<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 18:14:17 +0000</lastBuildDate>
    <item>
      <title>00532ca5-bbc6-4ebb-940b-bfeff4d771f5</title>
      <link>https://vulnerability.circl.lu/sighting/00532ca5-bbc6-4ebb-940b-bfeff4d771f5/export</link>
      <description>{"uuid": "00532ca5-bbc6-4ebb-940b-bfeff4d771f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mldbzt2z3p2o", "content": "Ivanti released patches for five vulnerabilities in Endpoint Manager Mobile, including CVE-2026-6973, a zero-day exploited in targeted attacks allowing remote code execution by authenticated admins. #IvantiPatch #ZeroDay #USA", "creation_timestamp": "2026-05-08T08:15:23.863165Z"}</description>
      <content:encoded>{"uuid": "00532ca5-bbc6-4ebb-940b-bfeff4d771f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mldbzt2z3p2o", "content": "Ivanti released patches for five vulnerabilities in Endpoint Manager Mobile, including CVE-2026-6973, a zero-day exploited in targeted attacks allowing remote code execution by authenticated admins. #IvantiPatch #ZeroDay #USA", "creation_timestamp": "2026-05-08T08:15:23.863165Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/00532ca5-bbc6-4ebb-940b-bfeff4d771f5/export</guid>
      <pubDate>Fri, 08 May 2026 08:15:23 +0000</pubDate>
    </item>
    <item>
      <title>6e9be40b-3a44-4d27-9c11-eb7c169eb4e3</title>
      <link>https://vulnerability.circl.lu/sighting/6e9be40b-3a44-4d27-9c11-eb7c169eb4e3/export</link>
      <description>{"uuid": "6e9be40b-3a44-4d27-9c11-eb7c169eb4e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-6973", "type": "seen", "source": "https://bsky.app/profile/ahmandonk.bsky.social/post/3mlddgbcnbq2r", "content": "\ud83d\udcf0 Ivanti Rilis Peringatan Darurat: Kerentanan Zero-Day Baru Dieksploitasi di EPMM\n\n\ud83d\udc49 Baca artikel lengkap di sini: https://ahmandonk.com/2026/05/08/ivanti-peringatkan-eksploitasi-zero-day-baru-pada-epmm-cve-2026-6973/\n\n#adminIt #beritaTeknologi #cisa #cve-2026-6973 #ivanti #ivantiEpmm #keamana", "creation_timestamp": "2026-05-08T08:40:14.546092Z"}</description>
      <content:encoded>{"uuid": "6e9be40b-3a44-4d27-9c11-eb7c169eb4e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-6973", "type": "seen", "source": "https://bsky.app/profile/ahmandonk.bsky.social/post/3mlddgbcnbq2r", "content": "\ud83d\udcf0 Ivanti Rilis Peringatan Darurat: Kerentanan Zero-Day Baru Dieksploitasi di EPMM\n\n\ud83d\udc49 Baca artikel lengkap di sini: https://ahmandonk.com/2026/05/08/ivanti-peringatkan-eksploitasi-zero-day-baru-pada-epmm-cve-2026-6973/\n\n#adminIt #beritaTeknologi #cisa #cve-2026-6973 #ivanti #ivantiEpmm #keamana", "creation_timestamp": "2026-05-08T08:40:14.546092Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6e9be40b-3a44-4d27-9c11-eb7c169eb4e3/export</guid>
      <pubDate>Fri, 08 May 2026 08:40:14 +0000</pubDate>
    </item>
    <item>
      <title>9cade22d-6356-48cc-8ea6-d90f9686f0c8</title>
      <link>https://vulnerability.circl.lu/sighting/9cade22d-6356-48cc-8ea6-d90f9686f0c8/export</link>
      <description>{"uuid": "9cade22d-6356-48cc-8ea6-d90f9686f0c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3mldjvibnyk2s", "content": "Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973)\n\n\ud83d\udcd6 Read more: www.helpnetsecurity.com/2026/05/08/i...\n\n#cybersecurity #cybersecuritynews #0day #endpointmanagement #vulnerability", "creation_timestamp": "2026-05-08T10:36:11.761384Z"}</description>
      <content:encoded>{"uuid": "9cade22d-6356-48cc-8ea6-d90f9686f0c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3mldjvibnyk2s", "content": "Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973)\n\n\ud83d\udcd6 Read more: www.helpnetsecurity.com/2026/05/08/i...\n\n#cybersecurity #cybersecuritynews #0day #endpointmanagement #vulnerability", "creation_timestamp": "2026-05-08T10:36:11.761384Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9cade22d-6356-48cc-8ea6-d90f9686f0c8/export</guid>
      <pubDate>Fri, 08 May 2026 10:36:11 +0000</pubDate>
    </item>
    <item>
