<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 22:39:35 +0000</lastBuildDate>
    <item>
      <title>cc903a22-8d64-489a-b951-6f0dfcacdf35</title>
      <link>https://vulnerability.circl.lu/sighting/cc903a22-8d64-489a-b951-6f0dfcacdf35/export</link>
      <description>{"uuid": "cc903a22-8d64-489a-b951-6f0dfcacdf35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/cpanel-security-advisory-av26-437", "content": "", "creation_timestamp": "2026-05-08T11:49:02.000000Z"}</description>
      <content:encoded>{"uuid": "cc903a22-8d64-489a-b951-6f0dfcacdf35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/cpanel-security-advisory-av26-437", "content": "", "creation_timestamp": "2026-05-08T11:49:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cc903a22-8d64-489a-b951-6f0dfcacdf35/export</guid>
      <pubDate>Fri, 08 May 2026 11:49:02 +0000</pubDate>
    </item>
    <item>
      <title>2b9ff958-ec79-4b8b-b155-ca164bfc4011</title>
      <link>https://vulnerability.circl.lu/sighting/2b9ff958-ec79-4b8b-b155-ca164bfc4011/export</link>
      <description>{"uuid": "2b9ff958-ec79-4b8b-b155-ca164bfc4011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus-2026-13?mtm_campaign=rss&amp;amp;mtm_source=rss&amp;amp;mtm_medium=rss", "content": "", "creation_timestamp": "2026-05-08T12:13:22.000000Z"}</description>
      <content:encoded>{"uuid": "2b9ff958-ec79-4b8b-b155-ca164bfc4011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus-2026-13?mtm_campaign=rss&amp;amp;mtm_source=rss&amp;amp;mtm_medium=rss", "content": "", "creation_timestamp": "2026-05-08T12:13:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2b9ff958-ec79-4b8b-b155-ca164bfc4011/export</guid>
      <pubDate>Fri, 08 May 2026 12:13:22 +0000</pubDate>
    </item>
    <item>
      <title>cae16f27-3c33-40fe-94b0-ea3aec8f0f44</title>
      <link>https://vulnerability.circl.lu/sighting/cae16f27-3c33-40fe-94b0-ea3aec8f0f44/export</link>
      <description>{"uuid": "cae16f27-3c33-40fe-94b0-ea3aec8f0f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/116539015130620185", "content": "Rien ne dit \u201cbon week-end\u201d comme trois CVE cPanel annonc\u00e9es un vendredi, avec les d\u00e9tails techniques livr\u00e9s pile au moment du patch --&amp;gt;c\u2019est-\u00e0-dire \u00e0 18h, l\u2019heure sacr\u00e9e de l\u2019ap\u00e9ro.\nSant\u00e9 aux admins qui vont lancer /scripts/upcp avec une main sur le clavier et l\u2019autre sur le verre. \ud83d\udc47**\"To help protect customers prior to patch availability, technical details about vulnerabilities will be released alongside the patches. Full technical details will be published on our support page at the same time the patch is released. The CVE IDs are CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203. \nPatch &amp;amp; Affected Versions The patch will be available on May 08 at 12:00pm EST and will be distributed through the standard cPanel automatic update process and through the manual update process. We strongly recommend performing a manual update with /scripts/upcp once the patch is made available.\"**\ud83d\udc47 https://www.reddit.com/r/cpanel/comments/1t6wf5n/cpanel_whm_security_update_cve202629201/\n#CpanelVulnerability #cpanel #CyberVeille #vuln #infosec", "creation_timestamp": "2026-05-08T12:44:10.305859Z"}</description>
