<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with cve202642880]]></title><description><![CDATA[A list of topics that have been tagged with cve202642880]]></description><link>https://board.circlewithadot.net/tags/cve202642880</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 20:50:23 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/cve202642880.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[🚨 CRITICAL: CVE-2026-42880 in Argo CD (v3.2.0 – 3.2.10, 3.3.0 – 3.3.8) allows attackers with read-only access to extract plaintext Kubernetes Secrets via the ServerSideDiff endpoint.]]></title><description><![CDATA[ CRITICAL: CVE-2026-42880 in Argo CD (v3.2.0 – 3.2.10, 3.3.0 – 3.3.8) allows attackers with read-only access to extract plaintext Kubernetes Secrets via the ServerSideDiff endpoint. Patch to 3.2.11/3.3.9+ now! https://radar.offseq.com/threat/cve-2026-42880-cwe-200-exposure-of-sensitive-infor-40029159 #OffSeq #ArgoCD #Kubernetes #CVE202642880]]></description><link>https://board.circlewithadot.net/topic/88b9c954-928b-4b41-b489-c0d474c5a635/critical-cve-2026-42880-in-argo-cd-v3.2.0-3.2.10-3.3.0-3.3.8-allows-attackers-with-read-only-access-to-extract-plaintext-kubernetes-secrets-via-the-serversidediff-endpoint.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/88b9c954-928b-4b41-b489-c0d474c5a635/critical-cve-2026-42880-in-argo-cd-v3.2.0-3.2.10-3.3.0-3.3.8-allows-attackers-with-read-only-access-to-extract-plaintext-kubernetes-secrets-via-the-serversidediff-endpoint.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>