<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T19:41:27.836326+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d3a3012a-38ce-4682-bf6a-39773646c0c7/export</id>
    <title>d3a3012a-38ce-4682-bf6a-39773646c0c7</title>
    <updated>2026-05-10T19:41:27.842310+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d3a3012a-38ce-4682-bf6a-39773646c0c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3mldz6f62ly2p", "content": "Ivanti: We are aware of a very limited number of customers exploited with CVE-2026-6973. Successful exploitation requires Admin authentication.", "creation_timestamp": "2026-05-08T15:09:32.457232Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d3a3012a-38ce-4682-bf6a-39773646c0c7/export"/>
    <published>2026-05-08T15:09:32.457232+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/116a4571-d6bb-4880-9f5c-2dd00b562286/export</id>
    <title>116a4571-d6bb-4880-9f5c-2dd00b562286</title>
    <updated>2026-05-10T19:41:27.842221+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "116a4571-d6bb-4880-9f5c-2dd00b562286", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mle36iy5cv2o", "content": "CISA mandates U.S. federal agencies to patch zero-day CVE-2026-6973 in Ivanti Endpoint Manager Mobile within 4 days. Vulnerability allows remote code execution by authenticated admins. Fixed versions released. #IvantiEPMM #ZeroDay #USA", "creation_timestamp": "2026-05-08T15:45:24.776899Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/116a4571-d6bb-4880-9f5c-2dd00b562286/export"/>
    <published>2026-05-08T15:45:24.776899+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/499a0e86-9f7c-4ced-b854-c26f6b92f4bd/export</id>
    <title>499a0e86-9f7c-4ced-b854-c26f6b92f4bd</title>
    <updated>2026-05-10T19:41:27.842025+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "499a0e86-9f7c-4ced-b854-c26f6b92f4bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://t.me/true_secator/8189", "content": "\u0418 \u0432\u043a\u0440\u0430\u0442\u0446\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043c \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0437\u043d\u0430\u0447\u0438\u043c\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043d\u0438\u043c\u0438 \u0443\u0433\u0440\u043e\u0437\u044b:\n\n1. \u0412 Linux \u043d\u043e\u0432\u0430\u044f 0-day - Dirty Frag, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 root \u0432 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u043e\u0432 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0441\u0435\u0433\u043e \u043b\u0438\u0448\u044c \u043e\u0434\u043d\u043e\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0425\u0451\u043d\u0432\u0443 \u041a\u0438\u043c \u0440\u0430\u0441\u043a\u0440\u044b\u043b \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b PoC.\n\n\u041a\u0430\u043a \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442\u0441\u044f,\u00a0\u043e\u043d\u0430 \u0431\u044b\u043b\u0430 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0430 \u043f\u0440\u0438\u043c\u0435\u0440\u043d\u043e \u0434\u0435\u0432\u044f\u0442\u044c \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434 \u0432 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430 algif_aead \u044f\u0434\u0440\u0430 Linux.\n\nDirty Frag\u00a0\u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0437\u0430 \u0441\u0447\u0435\u0442 \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f \u0434\u0432\u0443\u0445 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u044f\u0434\u0440\u0430 - \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u0441\u0442\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0439 \u043a\u044d\u0448 xfrm-ESP \u0438 \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u0441\u0442\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0439 \u043a\u044d\u0448 RxRPC - \u0434\u043b\u044f \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u0434\u043e\u0441\u0442\u0438\u0436\u0435\u043d\u0438\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0445\u043e\u0442\u044f Dirty Frag \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u0442\u043e\u043c\u0443 \u0436\u0435 \u043a\u043b\u0430\u0441\u0441\u0443, \u0447\u0442\u043e \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Linux Dirty Pipe \u0438\u00a0Copy Fail, \u043e\u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043f\u043e\u043b\u0435 \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0430 \u0434\u0440\u0443\u0433\u043e\u0439 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0434\u0430\u043d\u043d\u044b\u0445 \u044f\u0434\u0440\u0430.