<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 16:17:52 +0000</lastBuildDate>
    <item>
      <title>f41620bb-da55-4255-b501-c80191394429</title>
      <link>https://vulnerability.circl.lu/sighting/f41620bb-da55-4255-b501-c80191394429/export</link>
      <description>{"uuid": "f41620bb-da55-4255-b501-c80191394429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116522838360570862", "content": "Some increased actor activities are shown targeting Google Android (CVE-2026-0073) https://vuldb.com/vuln/361009/cti", "creation_timestamp": "2026-05-05T16:10:12.012911Z"}</description>
      <content:encoded>{"uuid": "f41620bb-da55-4255-b501-c80191394429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116522838360570862", "content": "Some increased actor activities are shown targeting Google Android (CVE-2026-0073) https://vuldb.com/vuln/361009/cti", "creation_timestamp": "2026-05-05T16:10:12.012911Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f41620bb-da55-4255-b501-c80191394429/export</guid>
      <pubDate>Tue, 05 May 2026 16:10:12 +0000</pubDate>
    </item>
    <item>
      <title>98666222-508e-4f53-a7c1-e16114b04e37</title>
      <link>https://vulnerability.circl.lu/sighting/98666222-508e-4f53-a7c1-e16114b04e37/export</link>
      <description>{"uuid": "98666222-508e-4f53-a7c1-e16114b04e37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3ml4p26o7kxb2", "content": "CVE-2026-0073: Zero-Click RCE Flaw in Android's Wireless ADB Bypasses Authentication CVE-2026-0073: Zero-Click RCE Flaw in Android's Wireless ADB Bypasses Authentication \u26a0 Critical \u2014 Ze...\n\n#Vulnerabilities\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-05T17:19:38.203260Z"}</description>
      <content:encoded>{"uuid": "98666222-508e-4f53-a7c1-e16114b04e37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3ml4p26o7kxb2", "content": "CVE-2026-0073: Zero-Click RCE Flaw in Android's Wireless ADB Bypasses Authentication CVE-2026-0073: Zero-Click RCE Flaw in Android's Wireless ADB Bypasses Authentication \u26a0 Critical \u2014 Ze...\n\n#Vulnerabilities\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-05T17:19:38.203260Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/98666222-508e-4f53-a7c1-e16114b04e37/export</guid>
      <pubDate>Tue, 05 May 2026 17:19:38 +0000</pubDate>
    </item>
    <item>
      <title>f81b406e-ae83-4a4a-b317-d70007ca1a02</title>
      <link>https://vulnerability.circl.lu/sighting/f81b406e-ae83-4a4a-b317-d70007ca1a02/export</link>
      <description>{"uuid": "f81b406e-ae83-4a4a-b317-d70007ca1a02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3ml4qr6eau662", "content": "Critical Android vulnerability CVE-2026-0073 fixed by Google Google patched a critical Android flaw (CVE\u20112026\u20110073) that lets attackers run code remotely without user action. Google released a ...\n\n#Breaking #News #Mobile #Security #Android #CVE-2026-0073 #Google #Hacking #hacking #news [\u2026]", "creation_timestamp": "2026-05-05T17:50:31.671710Z"}</description>
      <content:encoded>{"uuid": "f81b406e-ae83-4a4a-b317-d70007ca1a02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3ml4qr6eau662", "content": "Critical Android vulnerability CVE-2026-0073 fixed by Google Google patched a critical Android flaw (CVE\u20112026\u20110073) that lets attackers run code remotely without user action. Google released a ...\n\n#Breaking #News #Mobile #Security #Android #CVE-2026-0073 #Google #Hacking #hacking #news [\u2026]", "creation_timestamp": "2026-05-05T17:50:31.671710Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f81b406e-ae83-4a4a-b317-d70007ca1a02/export</guid>
      <pubDate>Tue, 05 May 2026 17:50:31 +0000</pubDate>
    </item>
    <item>
      <title>f75fe7f8-3e1f-4aab-8220-f5e77dd28bc2</title>
      <link>https://vulnerability.circl.lu/sighting/f75fe7f8-3e1f-4aab-8220-f5e77dd28bc2/export</link>
