<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>cybercrime.club</title><link>https://cybercrime.club/tags/aspnet-core/</link><description>Infrastructure security news for people who build infrastructure.</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sat, 25 Apr 2026 11:09:39 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/aspnet-core/" rel="self" type="application/rss+xml"/><item><title>ASP.NET Core CVE-2026-40372: Signature-Bypass in DataProtection Forges Auth Cookies, Patching Alone Doesn't Close the Door</title><link>https://cybercrime.club/posts/aspnet-core-cve-2026-40372-dataprotection-signature-bypass/</link><pubDate>Sat, 25 Apr 2026 11:09:39 -0400</pubDate><guid>https://cybercrime.club/posts/aspnet-core-cve-2026-40372-dataprotection-signature-bypass/</guid><description>Microsoft's out-of-band patch fixes a CVSS 9.1 signature-verification bug in ASP.NET Core DataProtection that lets unauthenticated attackers forge cookies and decrypt protected payloads. Tokens minted during the exposure window stay valid after upgrade — you have to rotate the key ring.</description><category>vulnerability</category></item></channel></rss>