<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 04/04/2026 at 2:36 AM by All in One SEO v4.9.4.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://securecybervm.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Secure Cyber Vulnerability Management</title>
		<link><![CDATA[https://securecybervm.com]]></link>
		<description><![CDATA[Secure Cyber Vulnerability Management]]></description>
		<lastBuildDate><![CDATA[Tue, 17 Mar 2026 00:34:40 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://securecybervm.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-206-pwn2own-canon-imageclass-mf654cdw-ttf-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-206-pwn2own-canon-imageclass-mf654cdw-ttf-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-206: (Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 00:34:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-253-microsoft-visual-studio-code-mcp-json-command-injection-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-253-microsoft-visual-studio-code-mcp-json-command-injection-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-253: Microsoft Visual Studio Code mcp.json Command Injection Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/google-addresses-zero-day-vulnerability-exploited-in-the-wild-cve-2026-5281/]]></guid>
			<link><![CDATA[https://securecybervm.com/google-addresses-zero-day-vulnerability-exploited-in-the-wild-cve-2026-5281/]]></link>
			<title>Google Addresses Zero-day Vulnerability Exploited in the Wild (CVE-2026-5281)</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 18:32:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-250-linux-kernel-analog-device-driver-improper-validation-of-array-index-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-250-linux-kernel-analog-device-driver-improper-validation-of-array-index-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-250: Linux Kernel Analog Device Driver Improper Validation of Array Index Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 00:32:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-249-nomachine-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-249-nomachine-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-249: NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 00:33:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-248-nomachine-external-control-of-file-path-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-248-nomachine-external-control-of-file-path-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-248: NoMachine External Control of File Path Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 00:33:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-247-nomachine-external-control-of-file-path-arbitrary-file-deletion-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-247-nomachine-external-control-of-file-path-arbitrary-file-deletion-vulnerability/]]></link>
			<title>ZDI-26-247: NoMachine External Control of File Path Arbitrary File Deletion Vulnerability</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 00:33:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-252-mozilla-firefox-ionmonkey-switch-statement-optimization-type-confusion-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-252-mozilla-firefox-ionmonkey-switch-statement-optimization-type-confusion-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-252: Mozilla Firefox IonMonkey Switch Statement Optimization Type Confusion Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:38:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/cisa-added-langflow-vulnerability-to-its-known-exploited-vulnerabilities-catalog-cve-2026-33017/]]></guid>
			<link><![CDATA[https://securecybervm.com/cisa-added-langflow-vulnerability-to-its-known-exploited-vulnerabilities-catalog-cve-2026-33017/]]></link>
			<title>CISA Added Langflow Vulnerability to its Known Exploited Vulnerabilities Catalog (CVE-2026-33017)</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 18:32:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-251-foxit-pdf-reader-update-service-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-251-foxit-pdf-reader-update-service-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-251: Foxit PDF Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:38:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/axios-npm-supply-chain-attack-malicious-rat-deployment/]]></guid>
			<link><![CDATA[https://securecybervm.com/axios-npm-supply-chain-attack-malicious-rat-deployment/]]></link>
			<title>Axios npm Supply Chain Attack: Malicious RAT Deployment</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 18:32:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-246-0day-aws-mcp-server-command-injection-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-246-0day-aws-mcp-server-command-injection-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-246: (0Day) aws-mcp-server Command Injection Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-224-pwn2own-samsung-galaxy-s25-samsung-account-cross-site-scripting-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-224-pwn2own-samsung-galaxy-s25-samsung-account-cross-site-scripting-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-224: (Pwn2Own) Samsung Galaxy S25 Samsung Account Cross-Site Scripting Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 00:32:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-245-0day-aws-mcp-server-aws-cli-command-injection-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-245-0day-aws-mcp-server-aws-cli-command-injection-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-245: (0Day) aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-244-pwn2own-qnap-qhora-322-miro_webserver_controllers_api_login_singin-authentication-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-244-pwn2own-qnap-qhora-322-miro_webserver_controllers_api_login_singin-authentication-bypass-vulnerability/]]></link>
			<title>ZDI-26-244: (Pwn2Own) QNAP QHora-322 miro_webserver_controllers_api_login_singIn Authentication Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-243-pwn2own-qnap-ts-453e-write_file_to_svr-external-control-of-file-path-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-243-pwn2own-qnap-ts-453e-write_file_to_svr-external-control-of-file-path-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-243: (Pwn2Own) QNAP TS-453E write_file_to_svr External Control of File Path Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-242-pwn2own-qnap-ts-453e-server_handlers-pyc-rr2s-kwargs-error-message-information-disclosure-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-242-pwn2own-qnap-ts-453e-server_handlers-pyc-rr2s-kwargs-error-message-information-disclosure-vulnerability/]]></link>
