<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent entries from cvelistv5</title>
    <link>https://0.0.0.0:10001</link>
    <description>Contains only the most 10 recent entries.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 13 May 2026 18:25:25 +0000</lastBuildDate>
    <item>
      <title>cve-2026-7749</title>
      <link>https://0.0.0.0:10001/vuln/cve-2026-7749</link>
      <description>Totolink N300RH POST Request cstecgi.cgi setWanConfig buffer overflow</description>
      <content:encoded>Totolink N300RH POST Request cstecgi.cgi setWanConfig buffer overflow</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/cve-2026-7749</guid>
      <pubDate>Mon, 04 May 2026 08:45:11 +0000</pubDate>
    </item>
    <item>
      <title>cve-2026-7750</title>
      <link>https://0.0.0.0:10001/vuln/cve-2026-7750</link>
      <description>Totolink N300RH POST Request cstecgi.cgi setMacFilterRules buffer overflow</description>
      <content:encoded>Totolink N300RH POST Request cstecgi.cgi setMacFilterRules buffer overflow</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/cve-2026-7750</guid>
      <pubDate>Mon, 04 May 2026 09:00:17 +0000</pubDate>
    </item>
    <item>
      <title>cve-2026-33846</title>
      <link>https://0.0.0.0:10001/vuln/cve-2026-33846</link>
      <description>Gnutls: gnutls: denial of service via heap buffer overflow in dtls handshake fragment reassembly</description>
      <content:encoded>Gnutls: gnutls: denial of service via heap buffer overflow in dtls handshake fragment reassembly</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/cve-2026-33846</guid>
      <pubDate>Mon, 04 May 2026 09:08:51 +0000</pubDate>
    </item>
    <item>
      <title>cve-2026-3120</title>
      <link>https://0.0.0.0:10001/vuln/cve-2026-3120</link>
      <description>RCE in Profelis Informatics' SambaBox</description>
      <content:encoded>RCE in Profelis Informatics' SambaBox</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/cve-2026-3120</guid>
      <pubDate>Mon, 04 May 2026 11:53:27 +0000</pubDate>
    </item>
    <item>
      <title>cve-2026-24072</title>
      <link>https://0.0.0.0:10001/vuln/cve-2026-24072</link>
      <description>Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr</description>
      <content:encoded>Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/cve-2026-24072</guid>
      <pubDate>Mon, 04 May 2026 12:37:57 +0000</pubDate>
    </item>
    <item>
      <title>cve-2026-7482</title>
      <link>https://0.0.0.0:10001/vuln/cve-2026-7482</link>
      <description>Ollama heap out-of-bounds read in GGUF tensor parsing leaks server process memory to unauthenticated remote attackers</description>
      <content:encoded>Ollama heap out-of-bounds read in GGUF tensor parsing leaks server process memory to unauthenticated remote attackers</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/cve-2026-7482</guid>
      <pubDate>Mon, 04 May 2026 12:38:28 +0000</pubDate>
    </item>
    <item>
      <title>cve-2026-34059</title>
      <link>https://0.0.0.0:10001/vuln/cve-2026-34059</link>
      <description>Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in  ajp_parse_data()</description>
      <content:encoded>Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in  ajp_parse_data()</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/cve-2026-34059</guid>
      <pubDate>Mon, 04 May 2026 12:39:42 +0000</pubDate>
    </item>
    <item>
      <title>cve-2026-34032</title>
      <link>https://0.0.0.0:10001/vuln/cve-2026-34032</link>
      <description>Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string)</description>
      <content:encoded>Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string)</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/cve-2026-34032</guid>
      <pubDate>Mon, 04 May 2026 12:54:54 +0000</pubDate>
    </item>
    <item>
      <title>cve-2026-33857</title>
      <link>https://0.0.0.0:10001/vuln/cve-2026-33857</link>
      <description>Apache HTTP Server: Off-by-one OOB reads in AJP getter functions</description>
      <content:encoded>Apache HTTP Server: Off-by-one OOB reads in AJP getter functions</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/cve-2026-33857</guid>
      <pubDate>Mon, 04 May 2026 13:07:30 +0000</pubDate>
    </item>
    <item>
      <title>cve-2025-58074</title>
      <link>https://0.0.0.0:10001/vuln/cve-2025-58074</link>
      <description></description>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/cve-2025-58074</guid>
      <pubDate>Mon, 04 May 2026 13:11:08 +0000</pubDate>
    </item>
  </channel>
</rss>
