
  <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
      <title>m0n1x90</title>
      <link>https://m0n1x90.dev/blog</link>
      <description>Offensive security blog by m0n1x90 covering red teaming, Active Directory attacks, malware development, shellcoding, exploit development and infrastructure pentesting</description>
      <language>en-us</language>
      <managingEditor>m0n1x90@outlook.in (m0n1x90)</managingEditor>
      <webMaster>m0n1x90@outlook.in (m0n1x90)</webMaster>
      <lastBuildDate>Sun, 24 May 2026 00:00:00 GMT</lastBuildDate>
      <atom:link href="https://m0n1x90.dev/tags/vulnerability-research/feed.xml" rel="self" type="application/rss+xml"/>
      
  <item>
    <guid>https://m0n1x90.dev/blog/vr/cve-2026-41096</guid>
    <title>CVE-2026-41096: Heap Overflow in the Windows DNS Client</title>
    <link>https://m0n1x90.dev/blog/vr/cve-2026-41096</link>
    <description>A debugging approach on CVE-2026-41096</description>
    <pubDate>Sun, 24 May 2026 00:00:00 GMT</pubDate>
    <author>m0n1x90@outlook.in (m0n1x90)</author>
    <category>offsec</category><category>vulnerability-research</category><category>windows</category>
  </item>

    </channel>
  </rss>
