<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T16:17:53.494350+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f41620bb-da55-4255-b501-c80191394429/export</id>
    <title>f41620bb-da55-4255-b501-c80191394429</title>
    <updated>2026-05-06T16:17:53.502658+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f41620bb-da55-4255-b501-c80191394429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116522838360570862", "content": "Some increased actor activities are shown targeting Google Android (CVE-2026-0073) https://vuldb.com/vuln/361009/cti", "creation_timestamp": "2026-05-05T16:10:12.012911Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f41620bb-da55-4255-b501-c80191394429/export"/>
    <published>2026-05-05T16:10:12.012911+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/98666222-508e-4f53-a7c1-e16114b04e37/export</id>
    <title>98666222-508e-4f53-a7c1-e16114b04e37</title>
    <updated>2026-05-06T16:17:53.502570+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "98666222-508e-4f53-a7c1-e16114b04e37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3ml4p26o7kxb2", "content": "CVE-2026-0073: Zero-Click RCE Flaw in Android's Wireless ADB Bypasses Authentication CVE-2026-0073: Zero-Click RCE Flaw in Android's Wireless ADB Bypasses Authentication \u26a0 Critical \u2014 Ze...\n\n#Vulnerabilities\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-05T17:19:38.203260Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/98666222-508e-4f53-a7c1-e16114b04e37/export"/>
    <published>2026-05-05T17:19:38.203260+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f81b406e-ae83-4a4a-b317-d70007ca1a02/export</id>
    <title>f81b406e-ae83-4a4a-b317-d70007ca1a02</title>
    <updated>2026-05-06T16:17:53.502472+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f81b406e-ae83-4a4a-b317-d70007ca1a02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3ml4qr6eau662", "content": "Critical Android vulnerability CVE-2026-0073 fixed by Google Google patched a critical Android flaw (CVE\u20112026\u20110073) that lets attackers run code remotely without user action. Google released a ...\n\n#Breaking #News #Mobile #Security #Android #CVE-2026-0073 #Google #Hacking #hacking #news [\u2026]", "creation_timestamp": "2026-05-05T17:50:31.671710Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f81b406e-ae83-4a4a-b317-d70007ca1a02/export"/>
    <published>2026-05-05T17:50:31.671710+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f75fe7f8-3e1f-4aab-8220-f5e77dd28bc2/export</id>
    <title>f75fe7f8-3e1f-4aab-8220-f5e77dd28bc2</title>
    <updated>2026-05-06T16:17:53.502384+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f75fe7f8-3e1f-4aab-8220-f5e77dd28bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sonoclaudio.ransomnews.online/post/3ml4wz6ijmk25", "content": "\ud83d\udce2 Fratelli di #Pixel ... aggiornare! \nBollettino sulla sicurezza #Android Maggio 2026:\n\ud83d\udd17 source.android.com/docs/securit...\nNota sulla vulnerabilit\u00e0 CVE-2026-0073:\n\ud83d\udd17 cybersecuritynews.com/android-zero...", "creation_timestamp": "2026-05-05T19:42:16.167757Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f75fe7f8-3e1f-4aab-8220-f5e77dd28bc2/export"/>
    <published>2026-05-05T19:42:16.167757+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a7d80d52-41d7-4f8b-af5a-e0d6882ed9ce/export</id>
    <title>a7d80d52-41d7-4f8b-af5a-e0d6882ed9ce</title>
    <updated>2026-05-06T16:17:53.502306+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a7d80d52-41d7-4f8b-af5a-e0d6882ed9ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ml4y3u7eud2k", "content": "CVE-2026-0073: Zero-Click Exploit Bypasses Android\u2019s Core Security \u2013 Your Device Is at Risk +\u00a0Video\n\nIntroduction A newly disclosed critical vulnerability in Android\u2019s System component, tracked as CVE\u20112026\u20110073, allows remote attackers to execute arbitrary code as the `shell` user without any user\u2026", "creation_timestamp": "2026-05-05T20:01:36.026887Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a7d80d52-41d7-4f8b-af5a-e0d6882ed9ce/export"/>
    <published>2026-05-05T20:01:36.026887+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a6de2662-feda-406a-b4e4-93407131e92a/export</id>
    <title>a6de2662-feda-406a-b4e4-93407131e92a</title>
    <updated>2026-05-06T16:17:53.502226+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a6de2662-feda-406a-b4e4-93407131e92a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml53ovl2kj2g", "content": "Critical CVE-2026-0073 \u2014 Android ADB Wireless Authentication Bypass RCE", "creation_timestamp": "2026-05-05T21:05:56.168415Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a6de2662-feda-406a-b4e4-93407131e92a/export"/>
    <published>2026-05-05T21:05:56.168415+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8c5805c1-a2c8-4bec-a0c6-53619eafc167/export</id>
    <title>8c5805c1-a2c8-4bec-a0c6-53619eafc167</title>
    <updated>2026-05-06T16:17:53.502131+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8c5805c1-a2c8-4bec-a0c6-53619eafc167", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://t.me/GithubRedTeam/82967", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-0073-Android-adbd-authentication-bypass-POC\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a SecTestAnnaQuinn\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 21:57:28\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-05T22:00:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8c5805c1-a2c8-4bec-a0c6-53619eafc167/export"/>
    <published>2026-05-05T22:00:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f521b879-dba0-455d-b508-12a8368bfe28/export</id>
    <title>f521b879-dba0-455d-b508-12a8368bfe28</title>
    <updated>2026-05-06T16:17:53.502046+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f521b879-dba0-455d-b508-12a8368bfe28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/116527812086931769", "content": "CVE-2026-0073 affects Android\u2019s System component and it can be exploited without any user interaction. https://www.securityweek.com/critical-remote-code-execution-vulnerability-patched-in-android-2/", "creation_timestamp": "2026-05-06T13:15:05.017725Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f521b879-dba0-455d-b508-12a8368bfe28/export"/>
    <published>2026-05-06T13:15:05.017725+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/27f08216-0ace-4581-9abf-8059bbc8503c/export</id>
    <title>27f08216-0ace-4581-9abf-8059bbc8503c</title>
    <updated>2026-05-06T16:17:53.501927+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "27f08216-0ace-4581-9abf-8059bbc8503c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3ml6ru3763c2y", "content": "CVE-2026-0073 affects Android\u2019s System component and it can be exploited without any user interaction. www.securityweek.com/critical-rem...", "creation_timestamp": "2026-05-06T13:15:14.936423Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/27f08216-0ace-4581-9abf-8059bbc8503c/export"/>
    <published>2026-05-06T13:15:14.936423+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d3fc0178-b472-4a41-9da0-aee9483ca83d/export</id>
    <title>d3fc0178-b472-4a41-9da0-aee9483ca83d</title>
    <updated>2026-05-06T16:17:53.500640+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d3fc0178-b472-4a41-9da0-aee9483ca83d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3ml6unzdvpk2g", "content": "Critical Android vulnerability CVE-2026-0073 fixed by Google\n\nGoogle patched a critical Android flaw (CVE\u20112026\u20110073) that lets attackers run code remotely without user action. Google released a security update for Android to address a critical remote code execution flaw, tracked a\u2026\n#hackernews #news", "creation_timestamp": "2026-05-06T14:05:29.864344Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d3fc0178-b472-4a41-9da0-aee9483ca83d/export"/>
    <published>2026-05-06T14:05:29.864344+00:00</published>
  </entry>
</feed>
