<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[🔴 New security advisory:]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f534.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--red_circle" style="height:23px;width:auto;vertical-align:middle" title="🔴" alt="🔴" /> New security advisory:</p><p>CVE-2026-41679 affects multiple systems.</p><p>• Impact: Remote code execution or complete system compromise possible<br />• Risk: Attackers can gain full control of affected systems<br />• Mitigation: Patch immediately or isolate affected systems</p><p>Full breakdown:<br /><a href="https://www.yazoul.net/advisory/cve/cve-2026-41679-paperclip-unauthenticated-remote-code-execution" rel="nofollow noopener"><span>https://www.</span><span>yazoul.net/advisory/cve/cve-20</span><span>26-41679-paperclip-unauthenticated-remote-code-execution</span></a></p><p><a href="https://infosec.exchange/tags/InfoSec" rel="tag">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/ZeroDay" rel="tag">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/4d773598-770e-461a-abc6-1ada5bb25817/new-security-advisory</link><generator>RSS for Node</generator><lastBuildDate>Thu, 30 Apr 2026 17:01:58 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/4d773598-770e-461a-abc6-1ada5bb25817.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 23 Apr 2026 08:19:59 GMT</pubDate><ttl>60</ttl></channel></rss>