<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with apachemina]]></title><description><![CDATA[A list of topics that have been tagged with apachemina]]></description><link>https://board.circlewithadot.net/tags/apachemina</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 00:08:12 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/apachemina.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[🚨 CRITICAL: CVE-2026-42779 in Apache MINA (2.1.0 – 2.1.11 &amp;amp; 2.2.0 – 2.2.6) enables remote code execution via deserialization of untrusted data.]]></title><description><![CDATA[ CRITICAL: CVE-2026-42779 in Apache MINA (2.1.0 – 2.1.11 &amp; 2.2.0 – 2.2.6) enables remote code execution via deserialization of untrusted data. Upgrade to 2.1.12/2.2.7 now! https://radar.offseq.com/threat/cve-2026-42779-cwe-502-deserialization-of-untruste-d7661188 #OffSeq #ApacheMINA #Vuln #Infosec]]></description><link>https://board.circlewithadot.net/topic/933a6ba7-1c22-4691-a9a0-e653b1a44436/critical-cve-2026-42779-in-apache-mina-2.1.0-2.1.11-amp-2.2.0-2.2.6-enables-remote-code-execution-via-deserialization-of-untrusted-data.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/933a6ba7-1c22-4691-a9a0-e653b1a44436/critical-cve-2026-42779-in-apache-mina-2.1.0-2.1.11-amp-2.2.0-2.2.6-enables-remote-code-execution-via-deserialization-of-untrusted-data.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>