<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
	<title>Vulnerabilities Database - CXSecurity.com</title>
	<link>https://cxsecurity.com/wlb/</link>
	<description>Vulnerabilities Database - World Laboratory of Bugtraq 2 CXSecurity.com</description>
	<language>en-US</language>
	<lastBuildDate>Sun, 24 May 2026 13:59:03 +0000</lastBuildDate>
	<copyright>CXSecurity</copyright>
	<image>
		<title>CXSecurity: World Laboratory of Bugtraq 2</title>
		<link>https://cxsecurity.com/wlb/rss/vulnerabilities/</link>
		<url>https://cxsecurity.com/images/wlb/wlblogo.png</url>
		<description>Vulnerabilities Database - World Laboratory of Bugtraq 2 (WLB2)</description>
	</image>
	
		<item>
			<title>Frigate NVR 0.16.3 Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026050020</link>
			<guid>WLB-2026050020</guid>
			<lastBuildDate>2026-05-23 05:00:22 CET</lastBuildDate>
			<dc:creator>jduardo2704</dc:creator>
			<description>Topic: Frigate NVR 0.16.3 Remote Code Execution Risk: High Text:# Exploit Title: Frigate NVR 0.16.3 - Remote Code Execution   # Date: 2026-02-05  # Exploit Author: jduardo2704  # Vendor Homep...</description>
			<pubDate>Sat, 23 May 2026 05:00:22 +0000</pubDate>	
		</item>
		
		<item>
			<title>Linux nf_tables 6.19.3 Local Privilege Escalation</title>
			<link>https://cxsecurity.com/issue/WLB-2026050019</link>
			<guid>WLB-2026050019</guid>
			<lastBuildDate>2026-05-23 05:00:13 CET</lastBuildDate>
			<dc:creator>Aviral Srivastava</dc:creator>
			<description>Topic: Linux nf_tables 6.19.3 Local Privilege Escalation Risk: Medium Text: * Exploit Title:  Linux Kernel 3.16 – 6.19.3 nf_tables RCU UAF LPE   * CVE:            CVE-2026-23231   * Date:           20...</description>
			<pubDate>Sat, 23 May 2026 05:00:13 +0000</pubDate>	
		</item>
		
		<item>
			<title>ThingsBoard IoT Platform 4.2.0 Server-Side Request Forgery (SSRF)</title>
			<link>https://cxsecurity.com/issue/WLB-2026050018</link>
			<guid>WLB-2026050018</guid>
			<lastBuildDate>2026-05-23 04:59:56 CET</lastBuildDate>
			<dc:creator>Tamil Mathi T.</dc:creator>
			<description>Topic: ThingsBoard IoT Platform 4.2.0 Server-Side Request Forgery (SSRF) Risk: Low Text:# Exploit Title: ThingsBoard IoT Platform 4.2.0 - Server-Side Request Forgery (SSRF)   # Date: 2026-03-25  # Exploit Author: Ta...</description>
			<pubDate>Sat, 23 May 2026 04:59:56 +0000</pubDate>	
		</item>
		
		<item>
			<title>Linux Kernel Local Privilege Escalation (CVE-2026-43284 / CVE-2026-43500 / CVE-2026-46300)</title>
			<link>https://cxsecurity.com/issue/WLB-2026050017</link>
			<guid>WLB-2026050017</guid>
			<lastBuildDate>2026-05-23 04:59:49 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: Linux Kernel Local Privilege Escalation (CVE-2026-43284 / CVE-2026-43500 / CVE-2026-46300) Risk: Medium Text:# Titles:** Linux Kernel Local Privilege Escalation (CVE-2026-43284 / CVE-2026-43500 / CVE-2026-46300)  # Author:** nu11secur1t...</description>
			<pubDate>Sat, 23 May 2026 04:59:49 +0000</pubDate>	
		</item>
		
		<item>
			<title>SUSE Manager 4.3.15 Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026050016</link>
			<guid>WLB-2026050016</guid>
			<lastBuildDate>2026-05-23 04:59:19 CET</lastBuildDate>
			<dc:creator>Wiktor Maj</dc:creator>
			<description>Topic: SUSE Manager 4.3.15 Code Execution Risk: High Text:# Exploit Title: SUSE Manager 4.3.15 - Code Execution  # Date: 29.01.2026  # Exploit Author: Wiktor Maj  # Vendor Homepage: htt...</description>
			<pubDate>Sat, 23 May 2026 04:59:19 +0000</pubDate>	
		</item>
		
