<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 16/04/2026 at 1:09 PM by All in One SEO v4.9.4.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://securecybervm.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Secure Cyber Vulnerability Management</title>
		<link><![CDATA[https://securecybervm.com]]></link>
		<description><![CDATA[Secure Cyber Vulnerability Management]]></description>
		<lastBuildDate><![CDATA[Thu, 16 Apr 2026 00:36:10 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://securecybervm.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-290-ni-labview-lvlib-file-parsing-memory-corruption-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-290-ni-labview-lvlib-file-parsing-memory-corruption-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-290: NI LabVIEW LVLIB File Parsing Memory Corruption Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:36:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-289-linux-kernel-ets-scheduler-race-condition-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-289-linux-kernel-ets-scheduler-race-condition-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-289: Linux Kernel ETS Scheduler Race Condition Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:36:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-288-drivelock-directory-traversal-information-disclosure-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-288-drivelock-directory-traversal-information-disclosure-vulnerability/]]></link>
			<title>ZDI-26-288: DriveLock Directory Traversal Information Disclosure Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:36:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-287-drivelock-directory-traversal-information-disclosure-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-287-drivelock-directory-traversal-information-disclosure-vulnerability/]]></link>
			<title>ZDI-26-287: DriveLock Directory Traversal Information Disclosure Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:36:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-286-drivelock-sql-injection-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-286-drivelock-sql-injection-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-286: DriveLock SQL Injection Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:36:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-285-drivelock-directory-traversal-information-disclosure-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-285-drivelock-directory-traversal-information-disclosure-vulnerability/]]></link>
			<title>ZDI-26-285: DriveLock Directory Traversal Information Disclosure Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:35:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-284-drivelock-directory-traversal-information-disclosure-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-284-drivelock-directory-traversal-information-disclosure-vulnerability/]]></link>
			<title>ZDI-26-284: DriveLock Directory Traversal Information Disclosure Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:35:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-283-gstreamer-qtdemux-stack-based-buffer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-283-gstreamer-qtdemux-stack-based-buffer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-283: GStreamer qtdemux Stack-based Buffer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:35:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-282-gimp-hdr-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-282-gimp-hdr-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-282: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:35:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-281-microsoft-vcpkg-openssl-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-281-microsoft-vcpkg-openssl-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-281: Microsoft vcpkg OpenSSL Uncontrolled Search Path Element Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-280-pwn2own-hp-deskjet-2855e-jobstatusevent-stack-based-buffer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-280-pwn2own-hp-deskjet-2855e-jobstatusevent-stack-based-buffer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-280: (Pwn2Own) HP DeskJet 2855e JobStatusEvent Stack-based Buffer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:35:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-279-microsoft-windows-snipping-tool-improper-input-validation-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-279-microsoft-windows-snipping-tool-improper-input-validation-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-279: Microsoft Windows Snipping Tool Improper Input Validation Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:35:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-278-microsoft-windows-win32kfull-improper-locking-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-278-microsoft-windows-win32kfull-improper-locking-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-278: Microsoft Windows win32kfull Improper Locking Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:35:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-261-0day-docker-desktop-credentialhelper-directory-traversal-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-261-0day-docker-desktop-credentialhelper-directory-traversal-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-261: (0Day) Docker Desktop credentialHelper Directory Traversal Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 18:36:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-260-0day-docker-desktop-system-editor-uncontrolled-search-path-element-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-260-0day-docker-desktop-system-editor-uncontrolled-search-path-element-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-260: (0Day) Docker Desktop System Editor Uncontrolled Search Path Element  Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 18:36:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-259-0day-docker-desktop-cli-plugins-incorrect-permission-assignment-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-259-0day-docker-desktop-cli-plugins-incorrect-permission-assignment-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-259: (0Day) Docker Desktop cli-plugins Incorrect Permission Assignment Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 18:36:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-258-0day-docker-desktop-extension-manager-exposed-dangerous-function-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-258-0day-docker-desktop-extension-manager-exposed-dangerous-function-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-258: (0Day) Docker Desktop extension-manager Exposed Dangerous Function Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 18:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/microsoft-patch-tuesday-april-2026-security-update-review/]]></guid>