      <title>ee8df97e-ace4-461d-be2f-f21bc4a46404</title>
      <link>https://vulnerability.circl.lu/sighting/ee8df97e-ace4-461d-be2f-f21bc4a46404/export</link>
      <description>{"uuid": "ee8df97e-ace4-461d-be2f-f21bc4a46404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/solomonneas.dev/post/3mldosezhvy2b", "content": "\ud83d\udd34 Ivanti EPMM CVE-2026-6973 now in CISA KEV after active exploitation. Patch on-prem EPMM.\n\n\ud83d\udfe1 Fake Claude site drops Beagle backdoor. Verify AI tool installers.\n\n\ud83d\udfe1 Canvas incident exposed customer data. Review MFA, admins, and tokens.\n\nsolomonneas.dev/intel", "creation_timestamp": "2026-05-08T12:03:52.201763Z"}</description>
      <content:encoded>{"uuid": "ee8df97e-ace4-461d-be2f-f21bc4a46404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/solomonneas.dev/post/3mldosezhvy2b", "content": "\ud83d\udd34 Ivanti EPMM CVE-2026-6973 now in CISA KEV after active exploitation. Patch on-prem EPMM.\n\n\ud83d\udfe1 Fake Claude site drops Beagle backdoor. Verify AI tool installers.\n\n\ud83d\udfe1 Canvas incident exposed customer data. Review MFA, admins, and tokens.\n\nsolomonneas.dev/intel", "creation_timestamp": "2026-05-08T12:03:52.201763Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ee8df97e-ace4-461d-be2f-f21bc4a46404/export</guid>
      <pubDate>Fri, 08 May 2026 12:03:52 +0000</pubDate>
    </item>
    <item>
      <title>2e89a663-1676-4e7a-ac31-bec1dfff5efe</title>
      <link>https://vulnerability.circl.lu/sighting/2e89a663-1676-4e7a-ac31-bec1dfff5efe/export</link>
      <description>{"uuid": "2e89a663-1676-4e7a-ac31-bec1dfff5efe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/vitobotta.com/post/3mldpono4ms23", "content": "CISA KEV update May 7: CVE-2026-6973 Ivanti EPMM added. Actively exploited input validation flaw. Federal deadline applies, everyone else should patch. - www.cisa.gov/news-events/...", "creation_timestamp": "2026-05-08T12:19:41.087539Z"}</description>
      <content:encoded>{"uuid": "2e89a663-1676-4e7a-ac31-bec1dfff5efe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/vitobotta.com/post/3mldpono4ms23", "content": "CISA KEV update May 7: CVE-2026-6973 Ivanti EPMM added. Actively exploited input validation flaw. Federal deadline applies, everyone else should patch. - www.cisa.gov/news-events/...", "creation_timestamp": "2026-05-08T12:19:41.087539Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2e89a663-1676-4e7a-ac31-bec1dfff5efe/export</guid>
      <pubDate>Fri, 08 May 2026 12:19:41 +0000</pubDate>
    </item>
    <item>
      <title>52f60283-5eb2-4231-ab34-7f94ea3d8b74</title>
      <link>https://vulnerability.circl.lu/sighting/52f60283-5eb2-4231-ab34-7f94ea3d8b74/export</link>
      <description>{"uuid": "52f60283-5eb2-4231-ab34-7f94ea3d8b74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/116539082888845516", "content": "Tracked as CVE-2026-6973, this security flaw allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier. https://www.bleepingcomputer.com/news/security/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/", "creation_timestamp": "2026-05-08T13:01:25.007649Z"}</description>
      <content:encoded>{"uuid": "52f60283-5eb2-4231-ab34-7f94ea3d8b74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/116539082888845516", "content": "Tracked as CVE-2026-6973, this security flaw allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier. https://www.bleepingcomputer.com/news/security/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/", "creation_timestamp": "2026-05-08T13:01:25.007649Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/52f60283-5eb2-4231-ab34-7f94ea3d8b74/export</guid>
      <pubDate>Fri, 08 May 2026 13:01:25 +0000</pubDate>
    </item>
    <item>
      <title>018a6000-3cd7-4d74-b79f-74eb8d828c3c</title>
      <link>https://vulnerability.circl.lu/sighting/018a6000-3cd7-4d74-b79f-74eb8d828c3c/export</link>
