<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T05:02:54.416466+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f8f87b7b-eee0-49ec-bbf3-5441187db25f/export</id>
    <title>f8f87b7b-eee0-49ec-bbf3-5441187db25f</title>
    <updated>2026-05-09T05:02:54.426833+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f8f87b7b-eee0-49ec-bbf3-5441187db25f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibk6c2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:35.852470Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f8f87b7b-eee0-49ec-bbf3-5441187db25f/export"/>
    <published>2026-05-07T16:06:35.852470+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d06ceff5-547e-4433-bef4-68cc2671961d/export</id>
    <title>d06ceff5-547e-4433-bef4-68cc2671961d</title>
    <updated>2026-05-09T05:02:54.426667+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d06ceff5-547e-4433-bef4-68cc2671961d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibsxk2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:36.606543Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d06ceff5-547e-4433-bef4-68cc2671961d/export"/>
    <published>2026-05-07T16:06:36.606543+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/38fc66b7-6b64-4118-a0e8-0220c88bff14/export</id>
    <title>38fc66b7-6b64-4118-a0e8-0220c88bff14</title>
    <updated>2026-05-09T05:02:54.426473+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "38fc66b7-6b64-4118-a0e8-0220c88bff14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibtws2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:37.267406Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/38fc66b7-6b64-4118-a0e8-0220c88bff14/export"/>
    <published>2026-05-07T16:06:37.267406+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9f35d042-84f0-4395-be43-6fe75787e6e1/export</id>
    <title>9f35d042-84f0-4395-be43-6fe75787e6e1</title>
    <updated>2026-05-09T05:02:54.426327+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9f35d042-84f0-4395-be43-6fe75787e6e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibuw22m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:39.717651Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9f35d042-84f0-4395-be43-6fe75787e6e1/export"/>
    <published>2026-05-07T16:06:39.717651+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a9c11cfa-ad79-412b-9cb2-2c9841ee1ed2/export</id>
    <title>a9c11cfa-ad79-412b-9cb2-2c9841ee1ed2</title>
    <updated>2026-05-09T05:02:54.426177+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a9c11cfa-ad79-412b-9cb2-2c9841ee1ed2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibvvc2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:40.652421Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a9c11cfa-ad79-412b-9cb2-2c9841ee1ed2/export"/>
    <published>2026-05-07T16:06:40.652421+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d23cb80c-94ed-4e17-bb6b-2d3c02977734/export</id>
    <title>d23cb80c-94ed-4e17-bb6b-2d3c02977734</title>
    <updated>2026-05-09T05:02:54.426005+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d23cb80c-94ed-4e17-bb6b-2d3c02977734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibwuk2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:41.452405Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d23cb80c-94ed-4e17-bb6b-2d3c02977734/export"/>
    <published>2026-05-07T16:06:41.452405+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de87ff37-0c47-48c8-97e7-5aa827a8a509/export</id>
    <title>de87ff37-0c47-48c8-97e7-5aa827a8a509</title>
    <updated>2026-05-09T05:02:54.425842+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "de87ff37-0c47-48c8-97e7-5aa827a8a509", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibxts2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:42.187734Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de87ff37-0c47-48c8-97e7-5aa827a8a509/export"/>
    <published>2026-05-07T16:06:42.187734+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2f9ca4b3-ca78-4064-975a-768a3106f5e2/export</id>
    <title>2f9ca4b3-ca78-4064-975a-768a3106f5e2</title>
    <updated>2026-05-09T05:02:54.425679+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2f9ca4b3-ca78-4064-975a-768a3106f5e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibxtt2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:42.947631Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2f9ca4b3-ca78-4064-975a-768a3106f5e2/export"/>
    <published>2026-05-07T16:06:42.947631+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c0b8ced4-60a6-4349-bb6d-e4ca7ccd3adc/export</id>
    <title>c0b8ced4-60a6-4349-bb6d-e4ca7ccd3adc</title>
    <updated>2026-05-09T05:02:54.425463+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c0b8ced4-60a6-4349-bb6d-e4ca7ccd3adc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibyt32m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:43.743766Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c0b8ced4-60a6-4349-bb6d-e4ca7ccd3adc/export"/>
    <published>2026-05-07T16:06:43.743766+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/109bee25-e3cf-4d32-9359-f9b8be4544ff/export</id>
    <title>109bee25-e3cf-4d32-9359-f9b8be4544ff</title>
    <updated>2026-05-09T05:02:54.423407+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "109bee25-e3cf-4d32-9359-f9b8be4544ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/patrickcmiller.bsky.social/post/3mlcfdv6dxb2u", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks thehackernews.com/2026/05/meti...", "creation_timestamp": "2026-05-07T23:42:06.093052Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/109bee25-e3cf-4d32-9359-f9b8be4544ff/export"/>
    <published>2026-05-07T23:42:06.093052+00:00</published>
  </entry>
</feed>
