<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[&quot;PhantomRPC: A new privilege escalation technique in Windows RPC&quot;:]]></title><description><![CDATA[<p>"PhantomRPC: A new privilege escalation technique in Windows RPC":</p><p><a href="https://securelist.com/phantomrpc-rpc-vulnerability/119428/" rel="nofollow noopener"><span>https://</span><span>securelist.com/phantomrpc-rpc-</span><span>vulnerability/119428/</span></a></p><p>Unpatched.</p>]]></description><link>https://board.circlewithadot.net/topic/173adf42-fd52-4996-a021-9a18bdfdef49/phantomrpc-a-new-privilege-escalation-technique-in-windows-rpc</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 06:09:30 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/173adf42-fd52-4996-a021-9a18bdfdef49.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 27 Apr 2026 16:04:26 GMT</pubDate><ttl>60</ttl></channel></rss>