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u043a\u0430 \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0448\u0438\u0440\u043e\u043a\u0438\u0439 \u0441\u043f\u0435\u043a\u0442\u0440 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u043e\u0432 Linux, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Ubuntu, Red Hat Enterprise Linux, CentOS Stream, AlmaLinux, openSUSE Tumbleweed \u0438 Fedora, \u0434\u043b\u044f \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0435\u0449\u0435 \u043d\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\u0414\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0430\u0442\u0430\u043a \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Linux \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u00a0\u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043c\u043e\u0434\u0443\u043b\u0435\u0439 \u044f\u0434\u0440\u0430 esp4, esp6 \u0438 rxrpc (\u043e\u0434\u043d\u0430\u043a\u043e \u0432\u0430\u0436\u043d\u043e \u043e\u0442\u043c\u0435\u0442\u0438\u0442\u044c, \u0447\u0442\u043e \u044d\u0442\u043e \u043d\u0430\u0440\u0443\u0448\u0438\u0442 \u0440\u0430\u0431\u043e\u0442\u0443 IPsec VPN \u0438 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c AFS).\n\n2. Ivanti \u0430\u043d\u043e\u043d\u0441\u0438\u0440\u0443\u0435\u0442 \u043d\u043e\u0432\u044b\u0439 \u0441\u0435\u0437\u043e\u043d \u043e\u0441\u0442\u0440\u043e\u0441\u044e\u0436\u0435\u0442\u043d\u043e\u0433\u043e \u043e\u0434\u043d\u043e\u0438\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0438\u0430\u043b\u0430 \u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 (\u0433\u043e\u0442\u043e\u0432\u0438\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0440\u0438\u0447\u043d\u0435\u0432\u044b\u0439 \u043c\u0435\u0440\u0447) \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043e \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Endpoint Manager Mobile (EPMM), \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0439 \u0432 0-day \u0430\u0442\u0430\u043a\u0430\u0445.\n\nCVE-2026-6973 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0445 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c EPMM 12.8.0.0 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0437\u0430\u044f\u0432\u043b\u044f\u0435\u0442, \u0447\u0442\u043e \u0435\u0439 \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e\u0431 \u00ab\u043e\u0447\u0435\u043d\u044c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u043c\u00bb \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u0436\u0435 Ivanti \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0447\u0435\u0442\u044b\u0440\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 EPMM (CVE-2026-5786, CVE-2026-5787, CVE-2026-5788 \u0438 CVE-2026-7821), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u0447\u0438\u0441\u043b\u0435 \u043f\u0440\u043e\u0447\u0435\u0433\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0442\u043e\u0442 \u0441\u0430\u043c\u044b\u0439 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f.\n\n3. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Adversa.AI \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0443\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u044e Claude Code \u0432 \u0441\u0432\u043e\u0438\u0445 \u0446\u0435\u043b\u044f\u0445, \u0447\u0442\u043e \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u043d\u043e\u0432\u0443\u044e \u0443\u0433\u0440\u043e\u0437\u0443 \u0434\u043b\u044f \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u043e\u043a.\n\nTrustFall \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u0435\u0442, \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0441\u0442\u0430\u043c\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u043c\u0438 \u0418\u0418, \u0434\u043b\u044f \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043a\u0440\u044b\u0442\u044b\u0445 \u0432\u0437\u043b\u043e\u043c\u043e\u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u043e\u043a.\n\n4. \u0410\u043d\u0430\u043b\u0438\u0442\u0438\u043a\u0438 \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u0435\u0436\u0435\u043a\u0432\u0430\u0440\u0442\u0430\u043b\u044c\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 \u043f\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430\u043c \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438, \u0447\u0442\u043e \u0432 \u043f\u0435\u0440\u0432\u043e\u043c \u043a\u0432\u0430\u0440\u0442\u0430\u043b\u0435 2026 \u043d\u0430\u0431\u043e\u0440 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0441\u043d\u043e\u0432\u0430 \u043f\u043e\u043f\u043e\u043b\u043d\u0438\u043b\u0441\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430\u043c\u0438 \u0434\u043b\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Microsoft Office, \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows \u0438 Linux.