			<link><![CDATA[https://securecybervm.com/microsoft-patch-tuesday-april-2026-security-update-review/]]></link>
			<title>Microsoft Patch Tuesday, April 2026 Security Update Review</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 12:31:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-291-ni-labview-lvclass-file-parsing-memory-corruption-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-291-ni-labview-lvclass-file-parsing-memory-corruption-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-291: NI LabVIEW LVCLASS File Parsing Memory Corruption Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:36:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/google-addresses-zero-day-vulnerability-exploited-in-the-wild-cve-2026-5281/]]></guid>
			<link><![CDATA[https://securecybervm.com/google-addresses-zero-day-vulnerability-exploited-in-the-wild-cve-2026-5281/]]></link>
			<title>Google Addresses Zero-day Vulnerability Exploited in the Wild (CVE-2026-5281)</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 18:32:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/cisa-added-ivanti-epmm-vulnerability-to-its-known-exploited-vulnerabilities-catalog-cve-2026-1340/]]></guid>
			<link><![CDATA[https://securecybervm.com/cisa-added-ivanti-epmm-vulnerability-to-its-known-exploited-vulnerabilities-catalog-cve-2026-1340/]]></link>
			<title>CISA added Ivanti EPMM Vulnerability to its Known Exploited Vulnerabilities Catalog (CVE-2026-1340)</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-253-microsoft-visual-studio-code-mcp-json-command-injection-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-253-microsoft-visual-studio-code-mcp-json-command-injection-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-253: Microsoft Visual Studio Code mcp.json Command Injection Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-252-mozilla-firefox-ionmonkey-switch-statement-optimization-type-confusion-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-252-mozilla-firefox-ionmonkey-switch-statement-optimization-type-confusion-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-252: Mozilla Firefox IonMonkey Switch Statement Optimization Type Confusion Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:38:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-251-foxit-pdf-reader-update-service-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-251-foxit-pdf-reader-update-service-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-251: Foxit PDF Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:38:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-256-0day-labcenter-electronics-proteus-pdsprj-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-256-0day-labcenter-electronics-proteus-pdsprj-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-256: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:34:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/fortinet-forticlientems-vulnerability-exploited-in-the-wild-cve-2026-35616/]]></guid>
			<link><![CDATA[https://securecybervm.com/fortinet-forticlientems-vulnerability-exploited-in-the-wild-cve-2026-35616/]]></link>
			<title>Fortinet FortiClientEMS Vulnerability Exploited in the Wild (CVE-2026-35616)</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:34:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/axios-npm-supply-chain-attack-malicious-rat-deployment/]]></guid>
			<link><![CDATA[https://securecybervm.com/axios-npm-supply-chain-attack-malicious-rat-deployment/]]></link>
			<title>Axios npm Supply Chain Attack: Malicious RAT Deployment</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 18:32:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-250-linux-kernel-analog-device-driver-improper-validation-of-array-index-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-250-linux-kernel-analog-device-driver-improper-validation-of-array-index-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-250: Linux Kernel Analog Device Driver Improper Validation of Array Index Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 00:32:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-249-nomachine-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-249-nomachine-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-249: NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 00:33:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-248-nomachine-external-control-of-file-path-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-248-nomachine-external-control-of-file-path-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-248: NoMachine External Control of File Path Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 00:33:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-247-nomachine-external-control-of-file-path-arbitrary-file-deletion-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-247-nomachine-external-control-of-file-path-arbitrary-file-deletion-vulnerability/]]></link>
			<title>ZDI-26-247: NoMachine External Control of File Path Arbitrary File Deletion Vulnerability</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 00:33:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-292-qnap-ts-453e-qvrpro-excpostgres-exposed-dangerous-method-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-292-qnap-ts-453e-qvrpro-excpostgres-exposed-dangerous-method-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-292: QNAP TS-453E QVRPro excpostgres  Exposed Dangerous Method Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:36:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-246-0day-aws-mcp-server-command-injection-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-246-0day-aws-mcp-server-command-injection-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-246: (0Day) aws-mcp-server Command Injection Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-245-0day-aws-mcp-server-aws-cli-command-injection-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-245-0day-aws-mcp-server-aws-cli-command-injection-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-245: (0Day) aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-244-pwn2own-qnap-qhora-322-miro_webserver_controllers_api_login_singin-authentication-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-244-pwn2own-qnap-qhora-322-miro_webserver_controllers_api_login_singin-authentication-bypass-vulnerability/]]></link>