		<item>
			<title>Apache HertzBeat 1.8.0 Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026050015</link>
			<guid>WLB-2026050015</guid>
			<lastBuildDate>2026-05-19 21:17:49 CET</lastBuildDate>
			<dc:creator>Brett Gervasoni</dc:creator>
			<description>Topic: Apache HertzBeat 1.8.0 Remote Code Execution Risk: High Text:# Exploit Title: Apache HertzBeat 1.8.0 - Remote Code Execution   # Google Dork: N/A  # Date: 2026-03-09  # Exploit Author: Bre...</description>
			<pubDate>Tue, 19 May 2026 21:17:49 +0000</pubDate>	
		</item>
		
		<item>
			<title>JuzaWeb CMS 3.4.2 Authenticated Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026050014</link>
			<guid>WLB-2026050014</guid>
			<lastBuildDate>2026-05-19 21:17:25 CET</lastBuildDate>
			<dc:creator>Sardor Shoakbarov</dc:creator>
			<description>Topic: JuzaWeb CMS 3.4.2 Authenticated Remote Code Execution Risk: High Text:# Exploit Title: JuzaWeb CMS 3.4.2 - Authenticated Remote Code Execution  # Date: 2026-01-10  # Exploit Author: Sardor Shoakbar...</description>
			<pubDate>Tue, 19 May 2026 21:17:25 +0000</pubDate>	
		</item>
		
		<item>
			<title>GUnet OpenEclass E-learning platform &lt;  4.2 Remote Code Execution (RCE)</title>
			<link>https://cxsecurity.com/issue/WLB-2026050012</link>
			<guid>WLB-2026050012</guid>
			<lastBuildDate>2026-05-19 21:16:06 CET</lastBuildDate>
			<dc:creator>Ashif Iqubal</dc:creator>
			<description>Topic: GUnet OpenEclass E-learning platform &lt;  4.2 Remote Code Execution (RCE) Risk: High Text:# Exploit Title: GUnet OpenEclass E-learning platform &lt;  4.2 - Remote Code Execution (RCE)   # Date: 2026-01-08  # Exploit Autho...</description>
			<pubDate>Tue, 19 May 2026 21:16:06 +0000</pubDate>	
		</item>
		
		<item>
			<title>Windows Snipping Tool NTLMv2 Hash Hijack</title>
			<link>https://cxsecurity.com/issue/WLB-2026050011</link>
			<guid>WLB-2026050011</guid>
			<lastBuildDate>2026-05-19 21:15:57 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: Windows Snipping Tool NTLMv2 Hash Hijack Risk: Medium Text:# Exploit Title:  Windows Snipping Tool -  NTLMv2 Hash Hijack  # Date: 2026-04-22  # Exploit Author: nu11secur1ty  # Video Demo...</description>
			<pubDate>Tue, 19 May 2026 21:15:57 +0000</pubDate>	
		</item>
		
		<item>
			<title>telnetd 2.7 Buffer Overflow</title>
			<link>https://cxsecurity.com/issue/WLB-2026050010</link>
			<guid>WLB-2026050010</guid>
			<lastBuildDate>2026-05-13 19:41:02 CET</lastBuildDate>
			<dc:creator>Jeff Barron</dc:creator>
			<description>Topic: telnetd 2.7 Buffer Overflow Risk: High Text:# Exploit Title: telnetd 2.7 - Buffer Overflow  # Google Dork: N/A  # Date: 2026-04-03  # Exploit Author: Jeff Barron (jeffaf) ...</description>
			<pubDate>Wed, 13 May 2026 19:41:02 +0000</pubDate>	
		</item>
		
		<item>
			<title>Kukurigu LPE - Linux Kernel Privilege Escalation (CVE-2026-43284 / CVE-2026-43500)</title>
			<link>https://cxsecurity.com/issue/WLB-2026050009</link>
			<guid>WLB-2026050009</guid>
			<lastBuildDate>2026-05-13 19:40:49 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: Kukurigu LPE - Linux Kernel Privilege Escalation (CVE-2026-43284 / CVE-2026-43500) Risk: Medium Text:# Titles: Kukurigu LPE - Linux Kernel Privilege Escalation (CVE-2026-43284 / CVE-2026-43500)  # Author: nu11secur1ty  # Date: 2...</description>
			<pubDate>Wed, 13 May 2026 19:40:49 +0000</pubDate>	
		</item>
		