      <description>{"uuid": "018a6000-3cd7-4d74-b79f-74eb8d828c3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3mldrziuo3c2m", "content": "Tracked as CVE-2026-6973, this security flaw allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier. www.bleepingcomputer.com/news/securit...", "creation_timestamp": "2026-05-08T13:01:33.629097Z"}</description>
      <content:encoded>{"uuid": "018a6000-3cd7-4d74-b79f-74eb8d828c3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3mldrziuo3c2m", "content": "Tracked as CVE-2026-6973, this security flaw allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier. www.bleepingcomputer.com/news/securit...", "creation_timestamp": "2026-05-08T13:01:33.629097Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/018a6000-3cd7-4d74-b79f-74eb8d828c3c/export</guid>
      <pubDate>Fri, 08 May 2026 13:01:33 +0000</pubDate>
    </item>
    <item>
      <title>34c1d492-f9c9-4c8f-8614-4171f197669b</title>
      <link>https://vulnerability.circl.lu/sighting/34c1d492-f9c9-4c8f-8614-4171f197669b/export</link>
      <description>{"uuid": "34c1d492-f9c9-4c8f-8614-4171f197669b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/neroqc.bsky.social/post/3mldtb56k4s2s", "content": "Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973)\nwww.helpnetsecurity.com/2026/05/08/i...", "creation_timestamp": "2026-05-08T13:23:45.713156Z"}</description>
      <content:encoded>{"uuid": "34c1d492-f9c9-4c8f-8614-4171f197669b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/neroqc.bsky.social/post/3mldtb56k4s2s", "content": "Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973)\nwww.helpnetsecurity.com/2026/05/08/i...", "creation_timestamp": "2026-05-08T13:23:45.713156Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/34c1d492-f9c9-4c8f-8614-4171f197669b/export</guid>
      <pubDate>Fri, 08 May 2026 13:23:45 +0000</pubDate>
    </item>
    <item>
      <title>d3a3012a-38ce-4682-bf6a-39773646c0c7</title>
      <link>https://vulnerability.circl.lu/sighting/d3a3012a-38ce-4682-bf6a-39773646c0c7/export</link>
      <description>{"uuid": "d3a3012a-38ce-4682-bf6a-39773646c0c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3mldz6f62ly2p", "content": "Ivanti: We are aware of a very limited number of customers exploited with CVE-2026-6973. Successful exploitation requires Admin authentication.", "creation_timestamp": "2026-05-08T15:09:32.457232Z"}</description>
      <content:encoded>{"uuid": "d3a3012a-38ce-4682-bf6a-39773646c0c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3mldz6f62ly2p", "content": "Ivanti: We are aware of a very limited number of customers exploited with CVE-2026-6973. Successful exploitation requires Admin authentication.", "creation_timestamp": "2026-05-08T15:09:32.457232Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d3a3012a-38ce-4682-bf6a-39773646c0c7/export</guid>
      <pubDate>Fri, 08 May 2026 15:09:32 +0000</pubDate>
    </item>
    <item>
      <title>116a4571-d6bb-4880-9f5c-2dd00b562286</title>
      <link>https://vulnerability.circl.lu/sighting/116a4571-d6bb-4880-9f5c-2dd00b562286/export</link>
      <description>{"uuid": "116a4571-d6bb-4880-9f5c-2dd00b562286", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mle36iy5cv2o", "content": "CISA mandates U.S. federal agencies to patch zero-day CVE-2026-6973 in Ivanti Endpoint Manager Mobile within 4 days. Vulnerability allows remote code execution by authenticated admins. Fixed versions released. #IvantiEPMM #ZeroDay #USA", "creation_timestamp": "2026-05-08T15:45:24.776899Z"}</description>
      <content:encoded>{"uuid": "116a4571-d6bb-4880-9f5c-2dd00b562286", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mle36iy5cv2o", "content": "CISA mandates U.S. federal agencies to patch zero-day CVE-2026-6973 in Ivanti Endpoint Manager Mobile within 4 days. Vulnerability allows remote code execution by authenticated admins. Fixed versions released. #IvantiEPMM #ZeroDay #USA", "creation_timestamp": "2026-05-08T15:45:24.776899Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/116a4571-d6bb-4880-9f5c-2dd00b562286/export</guid>
      <pubDate>Fri, 08 May 2026 15:45:24 +0000</pubDate>
    </item>
  </channel>
</rss>
