<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>magikh0e.pl</title>
  <subtitle>Security research, exploits, and hardware hacking</subtitle>
  <link href="https://magikh0e.pl/" rel="alternate"/>
  <link href="https://magikh0e.pl/feed.xml" rel="self"/>
  <id>https://magikh0e.pl/</id>
  <updated>2026-04-18T00:32:15Z</updated>
  <author>
    <name>magikh0e</name>
  </author>
  <entry>
    <title>21nails.txt</title>
    <link href="https://magikh0e.pl/exploits/2026/February/21nails.txt" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/21nails.txt</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>21Nails: Multiple vulnerabilities in Exim</summary>
  </entry>
  <entry>
    <title>Ashwesker-CVE-2026-22794-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/January/Ashwesker-CVE-2026-22794-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/Ashwesker-CVE-2026-22794-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>🔥 CVE-2026-22794 — Critical Account Takeover Vulnerability (CVE-2026-22794)</summary>
  </entry>
  <entry>
    <title>Ashwesker-CVE-2026-22794-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/January/Ashwesker-CVE-2026-22794-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/Ashwesker-CVE-2026-22794-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>🔥 CVE-2026-22794 — Critical Account Takeover Vulnerability</summary>
  </entry>
  <entry>
    <title>BeatXP_Vega_Smartwatch_Security_Assessment_Report.pdf</title>
    <link href="https://magikh0e.pl/exploits/2026/January/BeatXP_Vega_Smartwatch_Security_Assessment_Report.pdf" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/BeatXP_Vega_Smartwatch_Security_Assessment_Report.pdf</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>January 2026</summary>
  </entry>
  <entry>
    <title>CVE-2018-1207-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2018-1207-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2018-1207-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Exploit PoC for CVE-2018-1207: Dell iDRAC7/iDRAC8 RCE (Reverse Shell) (CVE-2018-1207)</summary>
  </entry>
  <entry>
    <title>CVE-2018-1207-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2018-1207-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2018-1207-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Exploit PoC for CVE-2018-1207: Dell iDRAC7/iDRAC8 RCE (Reverse Shell)</summary>
  </entry>
  <entry>
    <title>CVE-2020-10558-master.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2020-10558-master.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2020-10558-master.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2020-10558: Tesla Model S/3/X Denial of Service (DoS) (CVE-2020-10558)</summary>
  </entry>
  <entry>
    <title>CVE-2020-10558-master.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2020-10558-master.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2020-10558-master.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2020-10558: Tesla Model S/3/X Denial of Service (DoS)</summary>
  </entry>
  <entry>
    <title>CVE-2020-12124-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2020-12124-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2020-12124-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Anatomy of an IoT Exploit, from Hands-On to RCE (CVE-2020-12124)</summary>
  </entry>
  <entry>
    <title>CVE-2020-12124-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2020-12124-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2020-12124-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Anatomy of an IoT Exploit, from Hands-On to RCE</summary>
  </entry>
  <entry>
    <title>CVE-2020-5902-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2020-5902-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2020-5902-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt; (CVE-2020-5902)</summary>
  </entry>
  <entry>
    <title>CVE-2020-5902-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2020-5902-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2020-5902-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>&lt;div align="center"&gt;</summary>
  </entry>
  <entry>
    <title>CVE-2023-28432-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-28432-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-28432-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Minio Environment Variables Exploit (CVE-2023-28432) (CVE-2023-28432)</summary>
  </entry>
  <entry>
    <title>CVE-2023-28432-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-28432-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-28432-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Minio Environment Variables Exploit (CVE-2023-28432)</summary>
  </entry>
  <entry>
    <title>CVE-2023-33730-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33730-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33730-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33730 — eScan Management Console Privilege Escalation (CVE-2023-33730)</summary>
  </entry>
  <entry>
    <title>CVE-2023-33730-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33730-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33730-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33730 — eScan Management Console Privilege Escalation</summary>
  </entry>
  <entry>
    <title>CVE-2023-33731-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33731-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33731-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33731 — eScan Management Console: Reflected Cross-Site Scripting (XSS) (CVE-2023-33731)</summary>
  </entry>
  <entry>
    <title>CVE-2023-33731-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33731-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33731-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33731 — eScan Management Console: Reflected Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-33732-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33732-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33732-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33732 — Reflected Cross-Site Scripting in eScan Management Console (CVE-2023-33732)</summary>
  </entry>
  <entry>
    <title>CVE-2023-33732-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33732-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33732-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33732 — Reflected Cross-Site Scripting in eScan Management Console</summary>
  </entry>
  <entry>
    <title>CVE-2023-3452.html</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2023-3452.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2023-3452.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-3452 - WordPress Canto Plugin RCE (CVE-2023-3452)</summary>
  </entry>
  <entry>
    <title>CVE-2023-3452.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2023-3452.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2023-3452.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-3452 - WordPress Canto Plugin RCE</summary>
  </entry>
  <entry>
    <title>CVE-2023-34632-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34632-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34632-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Reflected XSS in 1000projects Book Management System 1.0 (CVE-2023-34632)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34632-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34632-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34632-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Reflected XSS in 1000projects Book Management System 1.0</summary>
  </entry>
  <entry>
