<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://0.0.0.0:10001/rss/recent/cvelistv5/10</id>
  <title>Most recent entries from cvelistv5</title>
  <updated>2026-05-13T17:11:29.664407+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://0.0.0.0:10001" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent entries.</subtitle>
  <entry>
    <id>https://0.0.0.0:10001/vuln/cve-2026-7749</id>
    <title>cve-2026-7749</title>
    <updated>2026-05-04T08:45:11.639000+00:00</updated>
    <content>Totolink N300RH POST Request cstecgi.cgi setWanConfig buffer overflow</content>
    <link href="https://0.0.0.0:10001/vuln/cve-2026-7749"/>
    <published>2026-05-04T08:45:11.639000+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/cve-2026-7750</id>
    <title>cve-2026-7750</title>
    <updated>2026-05-04T09:00:17.932000+00:00</updated>
    <content>Totolink N300RH POST Request cstecgi.cgi setMacFilterRules buffer overflow</content>
    <link href="https://0.0.0.0:10001/vuln/cve-2026-7750"/>
    <published>2026-05-04T09:00:17.932000+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/cve-2026-33846</id>
    <title>cve-2026-33846</title>
    <updated>2026-05-04T09:08:51.710000+00:00</updated>
    <content>Gnutls: gnutls: denial of service via heap buffer overflow in dtls handshake fragment reassembly</content>
    <link href="https://0.0.0.0:10001/vuln/cve-2026-33846"/>
    <published>2026-05-04T09:08:51.710000+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/cve-2026-3120</id>
    <title>cve-2026-3120</title>
    <updated>2026-05-04T11:53:27.437000+00:00</updated>
    <content>RCE in Profelis Informatics' SambaBox</content>
    <link href="https://0.0.0.0:10001/vuln/cve-2026-3120"/>
    <published>2026-05-04T11:53:27.437000+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/cve-2026-24072</id>
    <title>cve-2026-24072</title>
    <updated>2026-05-04T12:37:57.673000+00:00</updated>
    <content>Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr</content>
    <link href="https://0.0.0.0:10001/vuln/cve-2026-24072"/>
    <published>2026-05-04T12:37:57.673000+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/cve-2026-7482</id>
    <title>cve-2026-7482</title>
    <updated>2026-05-04T12:38:28.464000+00:00</updated>
    <content>Ollama heap out-of-bounds read in GGUF tensor parsing leaks server process memory to unauthenticated remote attackers</content>
    <link href="https://0.0.0.0:10001/vuln/cve-2026-7482"/>
    <published>2026-05-04T12:38:28.464000+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/cve-2026-34059</id>
    <title>cve-2026-34059</title>
    <updated>2026-05-04T12:39:42.273000+00:00</updated>
    <content>Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in  ajp_parse_data()</content>
    <link href="https://0.0.0.0:10001/vuln/cve-2026-34059"/>
    <published>2026-05-04T12:39:42.273000+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/cve-2026-34032</id>
    <title>cve-2026-34032</title>
    <updated>2026-05-04T12:54:54.383000+00:00</updated>
    <content>Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string)</content>
    <link href="https://0.0.0.0:10001/vuln/cve-2026-34032"/>
    <published>2026-05-04T12:54:54.383000+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/cve-2026-33857</id>
    <title>cve-2026-33857</title>
    <updated>2026-05-04T13:07:30.753000+00:00</updated>
    <content>Apache HTTP Server: Off-by-one OOB reads in AJP getter functions</content>
    <link href="https://0.0.0.0:10001/vuln/cve-2026-33857"/>
    <published>2026-05-04T13:07:30.753000+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/cve-2025-58074</id>
    <title>cve-2025-58074</title>
    <updated>2026-05-04T13:11:08.628000+00:00</updated>
    <content/>
    <link href="https://0.0.0.0:10001/vuln/cve-2025-58074"/>
    <published>2026-05-04T13:11:08.628000+00:00</published>
  </entry>
</feed>