\n\n5. Cisco \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f DoS-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u0430\u0445 Crosswork Network Controller (CNC) \u0438 Network Services Orchestrator (NSO), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043b\u0430 \u0440\u0443\u0447\u043d\u043e\u0439 \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0434\u043b\u044f \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\u041f\u043e\u043a\u0430 CVE-2026-20188 \u043d\u0435 \u0431\u044b\u043b\u0430 \u0435\u0449\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \u041e\u0434\u043d\u0430\u043a\u043e \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0440\u0430\u043d\u0435\u0435 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0447\u0430\u0441\u0442\u043e \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u043b\u0438\u0441\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\n6. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Mitiga \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043d\u0435\u0437\u0430\u043c\u0435\u0442\u043d\u043e \u043f\u0435\u0440\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0442\u0440\u0430\u0444\u0438\u043a Claude Code MCP, \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0442\u043e\u043a\u0435\u043d\u044b OAuth \u0438 \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0442\u044c \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c SaaS-\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u043c, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u0432 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u044d\u0442\u043e \u0432\u0441\u0435 \u043c\u043e\u0436\u043d\u043e \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442\u044c.\n\n7. \u0418 \u043d\u0435 \u0437\u0430\u0431\u044b\u0432\u0430\u0435\u043c \u043f\u0440\u043e \u043f\u043e\u0437\u0438\u0442\u0438\u0432\u043d\u044b\u0439 \u00ab\u0432 \u0442\u0440\u0435\u043d\u0434\u0435 VM\u00bb \u0437\u0430 \u0430\u043f\u0440\u0435\u043b\u044c, \u043a\u0443\u0434\u0430 \u0432\u043e\u0448\u043b\u0430 \u043e\u0434\u043d\u0430 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c - (CVE-2026-20963, CVSS 9,8) \u0432 Microsoft SharePoint.", "creation_timestamp": "2026-05-08T18:30:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/499a0e86-9f7c-4ced-b854-c26f6b92f4bd/export"/>
    <published>2026-05-08T18:30:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fc087c64-6e23-4ac1-a771-99348c1f2d5a/export</id>
    <title>fc087c64-6e23-4ac1-a771-99348c1f2d5a</title>
    <updated>2026-05-10T19:41:27.841939+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fc087c64-6e23-4ac1-a771-99348c1f2d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mlehm52c5s2g", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access\n\nIvanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild.\nThe high-severity vulnerability, CVE-2026-6973 (CVSS score: 7.2)\u2026\n#hackernews #news", "creation_timestamp": "2026-05-08T19:27:46.509539Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fc087c64-6e23-4ac1-a771-99348c1f2d5a/export"/>
    <published>2026-05-08T19:27:46.509539+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1c7c2a79-7023-4bf8-addd-4a231b7fb65c/export</id>
    <title>1c7c2a79-7023-4bf8-addd-4a231b7fb65c</title>
    <updated>2026-05-10T19:41:27.841849+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1c7c2a79-7023-4bf8-addd-4a231b7fb65c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-6973", "type": "seen", "source": "https://bsky.app/profile/mel-echosphere.bsky.social/post/3mlfbnvecr424", "content": "\u300c\u8a8d\u8a3c\u6e08\u307f\u7ba1\u7406\u8005\u306a\u3089\u4efb\u610f\u30b3\u30fc\u30c9\u5b9f\u884c\u300d\u2014\u2014\u305d\u306e\u8a8d\u8a3c\u30011\u6708\u306eCVE\u3067\u3082\u3046\u629c\u304b\u308c\u3066\u308b\u304b\u3082\u3057\u308c\u306d\u3047\u3093\u3060\u305c\u3002\u26a0\ufe0f\n\nIvanti EPMM\u3001CVE-2026-6973\u3002CISA\u304cKEV\u306b\u767b\u9332\u3001\u9023\u90a6\u6a5f\u95a2\u306e\u5bfe\u5fdc\u671f\u9650\u306f\u660e\u65e55/10\u3002\u9732\u51fa\u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306f800\u53f0\u8d85\u3067\u3001\u5b9f\u5bb3\u3082\u65e2\u306b\u51fa\u3066\u308b\u3002\ud83d\udd4a\ufe0f\n\nhttps://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html\n\n#Ivanti", "creation_timestamp": "2026-05-09T03:14:05.741167Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1c7c2a79-7023-4bf8-addd-4a231b7fb65c/export"/>
