<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cve-2026-2701 on cybercrime.club</title><link>https://cybercrime.club/tags/cve-2026-2701/</link><description>Recent content in Cve-2026-2701 on cybercrime.club</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 04 Apr 2026 10:08:59 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/cve-2026-2701/index.xml" rel="self" type="application/rss+xml"/><item><title>Progress ShareFile Pre-Auth RCE Chain: CVE-2026-2699 and CVE-2026-2701 Give Attackers Full Server Takeover</title><link>https://cybercrime.club/posts/progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/</link><pubDate>Sat, 04 Apr 2026 10:08:59 -0400</pubDate><guid>https://cybercrime.club/posts/progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/</guid><description>&lt;p>Two critical vulnerabilities in Progress ShareFile&amp;rsquo;s Storage Zones Controller (SZC) can be chained together to achieve pre-authentication remote code execution, giving attackers complete control over enterprise file-sharing infrastructure with zero credentials required. With proof-of-concept code published on April 2 and roughly 30,000 SZC instances exposed on the public internet, this is a patch-now situation.&lt;/p>
&lt;h2 id="the-vulnerabilities">The Vulnerabilities&lt;/h2>
&lt;p>Researchers at watchTowr discovered the pair of flaws in the SZC component present in ShareFile branch 5.x:&lt;/p></description></item></channel></rss>