		<item>
			<title>Event Booking Calendar-5.0 Cross-site scripting (reflected) </title>
			<link>https://cxsecurity.com/issue/WLB-2026050008</link>
			<guid>WLB-2026050008</guid>
			<lastBuildDate>2026-05-13 19:40:38 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: Event Booking Calendar-5.0 Cross-site scripting (reflected)  Risk: Low Text:## Titles: Event Booking Calendar-5.0 Cross-site scripting (reflected)   ## Author: nu11secur1ty  ## Date: 5/13/2026  ## Vendor...</description>
			<pubDate>Wed, 13 May 2026 19:40:38 +0000</pubDate>	
		</item>
		
		<item>
			<title>Linux Kernel Local Privilege Escalation (CVE-2026-43284 / CVE-2026-43500)</title>
			<link>https://cxsecurity.com/issue/WLB-2026050007</link>
			<guid>WLB-2026050007</guid>
			<lastBuildDate>2026-05-13 19:40:32 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: Linux Kernel Local Privilege Escalation (CVE-2026-43284 / CVE-2026-43500) Risk: High Text:# Titles:** Linux Kernel Local Privilege Escalation (CVE-2026-43284 / CVE-2026-43500)  # Author:** nu11secur1ty  # Date:** 2026...</description>
			<pubDate>Wed, 13 May 2026 19:40:32 +0000</pubDate>	
		</item>
		
		<item>
			<title>Ninja Forms Uploads Unauthenticated PHP File Upload</title>
			<link>https://cxsecurity.com/issue/WLB-2026050006</link>
			<guid>WLB-2026050006</guid>
			<lastBuildDate>2026-05-13 19:40:20 CET</lastBuildDate>
			<dc:creator>Sélim Lanouar</dc:creator>
			<description>Topic: Ninja Forms Uploads Unauthenticated PHP File Upload Risk: High Text:# Exploit Title:    Ninja Forms Uploads - Unauthenticated PHP File Upload  # Date:             2026-04-09  # Exploit Author:   ...</description>
			<pubDate>Wed, 13 May 2026 19:40:20 +0000</pubDate>	
		</item>
		
		<item>
			<title>Traccar GPS Tracking System 6.11.1 Cross-Site WebSocket Hijacking (CSWSH)</title>
			<link>https://cxsecurity.com/issue/WLB-2026050005</link>
			<guid>WLB-2026050005</guid>
			<lastBuildDate>2026-05-13 19:38:16 CET</lastBuildDate>
			<dc:creator>Hazar Taspinar</dc:creator>
			<description>Topic: Traccar GPS Tracking System 6.11.1 Cross-Site WebSocket Hijacking (CSWSH) Risk: Medium Text:# Exploit Title: Traccar GPS Tracking System 6.11.1 - Cross-Site WebSocket Hijacking (CSWSH)  # Date: 2026-02-26  # Exploit Aut...</description>
			<pubDate>Wed, 13 May 2026 19:38:15 +0000</pubDate>	
		</item>
		
		<item>
			<title>Erugo  0.2.14 Remote Code Execution (RCE)</title>
			<link>https://cxsecurity.com/issue/WLB-2026050004</link>
			<guid>WLB-2026050004</guid>
			<lastBuildDate>2026-05-04 20:19:59 CET</lastBuildDate>
			<dc:creator>Abdul Moiz</dc:creator>
			<description>Topic: Erugo  0.2.14 Remote Code Execution (RCE) Risk: High Text:# Exploit Title: Erugo &lt; = 0.2.14 - Authenticated Remote Code Execution (RCE)  # Date: 2026-02-02  # Exploit Author: Abdul Moiz ...</description>
			<pubDate>Mon, 04 May 2026 20:19:59 +0000</pubDate>	
		</item>
		
		<item>
			<title>Linux Kernel Local Privilege Escalation via Memory Handling and Access Control Weakness</title>
			<link>https://cxsecurity.com/issue/WLB-2026050003</link>
			<guid>WLB-2026050003</guid>
			<lastBuildDate>2026-05-04 20:19:47 CET</lastBuildDate>
			<dc:creator>RERO</dc:creator>
			<description>Topic: Linux Kernel Local Privilege Escalation via Memory Handling and Access Control Weakness Risk: Medium Text:A privilege escalation vulnerability class affecting the Linux kernel has been analyzed under controlled local test environment...</description>
			<pubDate>Mon, 04 May 2026 20:19:47 +0000</pubDate>	
		</item>
		
