<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>magikh0e.pl</title>
  <subtitle>Security research, exploits, and hardware hacking</subtitle>
  <link href="https://magikh0e.pl/" rel="alternate"/>
  <link href="https://magikh0e.pl/feed.xml" rel="self"/>
  <id>https://magikh0e.pl/</id>
  <updated>2026-05-17T02:25:23Z</updated>
  <author>
    <name>magikh0e</name>
  </author>
  <entry>
    <title>21nails.txt</title>
    <link href="https://magikh0e.pl/exploits/2026/February/21nails.txt" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/21nails.txt</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>21Nails: Multiple vulnerabilities in Exim</summary>
  </entry>
  <entry>
    <title>2k.sh</title>
    <link href="https://magikh0e.pl/pubCarHacking/scripts/2k.txt" rel="alternate"/>
    <id>https://magikh0e.pl/pubCarHacking/scripts/2k.txt</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Holds engine RPM at 2000 via UDS Service 0x31 (RoutineControl) on the Engine Control Module ($7E0 / $7E8). Press Ctrl+C to release. Differences from the horn / brake-light demos: - Target ECM uses OBD-II-style 11-bit IDs ($7E0 / $7E8), not the FCA-internal $620 / $504 BCM pair. - Session sub-function 0x92 (Chrysler manufacturer-specific), not 0x03 (extended). - Service 0x31 (RoutineControl, startR</summary>
  </entry>
  <entry>
    <title>3rd_brakelight.sh</title>
    <link href="https://magikh0e.pl/pubCarHacking/scripts/3rd_brakelight.txt" rel="alternate"/>
    <id>https://magikh0e.pl/pubCarHacking/scripts/3rd_brakelight.txt</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Demo of UDS Service 0x2F (IOControlByIdentifier) on a JEEP platform — toggles the cargo-area / 3rd brake light on and off via the request sequence walked through in the Bus &amp; Message Reference : NM wake → Extended Diagnostic Session → IOControl ON → IOControl OFF, plus a background TesterPresent keepalive so the ECU's S3 timer doesn't drop the session and a SIGINT trap that issues returnControlToE</summary>
  </entry>
  <entry>
    <title>Ashwesker-CVE-2026-22794-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/January/Ashwesker-CVE-2026-22794-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/Ashwesker-CVE-2026-22794-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>🔥 CVE-2026-22794 — Critical Account Takeover Vulnerability (CVE-2026-22794)</summary>
  </entry>
  <entry>
    <title>Ashwesker-CVE-2026-22794-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/January/Ashwesker-CVE-2026-22794-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/Ashwesker-CVE-2026-22794-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>🔥 CVE-2026-22794 — Critical Account Takeover Vulnerability</summary>
  </entry>
  <entry>
    <title>BeatXP_Vega_Smartwatch_Security_Assessment_Report.pdf</title>
    <link href="https://magikh0e.pl/exploits/2026/January/BeatXP_Vega_Smartwatch_Security_Assessment_Report.pdf" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/BeatXP_Vega_Smartwatch_Security_Assessment_Report.pdf</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>January 2026</summary>
  </entry>
  <entry>
    <title>Blackbox_monitor.sh</title>
    <link href="https://magikh0e.pl/pubCarHacking/scripts/Blackbox_monitor.txt" rel="alternate"/>
    <id>https://magikh0e.pl/pubCarHacking/scripts/Blackbox_monitor.txt</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Ignition-state event monitor for a Raspberry Pi in-vehicle setup. Watches $122 on CAN-IHS for OFF→RUN and RUN→OFF transitions, starts/stops a configurable CAN recorder accordingly, shifts the CPU governor between powersave (idle) and ondemand (running), and optionally fires a remote-start HVAC trigger on the first observed OFF→RUN edge so a script restart on an already-running engine doesn't ghost</summary>
  </entry>
  <entry>
    <title>CVE-2018-1207-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2018-1207-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2018-1207-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Exploit PoC for CVE-2018-1207: Dell iDRAC7/iDRAC8 RCE (Reverse Shell) (CVE-2018-1207)</summary>
  </entry>
  <entry>
    <title>CVE-2018-1207-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2018-1207-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2018-1207-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Exploit PoC for CVE-2018-1207: Dell iDRAC7/iDRAC8 RCE (Reverse Shell)</summary>
  </entry>
  <entry>
    <title>CVE-2020-10558-master.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2020-10558-master.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2020-10558-master.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2020-10558: Tesla Model S/3/X Denial of Service (DoS) (CVE-2020-10558)</summary>
  </entry>
  <entry>
    <title>CVE-2020-10558-master.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2020-10558-master.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2020-10558-master.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2020-10558: Tesla Model S/3/X Denial of Service (DoS)</summary>
  </entry>
  <entry>
    <title>CVE-2020-12124-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2020-12124-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2020-12124-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Anatomy of an IoT Exploit, from Hands-On to RCE (CVE-2020-12124)</summary>
  </entry>
  <entry>
    <title>CVE-2020-12124-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2020-12124-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2020-12124-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Anatomy of an IoT Exploit, from Hands-On to RCE</summary>
  </entry>
  <entry>
    <title>CVE-2020-5902-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2020-5902-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2020-5902-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Exploit for CVE-2020-5902</summary>
  </entry>
  <entry>
    <title>CVE-2020-5902-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2020-5902-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2020-5902-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>&lt;div align="center"&gt;</summary>
  </entry>
  <entry>
    <title>CVE-2023-28432-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-28432-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-28432-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Minio Environment Variables Exploit (CVE-2023-28432) (CVE-2023-28432)</summary>
  </entry>
  <entry>
    <title>CVE-2023-28432-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-28432-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-28432-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Minio Environment Variables Exploit (CVE-2023-28432)</summary>
  </entry>
  <entry>
    <title>CVE-2023-33730-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33730-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33730-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33730 — eScan Management Console Privilege Escalation (CVE-2023-33730)</summary>
  </entry>
  <entry>
    <title>CVE-2023-33730-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33730-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33730-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33730 — eScan Management Console Privilege Escalation</summary>
  </entry>
  <entry>
    <title>CVE-2023-33731-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33731-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33731-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33731 — eScan Management Console: Reflected Cross-Site Scripting (XSS) (CVE-2023-33731)</summary>
  </entry>
  <entry>
    <title>CVE-2023-33731-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33731-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33731-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33731 — eScan Management Console: Reflected Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-33732-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33732-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33732-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33732 — Reflected Cross-Site Scripting in eScan Management Console (CVE-2023-33732)</summary>
  </entry>
  <entry>