    <published>2026-05-09T03:14:05.741167+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b95d020a-2535-42e8-8c86-4d0889c8888e/export</id>
    <title>b95d020a-2535-42e8-8c86-4d0889c8888e</title>
    <updated>2026-05-10T19:41:27.841761+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b95d020a-2535-42e8-8c86-4d0889c8888e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mlgk35n6rs2g", "content": "Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973)\n\nIvanti has released fixes for 5 high-severity vulnerabilities in its Endpoint Manager Mobile (EPMM) solution, one of which (CVE-2026-6973) has being exploited as a zero-day by attackers. \u201cWe are aware of a ve\u2026\n#hackernews #news", "creation_timestamp": "2026-05-09T15:17:17.856843Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b95d020a-2535-42e8-8c86-4d0889c8888e/export"/>
    <published>2026-05-09T15:17:17.856843+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cf0cb744-7f15-4582-b214-c911e3a7152e/export</id>
    <title>cf0cb744-7f15-4582-b214-c911e3a7152e</title>
    <updated>2026-05-10T19:41:27.841623+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cf0cb744-7f15-4582-b214-c911e3a7152e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/pixelsandpulse.bsky.social/post/3mlhi35loss2h", "content": "Another Ivanti zero-day, another CISA emergency directive. Federal agencies have just 4 days to patch CVE-2026-6973, but this recurring pattern of critical flaws is causing serious \"patching fatigue\" and eroding trust in vital security\u2026\n\nhttps://www.tpp.blog/1gjpc93\n\n#cybersecurity #cisa #ivanti", "creation_timestamp": "2026-05-10T00:14:09.439034Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cf0cb744-7f15-4582-b214-c911e3a7152e/export"/>
    <published>2026-05-10T00:14:09.439034+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2e3287af-9193-4be9-a3b6-3112bf8f3fff/export</id>
    <title>2e3287af-9193-4be9-a3b6-3112bf8f3fff</title>
    <updated>2026-05-10T19:41:27.841504+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2e3287af-9193-4be9-a3b6-3112bf8f3fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-6973", "type": "seen", "source": "https://bsky.app/profile/cyberowi.pl/post/3mliaqhfphn2o", "content": "\ud83d\udea8 Alert: Aktywny atak na Ivanti EPMM (CVE-2026-6973). Pilne \u0142atanie wymagane.\n\nWykryto luk\u0119 RCE w Ivanti EPMM, kt\u00f3ra jest ju\u017c wykorzystywana w atakach. Ameryka\u0144ska agencja CISA nakaza\u0142a pilne\n\nhttps://cyberowi.pl/alert-aktywny-atak-na-ivanti-epmm-cve-2026-6973-pilne/\n\n#cyberbezpieczenstwo", "creation_timestamp": "2026-05-10T07:35:33.825744Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2e3287af-9193-4be9-a3b6-3112bf8f3fff/export"/>
    <published>2026-05-10T07:35:33.825744+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9549956b-4633-4b23-80af-ae18f6be3d2d/export</id>
    <title>9549956b-4633-4b23-80af-ae18f6be3d2d</title>
    <updated>2026-05-10T19:41:27.841379+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9549956b-4633-4b23-80af-ae18f6be3d2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/solomonneas.dev/post/3mlipnx32342z", "content": "\ud83d\udd34 Ivanti EPMM zero-day exploited\nCVE-2026-6973 RCE hits EPMM 12.8.0.0 and earlier. Patch now.\n\n\ud83d\udfe1 Fake OpenAI Hugging Face repo pushed infostealer\nTargets cookies, tokens, wallets, SSH and VPN creds.\n\nsolomonneas.dev/intel", "creation_timestamp": "2026-05-10T12:02:35.990534Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9549956b-4633-4b23-80af-ae18f6be3d2d/export"/>
    <published>2026-05-10T12:02:35.990534+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a3d2e16c-f8d0-4b8b-9772-5f91c915a889/export</id>
    <title>a3d2e16c-f8d0-4b8b-9772-5f91c915a889</title>
    <updated>2026-05-10T19:41:27.840059+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a3d2e16c-f8d0-4b8b-9772-5f91c915a889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-6973", "type": "seen", "source": "https://bsky.app/profile/ahmandonk.bsky.social/post/3mlivkxjeft2j", "content": "\ud83d\udcf0 CISA Beri Tenggat Waktu 4 Hari bagi Lembaga Federal AS untuk Tambal Zero-Day Ivanti EPMM\n\n\ud83d\udc49 Baca artikel lengkap di sini: https://ahmandonk.com/2026/05/10/cisa-beri-tenggat-4-hari-tambal-zero-day-ivanti-epmm-cve-2026-6973/\n\n#ahmandonkTechNews #beritaTeknologi #cisa #cve-2026-6973 #ivantiEpmm", "creation_timestamp": "2026-05-10T13:48:19.441475Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a3d2e16c-f8d0-4b8b-9772-5f91c915a889/export"/>
    <published>2026-05-10T13:48:19.441475+00:00</published>
  </entry>
</feed>