		<item>
			<title>Linux Kernel proc_readdir_de() 6.18-rc5 Local Privilege Escalation</title>
			<link>https://cxsecurity.com/issue/WLB-2026050001</link>
			<guid>WLB-2026050001</guid>
			<lastBuildDate>2026-05-04 20:18:27 CET</lastBuildDate>
			<dc:creator>Aviral Srivastava</dc:creator>
			<description>Topic: Linux Kernel proc_readdir_de() 6.18-rc5 Local Privilege Escalation Risk: Medium Text: * Exploit Title:  Linux Kernel proc_readdir_de() 6.18-rc5 - Local Privilege Escalation   * CVE:            CVE-2025-40271   * ...</description>
			<pubDate>Mon, 04 May 2026 20:18:26 +0000</pubDate>	
		</item>
		
		<item>
			<title>Insecure Permissions vulnerability in Nagios Network Analyzer v.2024R1.02-64 and before allows a local attacker to escalate pri</title>
			<link>https://cxsecurity.com/issue/WLB-2026040019</link>
			<guid>WLB-2026040019</guid>
			<lastBuildDate>2026-04-26 21:07:36 CET</lastBuildDate>
			<dc:creator>Sarang Tumne</dc:creator>
			<description>Topic: Insecure Permissions vulnerability in Nagios Network Analyzer v.2024R1.02-64 and before allows a local attacker to escalate pri Risk: Medium Text:Insecure Permissions vulnerability in Nagios Network Analyzer v.2024R1.02-64 and before allows a local attacker to escalate pri...</description>
			<pubDate>Sun, 26 Apr 2026 21:07:36 +0000</pubDate>	
		</item>
		
		<item>
			<title>Samsung ONE Integer Overflow in CircleConst Tensor Size Calculation </title>
			<link>https://cxsecurity.com/issue/WLB-2026040018</link>
			<guid>WLB-2026040018</guid>
			<lastBuildDate>2026-04-26 21:07:24 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Samsung ONE Integer Overflow in CircleConst Tensor Size Calculation  Risk: Medium Text:#!/usr/bin/env python3  # Exploit Title: Samsung ONE - Integer Overflow in CircleConst Tensor Size Calculation  # CVE: CVE-2026...</description>
			<pubDate>Sun, 26 Apr 2026 21:07:24 +0000</pubDate>	
		</item>
		
		<item>
			<title>solaredge-CSRF-OOB-Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2026040017</link>
			<guid>WLB-2026040017</guid>
			<lastBuildDate>2026-04-26 21:07:15 CET</lastBuildDate>
			<dc:creator>nu11secur1ty</dc:creator>
			<description>Topic: solaredge-CSRF-OOB-Injection Risk: Medium Text:# Titles: solaredge-CSRF-OOB-Injection  # Author: nu11secur1tyAI  # Date: 2026-04-26  # Vendor: SolarEdge Technologies Ltd.  # ...</description>
			<pubDate>Sun, 26 Apr 2026 21:07:15 +0000</pubDate>	
		</item>
		
		<item>
			<title>Trojan-Spy.Win32.Small / Remote Command Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026040016</link>
			<guid>WLB-2026040016</guid>
			<lastBuildDate>2026-04-22 21:54:00 CET</lastBuildDate>
			<dc:creator>malvuln</dc:creator>
			<description>Topic: Trojan-Spy.Win32.Small / Remote Command Execution Risk: Medium Text:Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2026  Original source: https://malvuln.com/advisory/8c15ec5f0137d097...</description>
			<pubDate>Wed, 22 Apr 2026 21:54:00 +0000</pubDate>	
		</item>
		
		<item>
			<title>Throttlestop Kernel Driver Kernel Out-of-Bounds Write Privilege Escalation</title>
			<link>https://cxsecurity.com/issue/WLB-2026040014</link>
			<guid>WLB-2026040014</guid>
			<lastBuildDate>2026-04-22 21:53:22 CET</lastBuildDate>
			<dc:creator>Xavi Beltran</dc:creator>
			<description>Topic: Throttlestop Kernel Driver Kernel Out-of-Bounds Write Privilege Escalation Risk: Medium Text:# Exploit Title: Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation   # Exploit Details: https://xavi...</description>
			<pubDate>Wed, 22 Apr 2026 21:53:21 +0000</pubDate>	
		</item>
		
