<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with cve202641202]]></title><description><![CDATA[A list of topics that have been tagged with cve202641202]]></description><link>https://board.circlewithadot.net/tags/cve202641202</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:04:18 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/cve202641202.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[🔎 CVE-2026-41202: CRITICAL path traversal in ci4ms (&amp;lt;0.31.5.0) lets authenticated users upload ZIPs for remote code execution.]]></title><description><![CDATA[ CVE-2026-41202: CRITICAL path traversal in ci4ms (&lt;0.31.5.0) lets authenticated users upload ZIPs for remote code execution. Patch to 0.31.5.0 now! Details: https://radar.offseq.com/threat/cve-2026-41202-cwe-22-improper-limitation-of-a-pat-c7627c61 #OffSeq #infosec #CVE202641202 #vuln]]></description><link>https://board.circlewithadot.net/topic/d0868773-2b03-47ff-9dfc-bf7948482cba/cve-2026-41202-critical-path-traversal-in-ci4ms-lt-0.31.5.0-lets-authenticated-users-upload-zips-for-remote-code-execution.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/d0868773-2b03-47ff-9dfc-bf7948482cba/cve-2026-41202-critical-path-traversal-in-ci4ms-lt-0.31.5.0-lets-authenticated-users-upload-zips-for-remote-code-execution.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>