CVE-2026-6722 - Use-After-Free in SOAP using Apache map
CVE ID :CVE-2026-6722 Published : May 10, 2026, 4:19 a.m. | 45 minutes ago Description :In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension's object deduplication mechanism stores pointers to PHP objects in a global map with
ORIGINAL SOURCE →via CVE Feed Latest
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Built a platform that combines phishing detection, encrypted file sharing, and cloud security scanning
- [CYBER] If LLM creates secure code, how could an LLM find a vulnerability in it?
- [CYBER] CVE-2026-8230 - Wavlink NU516U1 login.cgi sys_login1 os command injection
- [CYBER] Cookie, Session và Token-based authentication
- [CYBER] CVE-2026-7258 - Out-of-bounds read in urldecode() on NetBSD
- [CYBER] CVE-2026-8229 - Wavlink NU516U1 wireless.cgi WifiBasic os command injection