    <title>CVE-2023-33732-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-33732-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-33732-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-33732 — Reflected Cross-Site Scripting in eScan Management Console</summary>
  </entry>
  <entry>
    <title>CVE-2023-3452.html</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2023-3452.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2023-3452.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-3452 - WordPress Canto Plugin RCE (CVE-2023-3452)</summary>
  </entry>
  <entry>
    <title>CVE-2023-3452.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/March/CVE-2023-3452.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/March/CVE-2023-3452.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-3452 - WordPress Canto Plugin RCE</summary>
  </entry>
  <entry>
    <title>CVE-2023-34632-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34632-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34632-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Reflected XSS in 1000projects Book Management System 1.0 (CVE-2023-34632)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34632-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34632-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34632-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Reflected XSS in 1000projects Book Management System 1.0</summary>
  </entry>
  <entry>
    <title>CVE-2023-34835-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34835-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34835-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34835 — eScan Management Console: Reflected Cross-Site Scripting (XSS) (CVE-2023-34835)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34835-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34835-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34835-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34835 — eScan Management Console: Reflected Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34836-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34836-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34836-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34836 — eScan Management Console 14.0.1400.2281: Reflected Cross-Site Scripting (XSS) (CVE-2023-34836)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34836-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34836-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34836-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34836 — eScan Management Console 14.0.1400.2281: Reflected Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34837-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34837-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34837-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34837 — eScan Management Console: Reflected Cross-Site Scripting (XSS) (CVE-2023-34837)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34837-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34837-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34837-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34837 — eScan Management Console: Reflected Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34838-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34838-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34838-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34838 — eScan Management Console Stored XSS (CVE-2023-34838)</summary>
  </entry>
  <entry>
    <title>CVE-2023-34838-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-34838-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-34838-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-34838 — eScan Management Console Stored XSS</summary>
  </entry>
  <entry>
    <title>CVE-2023-35082-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-35082-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-35082-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>🕵️ Vulnerability Scanner 🛡️ (CVE-2023-35082)</summary>
  </entry>
  <entry>
    <title>CVE-2023-35082-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-35082-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-35082-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>🕵️ Vulnerability Scanner 🛡️</summary>
  </entry>
  <entry>
    <title>CVE-2023-3519-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-3519-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-3519-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Citrix ADC RCE CVE-2023-3519 Exploit Guide (CVE-2023-3519)</summary>
  </entry>
  <entry>
    <title>CVE-2023-3519-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-3519-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-3519-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Citrix ADC RCE CVE-2023-3519 Exploit Guide</summary>
  </entry>
  <entry>
    <title>CVE-2023-36846-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-36846-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-36846-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Remote Code Execution in Juniper JunOS (SRX and EX Series) - CVE-2023-36846 Exploit (CVE-2023-36846)</summary>
  </entry>
  <entry>
    <title>CVE-2023-36846-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/January/CVE-2023-36846-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/January/CVE-2023-36846-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>Remote Code Execution in Juniper JunOS (SRX and EX Series) - CVE-2023-36846 Exploit</summary>
  </entry>
  <entry>
    <title>CVE-2023-37189-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37189-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37189-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37189 — Issabel PBX 4.0.0-6 Stored Cross-Site Scripting (XSS) (CVE-2023-37189)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37189-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37189-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37189-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37189 — Issabel PBX 4.0.0-6 Stored Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37190-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37190-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37190-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37190 — Issabel-PBX 4.0.0-6: Stored Cross-Site Scripting (XSS) (CVE-2023-37190)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37190-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37190-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37190-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37190 — Issabel-PBX 4.0.0-6: Stored Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37191-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37191-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37191-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37191 — Issabel PBX 4.0.0-6: Stored Cross-Site Scripting (XSS) (CVE-2023-37191)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37191-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37191-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37191-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37191 — Issabel PBX 4.0.0-6: Stored Cross-Site Scripting (XSS)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37596-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37596-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37596-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37596 — issabel-pbx 4.0.0-6: Cross-Site Request Forgery (CSRF) — Delete Any User (CVE-2023-37596)</summary>
  </entry>
  <entry>
    <title>CVE-2023-37596-main.zip</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37596-main.zip" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37596-main.zip</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37596 — issabel-pbx 4.0.0-6: Cross-Site Request Forgery (CSRF) — Delete Any User</summary>
  </entry>
  <entry>
    <title>CVE-2023-37597-main.html</title>
    <link href="https://magikh0e.pl/exploits/2026/February/CVE-2023-37597-main.html" rel="alternate"/>
    <id>https://magikh0e.pl/exploits/2026/February/CVE-2023-37597-main.html</id>
    <updated>2026-01-01T00:00:00Z</updated>
    <summary>CVE-2023-37597 — issabel-pbx 4.0.0-6: Cross-Site Request Forgery (CSRF) — Delete User Group (CVE-2023-37597)</summary>
  </entry>
</feed>
