guid>WLB-2026030022</guid>
			<lastBuildDate>2026-03-15 16:25:36 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Wekan 8.31.0 - 8.33Meteor DDP notificationUsers Sensitive Data Leak Risk: Medium Text:#!/usr/bin/env python3  # Exploit Title:         Wekan 8.31.0 - 8.33Meteor DDP notificationUsers Sensitive Data Leak  # CVE:   ...</description>
			<pubDate>Sun, 15 Mar 2026 16:25:36 +0000</pubDate>	
		</item>
		
		<item>
			<title>Splunk Remote Command Execution via Improper Input Validation</title>
			<link>https://cxsecurity.com/issue/WLB-2026030021</link>
			<guid>WLB-2026030021</guid>
			<lastBuildDate>2026-03-15 16:25:07 CET</lastBuildDate>
			<dc:creator>RERO</dc:creator>
			<description>Topic: Splunk Remote Command Execution via Improper Input Validation Risk: Low Text:Description    A critical Remote Command Execution (RCE) vulnerability has been identified in the Splunk platform.  The vulnera...</description>
			<pubDate>Sun, 15 Mar 2026 16:25:07 +0000</pubDate>	
		</item>
		
		<item>
			<title>Microsoft Windows MSHTML Security Feature Bypass Vulnerability</title>
			<link>https://cxsecurity.com/issue/WLB-2026030020</link>
			<guid>WLB-2026030020</guid>
			<lastBuildDate>2026-03-14 22:35:32 CET</lastBuildDate>
			<dc:creator>RERO</dc:creator>
			<description>Topic: Microsoft Windows MSHTML Security Feature Bypass Vulnerability Risk: High Text:A security feature bypass vulnerability exists in the Microsoft MSHTML engine used by legacy Internet Explorer components and a...</description>
			<pubDate>Sat, 14 Mar 2026 22:35:32 +0000</pubDate>	
		</item>
		
		<item>
			<title>Qualcomm GPU Driver Memory Corruption Vulnerability in Android Devices</title>
			<link>https://cxsecurity.com/issue/WLB-2026030019</link>
			<guid>WLB-2026030019</guid>
			<lastBuildDate>2026-03-14 22:35:11 CET</lastBuildDate>
			<dc:creator>RERO</dc:creator>
			<description>Topic: Qualcomm GPU Driver Memory Corruption Vulnerability in Android Devices Risk: High Text:A memory corruption vulnerability has been identified in Qualcomm GPU drivers used in a wide range of Android devices. The vuln...</description>
			<pubDate>Sat, 14 Mar 2026 22:35:11 +0000</pubDate>	
		</item>
		
		<item>
			<title>Frappe Framework &lt; 14.99.0 and &lt; 15.84.0 Unauthenticated SQL Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2026030018</link>
			<guid>WLB-2026030018</guid>
			<lastBuildDate>2026-03-14 22:34:17 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Frappe Framework &lt; 14.99.0 and &lt; 15.84.0 Unauthenticated SQL Injection Risk: Medium Text:#!/usr/bin/env python3  # Exploit Title: Frappe Framework Unauthenticated SQL Injection  # CVE: CVE-2026-31877  # Date: 2026-03...</description>
			<pubDate>Sat, 14 Mar 2026 22:34:17 +0000</pubDate>	
		</item>
		
		<item>
			<title>PyJWT &lt;  2.12.0 crit header bypass / Insufficient crit validation</title>
			<link>https://cxsecurity.com/issue/WLB-2026030017</link>
			<guid>WLB-2026030017</guid>
			<lastBuildDate>2026-03-14 22:33:56 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: PyJWT &lt;  2.12.0 crit header bypass / Insufficient crit validation Risk: Low Text:#!/usr/bin/env python3  # Exploit Title: PyJWT &lt;  2.12.0 crit header bypass / Insufficient crit validation  # CVE: CVE-2026-3259...</description>
			<pubDate>Sat, 14 Mar 2026 22:33:56 +0000</pubDate>	
		</item>
		