    <title>CVE-2023-34835-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34835-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34835-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34835 — eScan Management Console: Reflected Cross-Site Scripting (XSS) (CVE-2023-34835)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34835-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34835-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34835-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34835 — eScan Management Console: Reflected Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34836-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34836-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34836-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34836 — eScan Management Console 14.0.1400.2281: Reflected Cross-Site Scripting (XSS) (CVE-2023-34836)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34836-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34836-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34836-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34836 — eScan Management Console 14.0.1400.2281: Reflected Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34837-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34837-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34837-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34837 — eScan Management Console: Reflected Cross-Site Scripting (XSS) (CVE-2023-34837)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34837-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34837-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34837-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34837 — eScan Management Console: Reflected Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34838-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34838-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34838-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34838 — eScan Management Console Stored XSS (CVE-2023-34838)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34838-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34838-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34838-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34838 — eScan Management Console Stored XSS</summary>
  </entry>
  <entry>
    <title>CVE-2023-35082-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-35082-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-35082-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>🕵️ Vulnerability Scanner 🛡️ (CVE-2023-35082)</summary>
  </entry>
  <entry>
    <title>CVE-2023-35082-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-35082-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-35082-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>🕵️ Vulnerability Scanner 🛡️</summary>
  </entry>
  <entry>
    <title>CVE-2023-3519-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-3519-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-3519-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Citrix ADC RCE CVE-2023-3519 Exploit Guide (CVE-2023-3519)</summary>
  </entry>
  <entry>
    <title>CVE-2023-3519-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-3519-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-3519-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Citrix ADC RCE CVE-2023-3519 Exploit Guide</summary>
  </entry>
  <entry>
    <title>CVE-2023-36846-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-36846-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-36846-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Remote Code Execution in Juniper JunOS (SRX and EX Series) - CVE-2023-36846 Exploit (CVE-2023-36846)</summary>
  </entry>
  <entry>
    <title>CVE-2023-36846-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-36846-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-36846-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Remote Code Execution in Juniper JunOS (SRX and EX Series) - CVE-2023-36846 Exploit</summary>
  </entry>
  <entry>
    <title>CVE-2023-37189-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37189-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37189-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37189 — Issabel PBX 4.0.0-6 Stored Cross-Site Scripting (XSS) (CVE-2023-37189)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37189-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37189-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37189-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37189 — Issabel PBX 4.0.0-6 Stored Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37190-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37190-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37190-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37190 — Issabel-PBX 4.0.0-6: Stored Cross-Site Scripting (XSS) (CVE-2023-37190)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37190-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37190-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37190-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37190 — Issabel-PBX 4.0.0-6: Stored Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37191-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37191-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37191-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37191 — Issabel PBX 4.0.0-6: Stored Cross-Site Scripting (XSS) (CVE-2023-37191)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37191-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37191-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37191-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37191 — Issabel PBX 4.0.0-6: Stored Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37596-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37596-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37596-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37596 — issabel-pbx 4.0.0-6: Cross-Site Request Forgery (CSRF) — Delete Any User (CVE-2023-37596)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37596-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37596-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37596-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37596 — issabel-pbx 4.0.0-6: Cross-Site Request Forgery (CSRF) — Delete Any User</summary>
  </entry>
  <entry>
    <title>CVE-2023-37597-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37597-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37597-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37597 — issabel-pbx 4.0.0-6: Cross-Site Request Forgery (CSRF) — Delete User Group (CVE-2023-37597)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37597-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37597-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37597-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37597 — issabel-pbx 4.0.0-6: Cross-Site Request Forgery (CSRF) — Delete User Group</summary>
  </entry>
  <entry>
    <title>CVE-2023-37598-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37598-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37598-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37598 — issabel-pbx 4.0.0-6: Cross-Site Request Forgery (CSRF) (CVE-2023-37598)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37598-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37598-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37598-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37598 — issabel-pbx 4.0.0-6: Cross-Site Request Forgery (CSRF)</summary>
  </entry>
</feed>