			<title>ZDI-26-242: (Pwn2Own) QNAP TS-453E server_handlers.pyc rr2s.kwargs Error Message Information Disclosure Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-223-pwn2own-samsung-galaxy-s25-smart-touch-call-application-protection-mechanism-failure-information-disclosure-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-223-pwn2own-samsung-galaxy-s25-smart-touch-call-application-protection-mechanism-failure-information-disclosure-vulnerability/]]></link>
			<title>ZDI-26-223: (Pwn2Own) Samsung Galaxy S25 Smart Touch Call Application Protection Mechanism Failure Information Disclosure Vulnerability</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 00:32:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-241-pwn2own-qnap-qhora-322-qvpn_db_mgr-username-sql-injection-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-241-pwn2own-qnap-qhora-322-qvpn_db_mgr-username-sql-injection-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-241: (Pwn2Own) QNAP QHora-322 qvpn_db_mgr username SQL Injection Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/citrix-netscaler-adc-and-netscaler-gateway-multiple-vulnerabilities-cve-2026-3055-cve-2026-4368/]]></guid>
			<link><![CDATA[https://securecybervm.com/citrix-netscaler-adc-and-netscaler-gateway-multiple-vulnerabilities-cve-2026-3055-cve-2026-4368/]]></link>
			<title>Citrix NetScaler ADC and NetScaler Gateway multiple vulnerabilities (CVE-2026-3055 &amp; CVE-2026-4368)</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 18:37:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-225-pwn2own-samsung-galaxy-s25-samsung-account-open-redirect-security-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-225-pwn2own-samsung-galaxy-s25-samsung-account-open-redirect-security-bypass-vulnerability/]]></link>
			<title>ZDI-26-225: (Pwn2Own) Samsung Galaxy S25 Samsung Account Open Redirect Security Bypass Vulnerability</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 00:32:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-240-pwn2own-qnap-qhora-322-qvpn_db_mgr-role_type-improper-neutralization-of-escape-sequences-authentication-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-240-pwn2own-qnap-qhora-322-qvpn_db_mgr-role_type-improper-neutralization-of-escape-sequences-authentication-bypass-vulnerability/]]></link>
			<title>ZDI-26-240: (Pwn2Own) QNAP QHora-322 qvpn_db_mgr role_type Improper Neutralization of Escape Sequences Authentication Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-239-pwn2own-qnap-qhora-322-login-newauthmiddleware-authenticator-authentication-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-239-pwn2own-qnap-qhora-322-login-newauthmiddleware-authenticator-authentication-bypass-vulnerability/]]></link>
			<title>ZDI-26-239: (Pwn2Own) QNAP QHora-322 login.newAuthMiddleware.Authenticator Authentication Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-226-0day-microsoft-azure-mcp-azurecliservice-command-injection-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-226-0day-microsoft-azure-mcp-azurecliservice-command-injection-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-226: (0Day) Microsoft Azure MCP AzureCliService Command Injection Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 18:38:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-238-linux-kernel-aoe-driver-use-after-free-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-238-linux-kernel-aoe-driver-use-after-free-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-238: Linux Kernel AoE Driver Use-After-Free Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-237-pwn2own-qnap-qhora-322-ip6_wanifset-improper-restriction-of-communication-channel-to-intended-endpoints-firewall-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-237-pwn2own-qnap-qhora-322-ip6_wanifset-improper-restriction-of-communication-channel-to-intended-endpoints-firewall-bypass-vulnerability/]]></link>
			<title>ZDI-26-237: (Pwn2Own) QNAP QHora-322  ip6_wanifset Improper Restriction of Communication Channel to Intended Endpoints Firewall Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-236-digilent-dasylab-dsb-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-236-digilent-dasylab-dsb-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-236: Digilent DASYLab DSB File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:41:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-235-digilent-dasylab-dsa-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-235-digilent-dasylab-dsa-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-235: Digilent DASYLab DSA File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:40:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-234-digilent-dasylab-dsa-file-parsing-out-of-bounds-read-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-234-digilent-dasylab-dsa-file-parsing-out-of-bounds-read-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-234: Digilent DASYLab DSA File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:40:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-233-digilent-dasylab-dsa-file-parsing-out-of-bounds-read-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-233-digilent-dasylab-dsa-file-parsing-out-of-bounds-read-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-233: Digilent DASYLab DSA File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:40:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-232-pwn2own-red-hat-enterprise-linux-vmwgfx-driver-integer-overflow-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-232-pwn2own-red-hat-enterprise-linux-vmwgfx-driver-integer-overflow-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-232: (Pwn2Own) Red Hat Enterprise Linux vmwgfx Driver Integer Overflow Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:40:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/n8n-patches-critical-remote-code-execution-vulnerability-cve-2026-33660/]]></guid>
			<link><![CDATA[https://securecybervm.com/n8n-patches-critical-remote-code-execution-vulnerability-cve-2026-33660/]]></link>
			<title>N8n Patches Critical Remote Code Execution Vulnerability (CVE-2026-33660)</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:39:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/cisa-warns-about-active-exploitation-of-f5-big-ip-vulnerability-cve-2025-53521/]]></guid>
