<?xml version="1.0" encoding="utf-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>NULL CATHEDRAL - Css</title><link>https://nullcathedral.com/tags/css/</link><description>Where nothing is sacred.</description><language>en-us</language><copyright>NULL CATHEDRAL</copyright><pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate><lastBuildDate>Fri, 10 Apr 2026 18:00:00 +0000</lastBuildDate><docs>https://www.rssboard.org/rss-specification</docs><ttl>60</ttl><atom:link href="https://nullcathedral.com/tags/css/feed.xml" rel="self" type="application/rss+xml"/><image><url>https://nullcathedral.com/favicon.svg</url><title>NULL CATHEDRAL</title><link>https://nullcathedral.com/</link></image><item><title>Roundcube round two: three more sanitizer bypasses</title><link>https://nullcathedral.com/posts/2026-03-18-roundcube-round-two-three-more-sanitizer-bypasses/</link><description>Three more bypasses in Roundcube's HTML sanitizer: SMIL animation attributes load remote resources, unquoted body backgrounds enable CSS injection, and position:fixed !important enables phishing overlays.</description><category>vulnerability</category><category>roundcube</category><category>svg</category><category>css</category><category>email-security</category><guid isPermaLink="true">https://nullcathedral.com/posts/2026-03-18-roundcube-round-two-three-more-sanitizer-bypasses/</guid><pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate></item></channel></rss>