		<item>
			<title>Critical Remote Code Execution Vulnerability in Windows Internet Key Exchange (IKE) Service (CVE-2026-33824)</title>
			<link>https://cxsecurity.com/issue/WLB-2026040013</link>
			<guid>WLB-2026040013</guid>
			<lastBuildDate>2026-04-19 20:47:26 CET</lastBuildDate>
			<dc:creator>RERO</dc:creator>
			<description>Topic: Critical Remote Code Execution Vulnerability in Windows Internet Key Exchange (IKE) Service (CVE-2026-33824) Risk: High Text:CVE-2026-33824 is a critical remote code execution vulnerability affecting the Windows Internet Key Exchange (IKE) service, whi...</description>
			<pubDate>Sun, 19 Apr 2026 20:47:26 +0000</pubDate>	
		</item>
		
		<item>
			<title>WordPress  Madara Local File Inclusion</title>
			<link>https://cxsecurity.com/issue/WLB-2026040012</link>
			<guid>WLB-2026040012</guid>
			<lastBuildDate>2026-04-14 19:07:10 CET</lastBuildDate>
			<dc:creator>Beatriz Fresno Naumova</dc:creator>
			<description>Topic: WordPress  Madara Local File Inclusion Risk: Medium Text:# Exploit Title: WordPress Madara Local File Inclusion   # Date: November 1, 2025  # Exploit Author: Beatriz Fresno Naumova  # ...</description>
			<pubDate>Tue, 14 Apr 2026 19:07:10 +0000</pubDate>	
		</item>
		
		<item>
			<title>FortiWeb  8.0.2 Remote Code Execution</title>
			<link>https://cxsecurity.com/issue/WLB-2026040011</link>
			<guid>WLB-2026040011</guid>
			<lastBuildDate>2026-04-14 19:06:52 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: FortiWeb  8.0.2 Remote Code Execution Risk: High Text:# Exploit Title: FortiWeb  8.0.2 - Remote Code Execution  # Date: 2025-11-22  # Author: Mohammed Idrees Banyamer  # Author Coun...</description>
			<pubDate>Tue, 14 Apr 2026 19:06:52 +0000</pubDate>	
		</item>
		
		<item>
			<title>Easy File Sharing Web Server v7.2 Buffer Overflow</title>
			<link>https://cxsecurity.com/issue/WLB-2026040010</link>
			<guid>WLB-2026040010</guid>
			<lastBuildDate>2026-04-14 19:06:41 CET</lastBuildDate>
			<dc:creator>Donwor</dc:creator>
			<description>Topic: Easy File Sharing Web Server v7.2 Buffer Overflow Risk: High Text:# Exploit title: Easy File Sharing Web Server v7.2 - Buffer Overflow  # Date: 16/10/2025  # Exploit Author: Donwor  # X: @real_...</description>
			<pubDate>Tue, 14 Apr 2026 19:06:29 +0000</pubDate>	
		</item>
		
		<item>
			<title>NetBT e-Fatura Privilege Escalation</title>
			<link>https://cxsecurity.com/issue/WLB-2026040009</link>
			<guid>WLB-2026040009</guid>
			<lastBuildDate>2026-04-14 19:06:00 CET</lastBuildDate>
			<dc:creator>Seccops</dc:creator>
			<description>Topic: NetBT e-Fatura Privilege Escalation Risk: Medium Text:# Exploit Title: NetBT e-Fatura - Privilege Escalation  # Author: Seccops  # Discovery Date: 2025-10-03  # Vendor: https://net-...</description>
			<pubDate>Tue, 14 Apr 2026 19:05:59 +0000</pubDate>	
		</item>
		