			<link><![CDATA[https://securecybervm.com/cisa-warns-about-active-exploitation-of-f5-big-ip-vulnerability-cve-2025-53521/]]></link>
			<title>CISA Warns about Active Exploitation of F5 BIG-IP Vulnerability (CVE-2025-53521)</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:39:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-214-gimp-hdr-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-214-gimp-hdr-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-214: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 00:35:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-222-pwn2own-canon-imageclass-mf654cdw-bjnp-memory-corruption-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-222-pwn2own-canon-imageclass-mf654cdw-bjnp-memory-corruption-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-222: (Pwn2Own) Canon imageCLASS MF654Cdw BJNP Memory Corruption Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 18:42:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-216-pwn2own-qnap-ts-453e-smbd-domain_name-argument-injection-authentication-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-216-pwn2own-qnap-ts-453e-smbd-domain_name-argument-injection-authentication-bypass-vulnerability/]]></link>
			<title>ZDI-26-216: (Pwn2Own) QNAP TS-453E smbd domain_name Argument Injection Authentication Bypass Vulnerability</title>
			<pubDate><![CDATA[Wed, 18 Mar 2026 00:41:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-221-gimp-xpm-file-parsing-integer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-221-gimp-xpm-file-parsing-integer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-221: GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 00:32:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-220-gimp-psp-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-220-gimp-psp-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-220: GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 00:32:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-215-keepassxc-openssl-configuration-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-215-keepassxc-openssl-configuration-uncontrolled-search-path-element-local-privilege-escalation-vulnerability/]]></link>
			<title>ZDI-26-215: KeePassXC OpenSSL Configuration Uncontrolled Search Path Element Local Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 00:35:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-213-gimp-lbm-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-213-gimp-lbm-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-213: GIMP LBM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 00:34:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-212-schneider-electric-ecostruxure-data-center-expert-hard-coded-password-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-212-schneider-electric-ecostruxure-data-center-expert-hard-coded-password-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-212: Schneider Electric EcoStruxure Data Center Expert Hard-coded Password Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 00:34:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-211-delta-electronics-asda-soft-par-file-parsing-stack-based-buffer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-211-delta-electronics-asda-soft-par-file-parsing-stack-based-buffer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-211: Delta Electronics ASDA-Soft PAR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 00:34:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-210-pwn2own-samsung-galaxy-s25-samsung-members-security-feature-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-210-pwn2own-samsung-galaxy-s25-samsung-members-security-feature-bypass-vulnerability/]]></link>
			<title>ZDI-26-210: (Pwn2Own) Samsung Galaxy S25 Samsung Members Security Feature Bypass Vulnerability</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 00:34:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-209-pwn2own-samsung-galaxy-s25-samsung-members-open-redirect-security-bypass-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-209-pwn2own-samsung-galaxy-s25-samsung-members-open-redirect-security-bypass-vulnerability/]]></link>
			<title>ZDI-26-209: (Pwn2Own) Samsung Galaxy S25 Samsung Members Open Redirect Security Bypass Vulnerability</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 00:34:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-208-pwn2own-canon-imageclass-mf654cdw-ttf-parsing-integer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-208-pwn2own-canon-imageclass-mf654cdw-ttf-parsing-integer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-208: (Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Integer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 00:34:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-207-pwn2own-canon-imageclass-mf654cdw-dtdc_addr_importsub-stack-based-buffer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-207-pwn2own-canon-imageclass-mf654cdw-dtdc_addr_importsub-stack-based-buffer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-207: (Pwn2Own) Canon imageCLASS MF654Cdw dtdc_addr_importSub Stack-based Buffer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 00:34:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/cisa-added-zimbra-vulnerability-to-its-known-exploited-vulnerabilities-catalog-cve-2025-66376/]]></guid>
			<link><![CDATA[https://securecybervm.com/cisa-added-zimbra-vulnerability-to-its-known-exploited-vulnerabilities-catalog-cve-2025-66376/]]></link>
			<title>CISA Added Zimbra Vulnerability to its Known Exploited Vulnerabilities Catalog (CVE-2025-66376)</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 12:41:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-219-gimp-jp2-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-219-gimp-jp2-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-219: GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 00:32:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-218-gimp-ani-file-parsing-integer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-218-gimp-ani-file-parsing-integer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-218: GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 00:32:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securecybervm.com/zdi-26-217-gimp-psd-file-parsing-integer-overflow-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://securecybervm.com/zdi-26-217-gimp-psd-file-parsing-integer-overflow-remote-code-execution-vulnerability/]]></link>
			<title>ZDI-26-217: GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 00:32:30 +0000]]></pubDate>
		</item>
				</channel>
</rss>
