<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-22T17:49:22.324634+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2f036173-fad4-4c8b-b0a2-b70e45812575/export</id>
    <title>2f036173-fad4-4c8b-b0a2-b70e45812575</title>
    <updated>2026-05-22T17:49:22.688215+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2f036173-fad4-4c8b-b0a2-b70e45812575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7262", "type": "seen", "source": "https://bsky.app/profile/remirepo.net/post/3mlczxuq7ac2w", "content": "\ud83d\udee1\ufe0f Security updates:\n\n- php-8.1.34-2 (in the php:remi-8.1 module)\n- php80-php-8.1.34-2 (in the php81 Software Collection)\n\nWith security fixes backported from 8.2.31 (CVE-2026-6735, CVE-2026-7259, CVE-2025-14179, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568, CVE-2026-7258)", "creation_timestamp": "2026-05-08T05:51:09.555197Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2f036173-fad4-4c8b-b0a2-b70e45812575/export"/>
    <published>2026-05-08T05:51:09.555197+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cd7b11c4-083d-4e6c-a85a-576fda1d6f22/export</id>
    <title>cd7b11c4-083d-4e6c-a85a-576fda1d6f22</title>
    <updated>2026-05-22T17:49:22.688144+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cd7b11c4-083d-4e6c-a85a-576fda1d6f22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7262", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3mldbcb5xiz22", "content": "8/18\n\nhttps://www.cve.org/CVERecord?id=CVE-2026-6104\n    https://www.cve.org/CVERecord?id=CVE-2025-14179\n    https://www.cve.org/CVERecord?id=CVE-2026-6722\n    https://www.cve.org/CVERecord?id=CVE-2026-7261\n    https://www.cve.org/CVERecord?id=CVE-2026-7262", "creation_timestamp": "2026-05-08T08:02:15.343024Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cd7b11c4-083d-4e6c-a85a-576fda1d6f22/export"/>
    <published>2026-05-08T08:02:15.343024+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4c587802-dedb-4d3d-b3e1-cff10df6c813/export</id>
    <title>4c587802-dedb-4d3d-b3e1-cff10df6c813</title>
    <updated>2026-05-22T17:49:22.688071+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4c587802-dedb-4d3d-b3e1-cff10df6c813", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7262", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlib4b3i6u2c", "content": "CVE-2026-7262 - NULL pointer dereference in SOAP apache:Map decoder with missing\nCVE ID : CVE-2026-7262\n \n Published : May 10, 2026, 5:16 a.m. | 1\u00a0hour, 12\u00a0minutes ago\n \n Description : In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* bef...", "creation_timestamp": "2026-05-10T07:42:09.947906Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4c587802-dedb-4d3d-b3e1-cff10df6c813/export"/>
    <published>2026-05-10T07:42:09.947906+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4d64c525-df8d-4654-8759-abbed5795fad/export</id>
    <title>4d64c525-df8d-4654-8759-abbed5795fad</title>
    <updated>2026-05-22T17:49:22.688000+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4d64c525-df8d-4654-8759-abbed5795fad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7262", "type": "seen", "source": "https://bsky.app/profile/remirepo.net/post/3mlkr672pc225", "content": "\ud83d\udee1\ufe0f Security updates:\n\n- php-8.0.30-16 (in the php:remi-8.0 module)\n- php80-php-8.0.30-16 (in the php80 Software Collection)\n\nWith security fixes backported from 8.1.34 (CVE-2026-6735, CVE-2026-7259, CVE-2025-14179, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568, CVE-2026-7258)", "creation_timestamp": "2026-05-11T07:34:55.265545Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4d64c525-df8d-4654-8759-abbed5795fad/export"/>
    <published>2026-05-11T07:34:55.265545+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/80d7ec11-d4ec-4677-b179-a16d4bc9e8fa/export</id>
    <title>80d7ec11-d4ec-4677-b179-a16d4bc9e8fa</title>
    <updated>2026-05-22T17:49:22.687915+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "80d7ec11-d4ec-4677-b179-a16d4bc9e8fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7262", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mllakdpahl2k", "content": "\ud83d\udd17 CVE : CVE-2025-14179, CVE-2026-42371, CVE-2026-6104, CVE-2026-6722, CVE-2026-6735, CVE-2026-7258, CVE-2026-7259, CVE-2026-7261, CVE-2026-7262, CVE-2026-7263, CVE-2026-7568", "creation_timestamp": "2026-05-11T12:10:09.570297Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/80d7ec11-d4ec-4677-b179-a16d4bc9e8fa/export"/>
    <published>2026-05-11T12:10:09.570297+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0a28a7d9-157a-4655-ae27-b48ccc0ebbf3/export</id>
    <title>0a28a7d9-157a-4655-ae27-b48ccc0ebbf3</title>
    <updated>2026-05-22T17:49:22.687770+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0a28a7d9-157a-4655-ae27-b48ccc0ebbf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7262", "type": "seen", "source": "https://bsky.app/profile/remirepo.net/post/3mlnbxdu4qk2i", "content": "\ud83d\udee1\ufe0f Security updates:\n\n- php-7.4.33-26 (in the php:remi-7.4 module)\n- php74-php-7.4.33-26 (in the php74 Software Collection)\n\nWith security fixes backported from 8.1.34 (CVE-2026-6735, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568, CVE-2026-7258)", "creation_timestamp": "2026-05-12T07:40:38.422992Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0a28a7d9-157a-4655-ae27-b48ccc0ebbf3/export"/>
    <published>2026-05-12T07:40:38.422992+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3f851189-1dbc-4a65-a6fd-7eed9a078977/export</id>
    <title>3f851189-1dbc-4a65-a6fd-7eed9a078977</title>
    <updated>2026-05-22T17:49:22.685994+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3f851189-1dbc-4a65-a6fd-7eed9a078977", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7262", "type": "seen", "source": "https://bsky.app/profile/remirepo.net/post/3mm6zzbf6i22m", "content": "\ud83d\udee1\ufe0f Security update:\n\nSoftware Collections:\n- php56-php-5.6.40-46\n\nWith some recent important security fixes backported from 8.2.31 (CVE-2026-6735, CVE-2026-7261, CVE-2026-7262)", "creation_timestamp": "2026-05-19T09:06:28.661689Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3f851189-1dbc-4a65-a6fd-7eed9a078977/export"/>
    <published>2026-05-19T09:06:28.661689+00:00</published>
  </entry>
</feed>
