<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-22T16:58:14.539608+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5b3aead9-68d3-4350-bab3-789516a85025/export</id>
    <title>5b3aead9-68d3-4350-bab3-789516a85025</title>
    <updated>2026-05-22T16:58:15.024749+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5b3aead9-68d3-4350-bab3-789516a85025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7261", "type": "seen", "source": "https://bsky.app/profile/remirepo.net/post/3mlczxuq7ac2w", "content": "\ud83d\udee1\ufe0f Security updates:\n\n- php-8.1.34-2 (in the php:remi-8.1 module)\n- php80-php-8.1.34-2 (in the php81 Software Collection)\n\nWith security fixes backported from 8.2.31 (CVE-2026-6735, CVE-2026-7259, CVE-2025-14179, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568, CVE-2026-7258)", "creation_timestamp": "2026-05-08T05:51:09.403794Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5b3aead9-68d3-4350-bab3-789516a85025/export"/>
    <published>2026-05-08T05:51:09.403794+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a146e09b-975b-4e54-8351-d54b51144142/export</id>
    <title>a146e09b-975b-4e54-8351-d54b51144142</title>
    <updated>2026-05-22T16:58:15.024649+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a146e09b-975b-4e54-8351-d54b51144142", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7261", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3mldbcb5xiz22", "content": "8/18\n\nhttps://www.cve.org/CVERecord?id=CVE-2026-6104\n    https://www.cve.org/CVERecord?id=CVE-2025-14179\n    https://www.cve.org/CVERecord?id=CVE-2026-6722\n    https://www.cve.org/CVERecord?id=CVE-2026-7261\n    https://www.cve.org/CVERecord?id=CVE-2026-7262", "creation_timestamp": "2026-05-08T08:02:15.211379Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a146e09b-975b-4e54-8351-d54b51144142/export"/>
    <published>2026-05-08T08:02:15.211379+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7027c6f3-0a9d-4f64-a4af-cc3246ff6908/export</id>
    <title>7027c6f3-0a9d-4f64-a4af-cc3246ff6908</title>
    <updated>2026-05-22T16:58:15.024529+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7027c6f3-0a9d-4f64-a4af-cc3246ff6908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7261", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mli723xvzc2e", "content": "CVE-2026-7261 - SoapServer session-persisted object use-after-free via SOAP header fault\nCVE ID : CVE-2026-7261\n \n Published : May 10, 2026, 5:16 a.m. | 1\u00a0hour, 12\u00a0minutes ago\n \n Description : In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8...", "creation_timestamp": "2026-05-10T07:05:09.828676Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7027c6f3-0a9d-4f64-a4af-cc3246ff6908/export"/>
    <published>2026-05-10T07:05:09.828676+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2a4d14cd-1678-4c35-823a-042b5ea2ef98/export</id>
    <title>2a4d14cd-1678-4c35-823a-042b5ea2ef98</title>
    <updated>2026-05-22T16:58:15.024429+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2a4d14cd-1678-4c35-823a-042b5ea2ef98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7261", "type": "seen", "source": "https://bsky.app/profile/remirepo.net/post/3mlkr672pc225", "content": "\ud83d\udee1\ufe0f Security updates:\n\n- php-8.0.30-16 (in the php:remi-8.0 module)\n- php80-php-8.0.30-16 (in the php80 Software Collection)\n\nWith security fixes backported from 8.1.34 (CVE-2026-6735, CVE-2026-7259, CVE-2025-14179, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568, CVE-2026-7258)", "creation_timestamp": "2026-05-11T07:34:55.114967Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2a4d14cd-1678-4c35-823a-042b5ea2ef98/export"/>
    <published>2026-05-11T07:34:55.114967+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b5053f7d-a877-449d-8e54-57a69b4e6a76/export</id>
    <title>b5053f7d-a877-449d-8e54-57a69b4e6a76</title>
    <updated>2026-05-22T16:58:15.024318+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b5053f7d-a877-449d-8e54-57a69b4e6a76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7261", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mllakdpahl2k", "content": "\ud83d\udd17 CVE : CVE-2025-14179, CVE-2026-42371, CVE-2026-6104, CVE-2026-6722, CVE-2026-6735, CVE-2026-7258, CVE-2026-7259, CVE-2026-7261, CVE-2026-7262, CVE-2026-7263, CVE-2026-7568", "creation_timestamp": "2026-05-11T12:10:09.426024Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b5053f7d-a877-449d-8e54-57a69b4e6a76/export"/>
    <published>2026-05-11T12:10:09.426024+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/acbaed78-6cd4-42eb-a574-5c94ea4cb9ae/export</id>
    <title>acbaed78-6cd4-42eb-a574-5c94ea4cb9ae</title>
    <updated>2026-05-22T16:58:15.024178+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "acbaed78-6cd4-42eb-a574-5c94ea4cb9ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7261", "type": "seen", "source": "https://bsky.app/profile/remirepo.net/post/3mlnbxdu4qk2i", "content": "\ud83d\udee1\ufe0f Security updates:\n\n- php-7.4.33-26 (in the php:remi-7.4 module)\n- php74-php-7.4.33-26 (in the php74 Software Collection)\n\nWith security fixes backported from 8.1.34 (CVE-2026-6735, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568, CVE-2026-7258)", "creation_timestamp": "2026-05-12T07:40:38.262614Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/acbaed78-6cd4-42eb-a574-5c94ea4cb9ae/export"/>
    <published>2026-05-12T07:40:38.262614+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b2bb4941-608b-4065-9e1f-6865a33d4ba0/export</id>
    <title>b2bb4941-608b-4065-9e1f-6865a33d4ba0</title>
    <updated>2026-05-22T16:58:15.021245+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b2bb4941-608b-4065-9e1f-6865a33d4ba0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7261", "type": "seen", "source": "https://bsky.app/profile/remirepo.net/post/3mm6zzbf6i22m", "content": "\ud83d\udee1\ufe0f Security update:\n\nSoftware Collections:\n- php56-php-5.6.40-46\n\nWith some recent important security fixes backported from 8.2.31 (CVE-2026-6735, CVE-2026-7261, CVE-2026-7262)", "creation_timestamp": "2026-05-19T09:06:28.490245Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b2bb4941-608b-4065-9e1f-6865a33d4ba0/export"/>
    <published>2026-05-19T09:06:28.490245+00:00</published>
  </entry>
</feed>
