<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T22:39:35.348937+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cc903a22-8d64-489a-b951-6f0dfcacdf35/export</id>
    <title>cc903a22-8d64-489a-b951-6f0dfcacdf35</title>
    <updated>2026-05-09T22:39:35.764141+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "cc903a22-8d64-489a-b951-6f0dfcacdf35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/cpanel-security-advisory-av26-437", "content": "", "creation_timestamp": "2026-05-08T11:49:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cc903a22-8d64-489a-b951-6f0dfcacdf35/export"/>
    <published>2026-05-08T11:49:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2b9ff958-ec79-4b8b-b155-ca164bfc4011/export</id>
    <title>2b9ff958-ec79-4b8b-b155-ca164bfc4011</title>
    <updated>2026-05-09T22:39:35.762539+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "2b9ff958-ec79-4b8b-b155-ca164bfc4011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus-2026-13?mtm_campaign=rss&amp;amp;mtm_source=rss&amp;amp;mtm_medium=rss", "content": "", "creation_timestamp": "2026-05-08T12:13:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2b9ff958-ec79-4b8b-b155-ca164bfc4011/export"/>
    <published>2026-05-08T12:13:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cae16f27-3c33-40fe-94b0-ea3aec8f0f44/export</id>
    <title>cae16f27-3c33-40fe-94b0-ea3aec8f0f44</title>
    <updated>2026-05-09T22:39:35.762420+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cae16f27-3c33-40fe-94b0-ea3aec8f0f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/116539015130620185", "content": "Rien ne dit \u201cbon week-end\u201d comme trois CVE cPanel annonc\u00e9es un vendredi, avec les d\u00e9tails techniques livr\u00e9s pile au moment du patch --&amp;gt;c\u2019est-\u00e0-dire \u00e0 18h, l\u2019heure sacr\u00e9e de l\u2019ap\u00e9ro.\nSant\u00e9 aux admins qui vont lancer /scripts/upcp avec une main sur le clavier et l\u2019autre sur le verre. \ud83d\udc47**\"To help protect customers prior to patch availability, technical details about vulnerabilities will be released alongside the patches. Full technical details will be published on our support page at the same time the patch is released. The CVE IDs are CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203. \nPatch &amp;amp; Affected Versions The patch will be available on May 08 at 12:00pm EST and will be distributed through the standard cPanel automatic update process and through the manual update process. We strongly recommend performing a manual update with /scripts/upcp once the patch is made available.\"**\ud83d\udc47 https://www.reddit.com/r/cpanel/comments/1t6wf5n/cpanel_whm_security_update_cve202629201/\n#CpanelVulnerability #cpanel #CyberVeille #vuln #infosec", "creation_timestamp": "2026-05-08T12:44:10.305859Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cae16f27-3c33-40fe-94b0-ea3aec8f0f44/export"/>
    <published>2026-05-08T12:44:10.305859+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a26d8bad-4197-4d86-9d66-495a771d3e10/export</id>
    <title>a26d8bad-4197-4d86-9d66-495a771d3e10</title>
    <updated>2026-05-09T22:39:35.762323+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a26d8bad-4197-4d86-9d66-495a771d3e10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/openfactory.peering.social.ap.brid.gy/post/3mle5fdes5pb2", "content": "Unser t\u00e4glich CVE Emergency patch gib uns heute\n\nCVE-2026-29201, CVE-2026-29202, and CVE-2026-29203\n\nFun times.", "creation_timestamp": "2026-05-08T16:25:02.043569Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a26d8bad-4197-4d86-9d66-495a771d3e10/export"/>
    <published>2026-05-08T16:25:02.043569+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9335e0b6-cc05-468f-9164-4e20331c0111/export</id>
    <title>9335e0b6-cc05-468f-9164-4e20331c0111</title>
    <updated>2026-05-09T22:39:35.762177+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9335e0b6-cc05-468f-9164-4e20331c0111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlekt3kq262w", "content": "\ud83d\udfe0 CVE-2026-29203 - High (8.8)\n\nA chmod call in the cPanel Nova plugin's Cpanel::Nova::Connector follows symlinks, allowing setti...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29203/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T20:25:20.999730Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9335e0b6-cc05-468f-9164-4e20331c0111/export"/>
    <published>2026-05-08T20:25:20.999730+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f8f166ee-e562-42de-aef0-79e23c6dd68a/export</id>
    <title>f8f166ee-e562-42de-aef0-79e23c6dd68a</title>
    <updated>2026-05-09T22:39:35.761974+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f8f166ee-e562-42de-aef0-79e23c6dd68a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlepsmramd2t", "content": "cPanel Nova\u30d7\u30e9\u30b0\u30a4\u30f3\u306echmod\u51e6\u7406\u3067\u30b7\u30f3\u30dc\u30ea\u30c3\u30af\u30ea\u30f3\u30af\u3092\u8fbf\u308a\u3001\u4efb\u610f\u30d5\u30a1\u30a4\u30eb\u306broot\u6a29\u9650\u304c\u4ed8\u4e0e\u3055\u308c\u308b\u8106\u5f31\u6027\u3002\u8a8d\u8a3c\u6e08\u307f\u30e6\u30fc\u30b6\u30fc\u304c\u3001\u30db\u30fc\u30e0\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u4e0b\u306e\u30ec\u30ac\u30b7\u30fcNova\u30d1\u30b9\u306b\u30b7\u30f3\u30dc\u30ea\u30c3\u30af\u2026\nCVE-2026-29203 CVSS 8.8 | HIGH", "creation_timestamp": "2026-05-08T21:54:33.627576Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f8f166ee-e562-42de-aef0-79e23c6dd68a/export"/>
    <published>2026-05-08T21:54:33.627576+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0fe2044c-c367-499b-bbb1-3b12b1012026/export</id>
    <title>0fe2044c-c367-499b-bbb1-3b12b1012026</title>
    <updated>2026-05-09T22:39:35.757815+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0fe2044c-c367-499b-bbb1-3b12b1012026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/116544182422691954", "content": "Spoiler de l'\u00e9pisode de hier : cPanel a bien livr\u00e9 les d\u00e9tails techniques en m\u00eame temps que les patchs. Au menu de l'after :\n\u2022 CVE-2026-29201 : path traversal :8bitrainbow:  via feature::LOADFEATUREFILE \u2192 fichier arbitraire en world-readable\u2022 CVE-2026-29202 : injection Perl dans create_user (param\u00e8tre plugin)\u2022 CVE-2026-29203 : symlink mal g\u00e9r\u00e9 \u2192 chmod arbitraire \u2192 DoS + escalade de privil\u00e8ges\n/scripts/upcp et go apero!Bon courage aux admins de garde \ud83e\udee1\nhttps://docs.cpanel.net/changelogs/134-change-log/#134025\nhttps://vulnerability.circl.lu/vuln/CVE-2026-29203\n#CyberVeille #cpanel #CVE_2026_29203#CVE_2026_29202#CVE_2026_29201", "creation_timestamp": "2026-05-09T10:38:17.359819Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0fe2044c-c367-499b-bbb1-3b12b1012026/export"/>
    <published>2026-05-09T10:38:17.359819+00:00</published>
  </entry>
</feed>