		<item>
			<title>PluckCMS 4.7.10 Unrestricted File Upload</title>
			<link>https://cxsecurity.com/issue/WLB-2026030016</link>
			<guid>WLB-2026030016</guid>
			<lastBuildDate>2026-03-08 15:40:55 CET</lastBuildDate>
			<dc:creator>CodeSecLab</dc:creator>
			<description>Topic: PluckCMS 4.7.10 Unrestricted File Upload Risk: High Text:# Exploit Title: PluckCMS 4.7.10 - Unrestricted File Upload  # Date: 2025-11-25  # Exploit Author: CodeSecLab  # Vendor Homepag...</description>
			<pubDate>Sun, 08 Mar 2026 15:40:55 +0000</pubDate>	
		</item>
		
		<item>
			<title>Python-Multipart &lt; 0.0.22 - Path Traversal / Arbitrary File Write (CVE-2026-24486)</title>
			<link>https://cxsecurity.com/issue/WLB-2026030015</link>
			<guid>WLB-2026030015</guid>
			<lastBuildDate>2026-03-08 15:40:16 CET</lastBuildDate>
			<dc:creator>cardosource</dc:creator>
			<description>Topic: Python-Multipart &lt; 0.0.22 - Path Traversal / Arbitrary File Write (CVE-2026-24486) Risk: High Text:Exploit Title: Python-Multipart &lt; 0.0.22 - Path Traversal / Arbitrary File Write  Date: 2026-02-23  Exploit Author: cardosource ...</description>
			<pubDate>Sun, 08 Mar 2026 15:40:16 +0000</pubDate>	
		</item>
		
		<item>
			<title>WeGIA &lt; = 3.6.4 Unauthenticated Admin Authentication Bypass</title>
			<link>https://cxsecurity.com/issue/WLB-2026030014</link>
			<guid>WLB-2026030014</guid>
			<lastBuildDate>2026-03-08 15:39:38 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: WeGIA &lt; = 3.6.4 Unauthenticated Admin Authentication Bypass Risk: High Text:#!/usr/bin/env python3  # Exploit Title: WeGIA &lt; = 3.6.4 Authentication Bypass to Admin Session  # CVE: CVE-2026-28411  # Date: ...</description>
			<pubDate>Sun, 08 Mar 2026 15:39:38 +0000</pubDate>	
		</item>
		
		<item>
			<title>NocoDB &lt; = 0.301.2 User Enumeration via Password Reset Endpoint</title>
			<link>https://cxsecurity.com/issue/WLB-2026030013</link>
			<guid>WLB-2026030013</guid>
			<lastBuildDate>2026-03-08 15:39:04 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: NocoDB &lt; = 0.301.2 User Enumeration via Password Reset Endpoint Risk: High Text:#!/usr/bin/env python3  # Exploit Title:        NocoDB User Enumeration via Password Reset Endpoint  # CVE:                  CV...</description>
			<pubDate>Sun, 08 Mar 2026 15:39:04 +0000</pubDate>	
		</item>
		
		<item>
			<title>Craft CMS 4.x &amp; 5.x  RCE via Blocklist Bypass</title>
			<link>https://cxsecurity.com/issue/WLB-2026030012</link>
			<guid>WLB-2026030012</guid>
			<lastBuildDate>2026-03-08 15:38:51 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Craft CMS 4.x &amp; 5.x  RCE via Blocklist Bypass Risk: Medium Text:#!/usr/bin/env python3  # Exploit Title: Craft CMS 4.x &amp; 5.x  RCE via Blocklist Bypass  # CVE: CVE-2026-28783  # Date: 2025-11-...</description>
			<pubDate>Sun, 08 Mar 2026 15:38:51 +0000</pubDate>	
		</item>
		