      <description>{"uuid": "f75fe7f8-3e1f-4aab-8220-f5e77dd28bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sonoclaudio.ransomnews.online/post/3ml4wz6ijmk25", "content": "\ud83d\udce2 Fratelli di #Pixel ... aggiornare! \nBollettino sulla sicurezza #Android Maggio 2026:\n\ud83d\udd17 source.android.com/docs/securit...\nNota sulla vulnerabilit\u00e0 CVE-2026-0073:\n\ud83d\udd17 cybersecuritynews.com/android-zero...", "creation_timestamp": "2026-05-05T19:42:16.167757Z"}</description>
      <content:encoded>{"uuid": "f75fe7f8-3e1f-4aab-8220-f5e77dd28bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sonoclaudio.ransomnews.online/post/3ml4wz6ijmk25", "content": "\ud83d\udce2 Fratelli di #Pixel ... aggiornare! \nBollettino sulla sicurezza #Android Maggio 2026:\n\ud83d\udd17 source.android.com/docs/securit...\nNota sulla vulnerabilit\u00e0 CVE-2026-0073:\n\ud83d\udd17 cybersecuritynews.com/android-zero...", "creation_timestamp": "2026-05-05T19:42:16.167757Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f75fe7f8-3e1f-4aab-8220-f5e77dd28bc2/export</guid>
      <pubDate>Tue, 05 May 2026 19:42:16 +0000</pubDate>
    </item>
    <item>
      <title>a7d80d52-41d7-4f8b-af5a-e0d6882ed9ce</title>
      <link>https://vulnerability.circl.lu/sighting/a7d80d52-41d7-4f8b-af5a-e0d6882ed9ce/export</link>
      <description>{"uuid": "a7d80d52-41d7-4f8b-af5a-e0d6882ed9ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ml4y3u7eud2k", "content": "CVE-2026-0073: Zero-Click Exploit Bypasses Android\u2019s Core Security \u2013 Your Device Is at Risk +\u00a0Video\n\nIntroduction A newly disclosed critical vulnerability in Android\u2019s System component, tracked as CVE\u20112026\u20110073, allows remote attackers to execute arbitrary code as the `shell` user without any user\u2026", "creation_timestamp": "2026-05-05T20:01:36.026887Z"}</description>
      <content:encoded>{"uuid": "a7d80d52-41d7-4f8b-af5a-e0d6882ed9ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ml4y3u7eud2k", "content": "CVE-2026-0073: Zero-Click Exploit Bypasses Android\u2019s Core Security \u2013 Your Device Is at Risk +\u00a0Video\n\nIntroduction A newly disclosed critical vulnerability in Android\u2019s System component, tracked as CVE\u20112026\u20110073, allows remote attackers to execute arbitrary code as the `shell` user without any user\u2026", "creation_timestamp": "2026-05-05T20:01:36.026887Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a7d80d52-41d7-4f8b-af5a-e0d6882ed9ce/export</guid>
      <pubDate>Tue, 05 May 2026 20:01:36 +0000</pubDate>
    </item>
    <item>
      <title>a6de2662-feda-406a-b4e4-93407131e92a</title>
      <link>https://vulnerability.circl.lu/sighting/a6de2662-feda-406a-b4e4-93407131e92a/export</link>
      <description>{"uuid": "a6de2662-feda-406a-b4e4-93407131e92a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml53ovl2kj2g", "content": "Critical CVE-2026-0073 \u2014 Android ADB Wireless Authentication Bypass RCE", "creation_timestamp": "2026-05-05T21:05:56.168415Z"}</description>
      <content:encoded>{"uuid": "a6de2662-feda-406a-b4e4-93407131e92a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml53ovl2kj2g", "content": "Critical CVE-2026-0073 \u2014 Android ADB Wireless Authentication Bypass RCE", "creation_timestamp": "2026-05-05T21:05:56.168415Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a6de2662-feda-406a-b4e4-93407131e92a/export</guid>
      <pubDate>Tue, 05 May 2026 21:05:56 +0000</pubDate>
    </item>
    <item>
      <title>8c5805c1-a2c8-4bec-a0c6-53619eafc167</title>
      <link>https://vulnerability.circl.lu/sighting/8c5805c1-a2c8-4bec-a0c6-53619eafc167/export</link>
      <description>{"uuid": "8c5805c1-a2c8-4bec-a0c6-53619eafc167", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://t.me/GithubRedTeam/82967", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-0073-Android-adbd-authentication-bypass-POC\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a SecTestAnnaQuinn\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 21:57:28\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-05T22:00:05.000000Z"}</description>