			<title>ZDI-26-244: (Pwn2Own) QNAP QHora-322 miro_webserver_controllers_api_login_singIn Authentication Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-243-pwn2own-qnap-ts-453e-write_file_to_svr-external-control-of-file-path-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-243-pwn2own-qnap-ts-453e-write_file_to_svr-external-control-of-file-path-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-243: (Pwn2Own) QNAP TS-453E write_file_to_svr External Control of File Path Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-242-pwn2own-qnap-ts-453e-server_handlers-pyc-rr2s-kwargs-error-message-information-disclosure-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-242-pwn2own-qnap-ts-453e-server_handlers-pyc-rr2s-kwargs-error-message-information-disclosure-vulnerability/]]></link>
			<title>ZDI-26-242: (Pwn2Own) QNAP TS-453E server_handlers.pyc rr2s.kwargs Error Message Information Disclosure Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/adobe-acrobat-and-reader-arbitrary-code-execution-vulnerability-exploited-in-the-wild-cve-2026-34621/]]></guid>
			<link><![CDATA[https://securecybervm.com/adobe-acrobat-and-reader-arbitrary-code-execution-vulnerability-exploited-in-the-wild-cve-2026-34621/]]></link>
			<title>Adobe Acrobat and Reader Arbitrary Code Execution Vulnerability Exploited in the Wild (CVE-2026-34621)</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 18:33:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-241-pwn2own-qnap-qhora-322-qvpn_db_mgr-username-sql-injection-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-241-pwn2own-qnap-qhora-322-qvpn_db_mgr-username-sql-injection-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-241: (Pwn2Own) QNAP QHora-322 qvpn_db_mgr username SQL Injection Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-240-pwn2own-qnap-qhora-322-qvpn_db_mgr-role_type-improper-neutralization-of-escape-sequences-authentication-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-240-pwn2own-qnap-qhora-322-qvpn_db_mgr-role_type-improper-neutralization-of-escape-sequences-authentication-bypass-vulnerability/]]></link>
			<title>ZDI-26-240: (Pwn2Own) QNAP QHora-322 qvpn_db_mgr role_type Improper Neutralization of Escape Sequences Authentication Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-239-pwn2own-qnap-qhora-322-login-newauthmiddleware-authenticator-authentication-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-239-pwn2own-qnap-qhora-322-login-newauthmiddleware-authenticator-authentication-bypass-vulnerability/]]></link>
			<title>ZDI-26-239: (Pwn2Own) QNAP QHora-322 login.newAuthMiddleware.Authenticator Authentication Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-238-linux-kernel-aoe-driver-use-after-free-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-238-linux-kernel-aoe-driver-use-after-free-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-238: Linux Kernel AoE Driver Use-After-Free Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-237-pwn2own-qnap-qhora-322-ip6_wanifset-improper-restriction-of-communication-channel-to-intended-endpoints-firewall-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-237-pwn2own-qnap-qhora-322-ip6_wanifset-improper-restriction-of-communication-channel-to-intended-endpoints-firewall-bypass-vulnerability/]]></link>
			<title>ZDI-26-237: (Pwn2Own) QNAP QHora-322  ip6_wanifset Improper Restriction of Communication Channel to Intended Endpoints Firewall Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-257-0day-labcenter-electronics-proteus-pdsprj-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-257-0day-labcenter-electronics-proteus-pdsprj-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-257: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:34:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-236-digilent-dasylab-dsb-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-236-digilent-dasylab-dsb-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-236: Digilent DASYLab DSB File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-235-digilent-dasylab-dsa-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-235-digilent-dasylab-dsa-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-235: Digilent DASYLab DSA File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:40:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-255-0day-labcenter-electronics-proteus-pdsprj-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-255-0day-labcenter-electronics-proteus-pdsprj-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-255: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:34:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-234-digilent-dasylab-dsa-file-parsing-out-of-bounds-read-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-234-digilent-dasylab-dsa-file-parsing-out-of-bounds-read-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-234: Digilent DASYLab DSA File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:40:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-233-digilent-dasylab-dsa-file-parsing-out-of-bounds-read-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-233-digilent-dasylab-dsa-file-parsing-out-of-bounds-read-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-233: Digilent DASYLab DSA File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:40:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-254-0day-labcenter-electronics-proteus-pdsprj-file-parsing-type-confusion-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-254-0day-labcenter-electronics-proteus-pdsprj-file-parsing-type-confusion-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-254: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:34:27 +0000]]></pubDate>
		</item>
				</channel>
</rss>