      <content:encoded>{"uuid": "cae16f27-3c33-40fe-94b0-ea3aec8f0f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/116539015130620185", "content": "Rien ne dit \u201cbon week-end\u201d comme trois CVE cPanel annonc\u00e9es un vendredi, avec les d\u00e9tails techniques livr\u00e9s pile au moment du patch --&amp;gt;c\u2019est-\u00e0-dire \u00e0 18h, l\u2019heure sacr\u00e9e de l\u2019ap\u00e9ro.\nSant\u00e9 aux admins qui vont lancer /scripts/upcp avec une main sur le clavier et l\u2019autre sur le verre. \ud83d\udc47**\"To help protect customers prior to patch availability, technical details about vulnerabilities will be released alongside the patches. Full technical details will be published on our support page at the same time the patch is released. The CVE IDs are CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203. \nPatch &amp;amp; Affected Versions The patch will be available on May 08 at 12:00pm EST and will be distributed through the standard cPanel automatic update process and through the manual update process. We strongly recommend performing a manual update with /scripts/upcp once the patch is made available.\"**\ud83d\udc47 https://www.reddit.com/r/cpanel/comments/1t6wf5n/cpanel_whm_security_update_cve202629201/\n#CpanelVulnerability #cpanel #CyberVeille #vuln #infosec", "creation_timestamp": "2026-05-08T12:44:10.305859Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cae16f27-3c33-40fe-94b0-ea3aec8f0f44/export</guid>
      <pubDate>Fri, 08 May 2026 12:44:10 +0000</pubDate>
    </item>
    <item>
      <title>a26d8bad-4197-4d86-9d66-495a771d3e10</title>
      <link>https://vulnerability.circl.lu/sighting/a26d8bad-4197-4d86-9d66-495a771d3e10/export</link>
      <description>{"uuid": "a26d8bad-4197-4d86-9d66-495a771d3e10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/openfactory.peering.social.ap.brid.gy/post/3mle5fdes5pb2", "content": "Unser t\u00e4glich CVE Emergency patch gib uns heute\n\nCVE-2026-29201, CVE-2026-29202, and CVE-2026-29203\n\nFun times.", "creation_timestamp": "2026-05-08T16:25:02.043569Z"}</description>
      <content:encoded>{"uuid": "a26d8bad-4197-4d86-9d66-495a771d3e10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/openfactory.peering.social.ap.brid.gy/post/3mle5fdes5pb2", "content": "Unser t\u00e4glich CVE Emergency patch gib uns heute\n\nCVE-2026-29201, CVE-2026-29202, and CVE-2026-29203\n\nFun times.", "creation_timestamp": "2026-05-08T16:25:02.043569Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a26d8bad-4197-4d86-9d66-495a771d3e10/export</guid>
      <pubDate>Fri, 08 May 2026 16:25:02 +0000</pubDate>
    </item>
    <item>
      <title>9335e0b6-cc05-468f-9164-4e20331c0111</title>
      <link>https://vulnerability.circl.lu/sighting/9335e0b6-cc05-468f-9164-4e20331c0111/export</link>
      <description>{"uuid": "9335e0b6-cc05-468f-9164-4e20331c0111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlekt3kq262w", "content": "\ud83d\udfe0 CVE-2026-29203 - High (8.8)\n\nA chmod call in the cPanel Nova plugin's Cpanel::Nova::Connector follows symlinks, allowing setti...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29203/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T20:25:20.999730Z"}</description>
      <content:encoded>{"uuid": "9335e0b6-cc05-468f-9164-4e20331c0111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlekt3kq262w", "content": "\ud83d\udfe0 CVE-2026-29203 - High (8.8)\n\nA chmod call in the cPanel Nova plugin's Cpanel::Nova::Connector follows symlinks, allowing setti...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29203/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T20:25:20.999730Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9335e0b6-cc05-468f-9164-4e20331c0111/export</guid>
      <pubDate>Fri, 08 May 2026 20:25:20 +0000</pubDate>
    </item>
    <item>
      <title>f8f166ee-e562-42de-aef0-79e23c6dd68a</title>
      <link>https://vulnerability.circl.lu/sighting/f8f166ee-e562-42de-aef0-79e23c6dd68a/export</link>