		<item>
			<title>pac4j-jwt &lt;  4.5.9, &lt;  5.7.9, &lt;  6.3.3 JwtAuthenticator Authentication Bypass via JWE-wrapped PlainJWT</title>
			<link>https://cxsecurity.com/issue/WLB-2026030011</link>
			<guid>WLB-2026030011</guid>
			<lastBuildDate>2026-03-08 15:38:37 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: pac4j-jwt &lt;  4.5.9, &lt;  5.7.9, &lt;  6.3.3 JwtAuthenticator Authentication Bypass via JWE-wrapped PlainJWT Risk: High Text:#!/usr/bin/env python3  # Exploit Title: pac4j-jwt &lt;  4.5.9, &lt;  5.7.9, &lt;  6.3.3 JwtAuthenticator Authentication Bypass via JWE-wra...</description>
			<pubDate>Sun, 08 Mar 2026 15:38:36 +0000</pubDate>	
		</item>
		
		<item>
			<title>AirPlay Dual‑Mode Discovery Scanner for Flipper Zero ESP32 WiFi Dev Board</title>
			<link>https://cxsecurity.com/issue/WLB-2026030010</link>
			<guid>WLB-2026030010</guid>
			<lastBuildDate>2026-03-08 15:38:08 CET</lastBuildDate>
			<dc:creator>indoushka</dc:creator>
			<description>Topic: AirPlay Dual‑Mode Discovery Scanner for Flipper Zero ESP32 WiFi Dev Board Risk: Medium Text:                                                 | # Title     : AirPlay Dual‑Mode Discovery Scanner for Flipper Zero ESP32 W...</description>
			<pubDate>Sun, 08 Mar 2026 15:38:07 +0000</pubDate>	
		</item>
		
		<item>
			<title>WeGIA &lt; = 3.6.4 Remote Code Execution via OS Command Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2026030009</link>
			<guid>WLB-2026030009</guid>
			<lastBuildDate>2026-03-03 20:45:02 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: WeGIA &lt; = 3.6.4 Remote Code Execution via OS Command Injection Risk: High Text:#!/usr/bin/env python3  # Exploit Title: WeGIA &lt; = 3.6.4 Remote Code Execution via OS Command Injection in Backup Restore  # CVE...</description>
			<pubDate>Tue, 03 Mar 2026 20:45:02 +0000</pubDate>	
		</item>
		
		<item>
			<title>WordPress Backup Migration 1.3.7 Remote Command Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026030008</link>
			<guid>WLB-2026030008</guid>
			<lastBuildDate>2026-03-03 20:44:40 CET</lastBuildDate>
			<dc:creator>DANG</dc:creator>
			<description>Topic: WordPress Backup Migration 1.3.7 Remote Command Execution Risk: High Text:# Exploit Title: WordPress Backup Migration 1.3.7 - Remote Command Execution  # Date: 2025-10-26  # Exploit Author: DANG  # Ven...</description>
			<pubDate>Tue, 03 Mar 2026 20:44:40 +0000</pubDate>	
		</item>
		
		<item>
			<title>WeGIA 3.5.0 SQL Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2026030007</link>
			<guid>WLB-2026030007</guid>
			<lastBuildDate>2026-03-03 20:44:32 CET</lastBuildDate>
			<dc:creator>Onur Demir</dc:creator>
			<description>Topic: WeGIA 3.5.0 SQL Injection Risk: Medium Text:# Exploit Title: WeGIA 3.5.0 - SQL Injection  # Date: 2025-10-14  # Exploit Author: Onur Demir (OnurDemir-Dev)  # Vendor Homepa...</description>
			<pubDate>Tue, 03 Mar 2026 20:44:31 +0000</pubDate>	
		</item>
		
		<item>
			<title>Windows Notepad App (Store Version) - Remote/Local Code Execution via Markdown Link</title>
			<link>https://cxsecurity.com/issue/WLB-2026030006</link>
			<guid>WLB-2026030006</guid>
			<lastBuildDate>2026-03-02 21:13:06 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: Windows Notepad App (Store Version) - Remote/Local Code Execution via Markdown Link Risk: Medium Text:# Exploit Title: Windows Notepad App (Store Version) - Remote/Local Code Execution via Markdown Link  # Date: 2026-02-26  # Exp...</description>
			<pubDate>Mon, 02 Mar 2026 21:13:06 +0000</pubDate>	
		</item>
		