		<item>
			<title>Docker Desktop 4.44.3 Unauthenticated  API Exposure</title>
			<link>https://cxsecurity.com/issue/WLB-2026040008</link>
			<guid>WLB-2026040008</guid>
			<lastBuildDate>2026-04-09 20:53:26 CET</lastBuildDate>
			<dc:creator>OilSeller2001</dc:creator>
			<description>Topic: Docker Desktop 4.44.3 Unauthenticated  API Exposure Risk: High Text:# Exploit Title: Docker Desktop 4.44.3 - Unauthenticated  API Exposure  # Date: 2025-10-06  # Exploit Author: OilSeller2001  # ...</description>
			<pubDate>Thu, 09 Apr 2026 20:53:26 +0000</pubDate>	
		</item>
		
		<item>
			<title>MaNGOSWebV4  4.0.6 Reflected XSS</title>
			<link>https://cxsecurity.com/issue/WLB-2026040007</link>
			<guid>WLB-2026040007</guid>
			<lastBuildDate>2026-04-09 20:52:55 CET</lastBuildDate>
			<dc:creator>CodeSecLab</dc:creator>
			<description>Topic: MaNGOSWebV4  4.0.6 Reflected XSS Risk: Low Text:# Exploit Title: MaNGOSWebV4  4.0.6 - Reflected XSS   # Date: 2024-10-26  # Exploit Author: CodeSecLab  # Vendor Homepage: http...</description>
			<pubDate>Thu, 09 Apr 2026 20:52:55 +0000</pubDate>	
		</item>
		
		<item>
			<title>Grafana 11.6.0 SSRF</title>
			<link>https://cxsecurity.com/issue/WLB-2026040006</link>
			<guid>WLB-2026040006</guid>
			<lastBuildDate>2026-04-09 20:52:38 CET</lastBuildDate>
			<dc:creator>Beatriz Fresno Naumova</dc:creator>
			<description>Topic: Grafana 11.6.0 SSRF Risk: Medium Text:# Exploit Title: Grafana  11.6.0 - SSRF   # FOFA: app=&quot;Grafana&quot;  # Date: 2-11-2025  # Exploit Author: Beatriz Fresno Naumova  #...</description>
			<pubDate>Thu, 09 Apr 2026 20:52:38 +0000</pubDate>	
		</item>
		
		<item>
			<title>OctoPrint 1.11.2 File Upload</title>
			<link>https://cxsecurity.com/issue/WLB-2026040005</link>
			<guid>WLB-2026040005</guid>
			<lastBuildDate>2026-04-09 20:52:26 CET</lastBuildDate>
			<dc:creator>prabhatverma.addada</dc:creator>
			<description>Topic: OctoPrint 1.11.2 File Upload Risk: High Text:# Exploit Title: OctoPrint 1.11.2 - File Upload   # Date: 2025-09-28  # Exploit Author: prabhatverma.addada  # Vendor Homepage:...</description>
			<pubDate>Thu, 09 Apr 2026 20:52:26 +0000</pubDate>	
		</item>
		
		<item>
			<title>esm-dev 136 Path Traversal</title>
			<link>https://cxsecurity.com/issue/WLB-2026040004</link>
			<guid>WLB-2026040004</guid>
			<lastBuildDate>2026-04-09 20:52:13 CET</lastBuildDate>
			<dc:creator>Byte Reaper</dc:creator>
			<description>Topic: esm-dev 136 Path Traversal Risk: Medium Text:# Exploit Title:  esm-dev 136 - Path Traversal  # Date: 2025-07-11  # Exploit Author: Byte Reaper   #Vendor Homepage: https://g...</description>
			<pubDate>Thu, 09 Apr 2026 20:52:12 +0000</pubDate>	
		</item>
		
		<item>
			<title>Linux Kernel mseal Invariant Violation (Linux kernel 6.17-7.0 rc5)</title>
			<link>https://cxsecurity.com/issue/WLB-2026040003</link>
			<guid>WLB-2026040003</guid>
			<lastBuildDate>2026-04-04 16:01:28 CET</lastBuildDate>
			<dc:creator>Antonius</dc:creator>
			<description>Topic: Linux Kernel mseal Invariant Violation (Linux kernel 6.17-7.0 rc5) Risk: High Text:Title : CVE-2026-23416 - Linux Kernel mseal Invariant Violation (Linux kernel 6.17-7.0 rc5)    Exploit Poc : https://github.com...</description>
			<pubDate>Sat, 04 Apr 2026 16:01:28 +0000</pubDate>	
		</item>
		