      <content:encoded>{"uuid": "8c5805c1-a2c8-4bec-a0c6-53619eafc167", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://t.me/GithubRedTeam/82967", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-0073-Android-adbd-authentication-bypass-POC\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a SecTestAnnaQuinn\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 21:57:28\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-05T22:00:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8c5805c1-a2c8-4bec-a0c6-53619eafc167/export</guid>
      <pubDate>Tue, 05 May 2026 22:00:05 +0000</pubDate>
    </item>
    <item>
      <title>f521b879-dba0-455d-b508-12a8368bfe28</title>
      <link>https://vulnerability.circl.lu/sighting/f521b879-dba0-455d-b508-12a8368bfe28/export</link>
      <description>{"uuid": "f521b879-dba0-455d-b508-12a8368bfe28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/116527812086931769", "content": "CVE-2026-0073 affects Android\u2019s System component and it can be exploited without any user interaction. https://www.securityweek.com/critical-remote-code-execution-vulnerability-patched-in-android-2/", "creation_timestamp": "2026-05-06T13:15:05.017725Z"}</description>
      <content:encoded>{"uuid": "f521b879-dba0-455d-b508-12a8368bfe28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/116527812086931769", "content": "CVE-2026-0073 affects Android\u2019s System component and it can be exploited without any user interaction. https://www.securityweek.com/critical-remote-code-execution-vulnerability-patched-in-android-2/", "creation_timestamp": "2026-05-06T13:15:05.017725Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f521b879-dba0-455d-b508-12a8368bfe28/export</guid>
      <pubDate>Wed, 06 May 2026 13:15:05 +0000</pubDate>
    </item>
    <item>
      <title>27f08216-0ace-4581-9abf-8059bbc8503c</title>
      <link>https://vulnerability.circl.lu/sighting/27f08216-0ace-4581-9abf-8059bbc8503c/export</link>
      <description>{"uuid": "27f08216-0ace-4581-9abf-8059bbc8503c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3ml6ru3763c2y", "content": "CVE-2026-0073 affects Android\u2019s System component and it can be exploited without any user interaction. www.securityweek.com/critical-rem...", "creation_timestamp": "2026-05-06T13:15:14.936423Z"}</description>
      <content:encoded>{"uuid": "27f08216-0ace-4581-9abf-8059bbc8503c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3ml6ru3763c2y", "content": "CVE-2026-0073 affects Android\u2019s System component and it can be exploited without any user interaction. www.securityweek.com/critical-rem...", "creation_timestamp": "2026-05-06T13:15:14.936423Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/27f08216-0ace-4581-9abf-8059bbc8503c/export</guid>
      <pubDate>Wed, 06 May 2026 13:15:14 +0000</pubDate>
    </item>
    <item>
      <title>d3fc0178-b472-4a41-9da0-aee9483ca83d</title>
      <link>https://vulnerability.circl.lu/sighting/d3fc0178-b472-4a41-9da0-aee9483ca83d/export</link>
      <description>{"uuid": "d3fc0178-b472-4a41-9da0-aee9483ca83d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3ml6unzdvpk2g", "content": "Critical Android vulnerability CVE-2026-0073 fixed by Google\n\nGoogle patched a critical Android flaw (CVE\u20112026\u20110073) that lets attackers run code remotely without user action. Google released a security update for Android to address a critical remote code execution flaw, tracked a\u2026\n#hackernews #news", "creation_timestamp": "2026-05-06T14:05:29.864344Z"}</description>
      <content:encoded>{"uuid": "d3fc0178-b472-4a41-9da0-aee9483ca83d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3ml6unzdvpk2g", "content": "Critical Android vulnerability CVE-2026-0073 fixed by Google\n\nGoogle patched a critical Android flaw (CVE\u20112026\u20110073) that lets attackers run code remotely without user action. Google released a security update for Android to address a critical remote code execution flaw, tracked a\u2026\n#hackernews #news", "creation_timestamp": "2026-05-06T14:05:29.864344Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d3fc0178-b472-4a41-9da0-aee9483ca83d/export</guid>
      <pubDate>Wed, 06 May 2026 14:05:29 +0000</pubDate>
    </item>
  </channel>
</rss>
