<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>RCE on gryfman</title><link>https://gryfman.fr/tags/rce/</link><description>Recent content in RCE on gryfman</description><generator>Hugo</generator><language>en-us</language><managingEditor>sussetnoe2004@gmail.com (gryfman)</managingEditor><webMaster>sussetnoe2004@gmail.com (gryfman)</webMaster><lastBuildDate>Mon, 27 Apr 2026 00:00:05 +0200</lastBuildDate><atom:link href="https://gryfman.fr/tags/rce/index.xml" rel="self" type="application/rss+xml"/><item><title>ZipSlip RCE plugin: CVE-2026-41463</title><link>https://gryfman.fr/cves/cve-2026-41463/</link><pubDate>Mon, 27 Apr 2026 00:00:05 +0200</pubDate><author>sussetnoe2004@gmail.com (gryfman)</author><guid>https://gryfman.fr/cves/cve-2026-41463/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;During the same security research on ProjeQtOr, we identified another interesting vulnerability, this time in the plugin upload mechanism.&lt;/p&gt;
&lt;p&gt;I already introduced what ProjeQtOr is and why it can contain sensitive business data in the first article of this series: 
&lt;a href="https://gryfman.fr/cves/cve-2026-41462"&gt;From login to admin : CVE-2026-41462&lt;/a&gt;
.&lt;/p&gt;
&lt;p&gt;This vulnerability is different from the SQL injection one. Instead of attacking the database directly, it abuses the way the application extracts uploaded plugin archives.&lt;/p&gt;</description></item></channel></rss>