		<item>
			<title>astrojs/vercel &lt; = 10.0.0 - Unauthenticated x-astro-path Header Path Override</title>
			<link>https://cxsecurity.com/issue/WLB-2026040002</link>
			<guid>WLB-2026040002</guid>
			<lastBuildDate>2026-04-03 20:23:39 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: astrojs/vercel &lt; = 10.0.0 - Unauthenticated x-astro-path Header Path Override Risk: Medium Text:#!/usr/bin/env python3  # Exploit Title:        @astrojs/vercel &lt; = 10.0.0 - Unauthenticated x-astro-path Header Path Override  ...</description>
			<pubDate>Fri, 03 Apr 2026 20:23:39 +0000</pubDate>	
		</item>
		
		<item>
			<title>Microsoft SQL Server Privilege Elevation Through</title>
			<link>https://cxsecurity.com/issue/WLB-2026040001</link>
			<guid>WLB-2026040001</guid>
			<lastBuildDate>2026-04-03 20:23:17 CET</lastBuildDate>
			<dc:creator>Emad Al-Mousa</dc:creator>
			<description>Topic: Microsoft SQL Server Privilege Elevation Through Risk: Medium Text:Title: Microsoft SQL Server Privilege Elevation Through ##MS_DatabaseManager## Role [CVE-2025-24999]  Product: Database  Manufa...</description>
			<pubDate>Fri, 03 Apr 2026 20:23:17 +0000</pubDate>	
		</item>
		
		<item>
			<title>FreeScout Unauthenticated RCE via ZWSP .htaccess Bypass</title>
			<link>https://cxsecurity.com/issue/WLB-2026030038</link>
			<guid>WLB-2026030038</guid>
			<lastBuildDate>2026-03-31 19:40:02 CET</lastBuildDate>
			<dc:creator>offensiveee</dc:creator>
			<description>Topic: FreeScout Unauthenticated RCE via ZWSP .htaccess Bypass Risk: High Text:##  # This module requires Metasploit: https://metasploit.com/download  # Current source: https://github.com/rapid7/metasploit-...</description>
			<pubDate>Tue, 31 Mar 2026 19:40:02 +0000</pubDate>	
		</item>
		
		<item>
			<title>Wavlink WL-WN579X3-C firewall.cgi UPNP Stack-based Buffer Overflow</title>
			<link>https://cxsecurity.com/issue/WLB-2026030037</link>
			<guid>WLB-2026030037</guid>
			<lastBuildDate>2026-03-31 19:38:49 CET</lastBuildDate>
			<dc:creator>Mohammed Idrees Banyamer</dc:creator>
			<description>Topic: Wavlink WL-WN579X3-C firewall.cgi UPNP Stack-based Buffer Overflow Risk: Medium Text:# Exploit Title: Wavlink WL-WN579X3-C firewall.cgi UPNP Stack-based Buffer Overflow  # CVE: CVE-2026-5004  # Date: 2026-03-29  ...</description>
			<pubDate>Tue, 31 Mar 2026 19:38:48 +0000</pubDate>	
		</item>
		
		<item>
			<title>esiclivre 0.2.2 SQL Injection</title>
			<link>https://cxsecurity.com/issue/WLB-2026030036</link>
			<guid>WLB-2026030036</guid>
			<lastBuildDate>2026-03-26 08:58:54 CET</lastBuildDate>
			<dc:creator>Bryan</dc:creator>
			<description>Topic: esiclivre 0.2.2 SQL Injection Risk: Medium Text:# CVE-2026-30655 — SQL Injection in esiclivre (password reset)    ## Summary  A SQL injection vulnerability exists in the pas...</description>
			<pubDate>Thu, 26 Mar 2026 08:58:54 +0000</pubDate>	
		</item>
		
		<item>
			<title>Payara Server Cross Site Scripting</title>
			<link>https://cxsecurity.com/issue/WLB-2026030035</link>
			<guid>WLB-2026030035</guid>
			<lastBuildDate>2026-03-26 08:56:48 CET</lastBuildDate>
			<dc:creator>DeepSecurity Research</dc:creator>
			<description>Topic: Payara Server Cross Site Scripting Risk: Low Text:# XSS to Admin account takeover (CVE-2025-14340)    A Cross-Site Scripting vulnerability in Payara’s Administration Rest Inte...</description>
			<pubDate>Thu, 26 Mar 2026 08:56:48 +0000</pubDate>	
		</item>
		
</channel>
</rss>