		<item>
			<title>MaxSite CMS &lt; = 109.1 unauthenticated RCE via run_php plugin</title>
			<link>https://cxsecurity.com/issue/WLB-2026030005</link>
			<guid>WLB-2026030005</guid>
			<lastBuildDate>2026-03-02 21:12:44 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: MaxSite CMS &lt; = 109.1 unauthenticated RCE via run_php plugin Risk: High Text:#!/usr/bin/env python3  # Exploit Title: MaxSite CMS &lt; = 109.1 unauthenticated RCE via run_php plugin  # CVE: CVE-2026-3395  # D...</description>
			<pubDate>Mon, 02 Mar 2026 21:12:44 +0000</pubDate>	
		</item>
		
		<item>
			<title>Statamic CMS &lt;  5.73.11 &amp; &lt;  6.4.0 Stored XSS via SVG Upload Leading to Privilege Escalation</title>
			<link>https://cxsecurity.com/issue/WLB-2026030003</link>
			<guid>WLB-2026030003</guid>
			<lastBuildDate>2026-03-02 21:11:32 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Statamic CMS &lt;  5.73.11 &amp; &lt;  6.4.0 Stored XSS via SVG Upload Leading to Privilege Escalation Risk: Low Text:#!/usr/bin/env python3  # Exploit Title: Statamic CMS Stored XSS via SVG Upload  # CVE: CVE-2026-28426  # Date: 2026-02-28  # E...</description>
			<pubDate>Mon, 02 Mar 2026 21:11:32 +0000</pubDate>	
		</item>
		
		<item>
			<title>OpenStack Vitrage &lt;  12.0.1 / 13.0.1 Eval Injection Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026030002</link>
			<guid>WLB-2026030002</guid>
			<lastBuildDate>2026-03-02 21:11:25 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: OpenStack Vitrage &lt;  12.0.1 / 13.0.1 Eval Injection Remote Code Execution Risk: High Text:#!/usr/bin/env python3  # Exploit Title: OpenStack Vitrage &lt;  12.0.1 / 13.0.1 Eval Injection Remote Code Execution  # CVE: CVE-2...</description>
			<pubDate>Mon, 02 Mar 2026 21:11:25 +0000</pubDate>	
		</item>
		
		<item>
			<title>Tenda F453 v1.0.0.3 frmL7ImForm Buffer Overflow </title>
			<link>https://cxsecurity.com/issue/WLB-2026030001</link>
			<guid>WLB-2026030001</guid>
			<lastBuildDate>2026-03-02 21:11:16 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Tenda F453 v1.0.0.3 frmL7ImForm Buffer Overflow  Risk: Low Text:#!/usr/bin/env python3  # Exploit Title:        Tenda F453 frmL7ImForm Buffer Overflow  # CVE:                  CVE-2026-3380  ...</description>
			<pubDate>Mon, 02 Mar 2026 21:11:15 +0000</pubDate>	
		</item>
		
		<item>
			<title>Icinga for Windows 1.13.3 - &#039;key_maker.py&#039; Incorrect Default Permissions Private Key Exposure</title>
			<link>https://cxsecurity.com/issue/WLB-2026020033</link>
			<guid>WLB-2026020033</guid>
			<lastBuildDate>2026-02-26 18:38:53 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: Icinga for Windows 1.13.3 - &#039;key_maker.py&#039; Incorrect Default Permissions Private Key Exposure Risk: High Text:# Exploit Title: Icinga for Windows 1.13.3 - &#039;key_maker.py&#039; Incorrect Default Permissions Private Key Exposure  # Date: 2026-02...</description>
			<pubDate>Thu, 26 Feb 2026 18:38:53 +0000</pubDate>	
		</item>
		
</channel>
</rss>