      <description>{"uuid": "f8f166ee-e562-42de-aef0-79e23c6dd68a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlepsmramd2t", "content": "cPanel Nova\u30d7\u30e9\u30b0\u30a4\u30f3\u306echmod\u51e6\u7406\u3067\u30b7\u30f3\u30dc\u30ea\u30c3\u30af\u30ea\u30f3\u30af\u3092\u8fbf\u308a\u3001\u4efb\u610f\u30d5\u30a1\u30a4\u30eb\u306broot\u6a29\u9650\u304c\u4ed8\u4e0e\u3055\u308c\u308b\u8106\u5f31\u6027\u3002\u8a8d\u8a3c\u6e08\u307f\u30e6\u30fc\u30b6\u30fc\u304c\u3001\u30db\u30fc\u30e0\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u4e0b\u306e\u30ec\u30ac\u30b7\u30fcNova\u30d1\u30b9\u306b\u30b7\u30f3\u30dc\u30ea\u30c3\u30af\u2026\nCVE-2026-29203 CVSS 8.8 | HIGH", "creation_timestamp": "2026-05-08T21:54:33.627576Z"}</description>
      <content:encoded>{"uuid": "f8f166ee-e562-42de-aef0-79e23c6dd68a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlepsmramd2t", "content": "cPanel Nova\u30d7\u30e9\u30b0\u30a4\u30f3\u306echmod\u51e6\u7406\u3067\u30b7\u30f3\u30dc\u30ea\u30c3\u30af\u30ea\u30f3\u30af\u3092\u8fbf\u308a\u3001\u4efb\u610f\u30d5\u30a1\u30a4\u30eb\u306broot\u6a29\u9650\u304c\u4ed8\u4e0e\u3055\u308c\u308b\u8106\u5f31\u6027\u3002\u8a8d\u8a3c\u6e08\u307f\u30e6\u30fc\u30b6\u30fc\u304c\u3001\u30db\u30fc\u30e0\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u4e0b\u306e\u30ec\u30ac\u30b7\u30fcNova\u30d1\u30b9\u306b\u30b7\u30f3\u30dc\u30ea\u30c3\u30af\u2026\nCVE-2026-29203 CVSS 8.8 | HIGH", "creation_timestamp": "2026-05-08T21:54:33.627576Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f8f166ee-e562-42de-aef0-79e23c6dd68a/export</guid>
      <pubDate>Fri, 08 May 2026 21:54:33 +0000</pubDate>
    </item>
    <item>
      <title>0fe2044c-c367-499b-bbb1-3b12b1012026</title>
      <link>https://vulnerability.circl.lu/sighting/0fe2044c-c367-499b-bbb1-3b12b1012026/export</link>
      <description>{"uuid": "0fe2044c-c367-499b-bbb1-3b12b1012026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/116544182422691954", "content": "Spoiler de l'\u00e9pisode de hier : cPanel a bien livr\u00e9 les d\u00e9tails techniques en m\u00eame temps que les patchs. Au menu de l'after :\n\u2022 CVE-2026-29201 : path traversal :8bitrainbow:  via feature::LOADFEATUREFILE \u2192 fichier arbitraire en world-readable\u2022 CVE-2026-29202 : injection Perl dans create_user (param\u00e8tre plugin)\u2022 CVE-2026-29203 : symlink mal g\u00e9r\u00e9 \u2192 chmod arbitraire \u2192 DoS + escalade de privil\u00e8ges\n/scripts/upcp et go apero!Bon courage aux admins de garde \ud83e\udee1\nhttps://docs.cpanel.net/changelogs/134-change-log/#134025\nhttps://vulnerability.circl.lu/vuln/CVE-2026-29203\n#CyberVeille #cpanel #CVE_2026_29203#CVE_2026_29202#CVE_2026_29201", "creation_timestamp": "2026-05-09T10:38:17.359819Z"}</description>
      <content:encoded>{"uuid": "0fe2044c-c367-499b-bbb1-3b12b1012026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/116544182422691954", "content": "Spoiler de l'\u00e9pisode de hier : cPanel a bien livr\u00e9 les d\u00e9tails techniques en m\u00eame temps que les patchs. Au menu de l'after :\n\u2022 CVE-2026-29201 : path traversal :8bitrainbow:  via feature::LOADFEATUREFILE \u2192 fichier arbitraire en world-readable\u2022 CVE-2026-29202 : injection Perl dans create_user (param\u00e8tre plugin)\u2022 CVE-2026-29203 : symlink mal g\u00e9r\u00e9 \u2192 chmod arbitraire \u2192 DoS + escalade de privil\u00e8ges\n/scripts/upcp et go apero!Bon courage aux admins de garde \ud83e\udee1\nhttps://docs.cpanel.net/changelogs/134-change-log/#134025\nhttps://vulnerability.circl.lu/vuln/CVE-2026-29203\n#CyberVeille #cpanel #CVE_2026_29203#CVE_2026_29202#CVE_2026_29201", "creation_timestamp": "2026-05-09T10:38:17.359819Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0fe2044c-c367-499b-bbb1-3b12b1012026/export</guid>
      <pubDate>Sat, 09 May 2026 10:38:17 +0000</pubDate>
    </item>
  </channel>
</rss>
