<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with cve202632661]]></title><description><![CDATA[A list of topics that have been tagged with cve202632661]]></description><link>https://board.circlewithadot.net/tags/cve202632661</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 07:05:50 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/cve202632661.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[🚨 CRITICAL: CVE-2026-32661 stack buffer overflow in Canon GUARDIANWALL MailSuite (v1.4.00 – 2.4.26).]]></title><description><![CDATA[ CRITICAL: CVE-2026-32661 stack buffer overflow in Canon GUARDIANWALL MailSuite (v1.4.00 – 2.4.26). Remote code execution possible. Restrict network access &amp; monitor pop3wallpasswd. Patch pending. https://radar.offseq.com/threat/cve-2026-32661-stack-based-buffer-overflow-in-cano-fe8551b1 #OffSeq #CVE202632661 #infosec #vuln]]></description><link>https://board.circlewithadot.net/topic/6374a529-7f93-4234-a163-91709b044715/critical-cve-2026-32661-stack-buffer-overflow-in-canon-guardianwall-mailsuite-v1.4.00-2.4.26-.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/6374a529-7f93-4234-a163-91709b044715/critical-cve-2026-32661-stack-buffer-overflow-in-canon-guardianwall-mailsuite-v1.4.00-2.4.26-.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>