<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T13:42:19.248399+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/39c899ae-2726-468a-bd54-4f00ad866103/export</id>
    <title>39c899ae-2726-468a-bd54-4f00ad866103</title>
    <updated>2026-05-08T13:42:19.256267+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "39c899ae-2726-468a-bd54-4f00ad866103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibk6c2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:36.031591Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/39c899ae-2726-468a-bd54-4f00ad866103/export"/>
    <published>2026-05-07T16:06:36.031591+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b0279846-a41c-4a91-9c9c-97d59876aeae/export</id>
    <title>b0279846-a41c-4a91-9c9c-97d59876aeae</title>
    <updated>2026-05-08T13:42:19.256185+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b0279846-a41c-4a91-9c9c-97d59876aeae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibsxk2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:36.758938Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b0279846-a41c-4a91-9c9c-97d59876aeae/export"/>
    <published>2026-05-07T16:06:36.758938+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bb97d229-c3e6-4136-bbf2-e8c306f28c8c/export</id>
    <title>bb97d229-c3e6-4136-bbf2-e8c306f28c8c</title>
    <updated>2026-05-08T13:42:19.256102+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bb97d229-c3e6-4136-bbf2-e8c306f28c8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibtws2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:37.421195Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bb97d229-c3e6-4136-bbf2-e8c306f28c8c/export"/>
    <published>2026-05-07T16:06:37.421195+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/aa894c65-4c2d-4beb-800c-485ffb2456d0/export</id>
    <title>aa894c65-4c2d-4beb-800c-485ffb2456d0</title>
    <updated>2026-05-08T13:42:19.256008+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "aa894c65-4c2d-4beb-800c-485ffb2456d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibuw22m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:40.066545Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/aa894c65-4c2d-4beb-800c-485ffb2456d0/export"/>
    <published>2026-05-07T16:06:40.066545+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/47c87132-b592-400d-ad22-1ea6b39bd32f/export</id>
    <title>47c87132-b592-400d-ad22-1ea6b39bd32f</title>
    <updated>2026-05-08T13:42:19.255918+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "47c87132-b592-400d-ad22-1ea6b39bd32f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibvvc2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:40.867755Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/47c87132-b592-400d-ad22-1ea6b39bd32f/export"/>
    <published>2026-05-07T16:06:40.867755+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7193471c-0615-400a-af56-6f2dc7753269/export</id>
    <title>7193471c-0615-400a-af56-6f2dc7753269</title>
    <updated>2026-05-08T13:42:19.255821+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7193471c-0615-400a-af56-6f2dc7753269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibwuk2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:41.643027Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7193471c-0615-400a-af56-6f2dc7753269/export"/>
    <published>2026-05-07T16:06:41.643027+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cb56d539-3554-45ce-a284-a300f945747d/export</id>
    <title>cb56d539-3554-45ce-a284-a300f945747d</title>
    <updated>2026-05-08T13:42:19.255715+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cb56d539-3554-45ce-a284-a300f945747d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibxts2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:42.372421Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cb56d539-3554-45ce-a284-a300f945747d/export"/>
    <published>2026-05-07T16:06:42.372421+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cb65fa08-77bf-4eb6-8791-d2b4bf60e2dd/export</id>
    <title>cb65fa08-77bf-4eb6-8791-d2b4bf60e2dd</title>
    <updated>2026-05-08T13:42:19.255596+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cb65fa08-77bf-4eb6-8791-d2b4bf60e2dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibxtt2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:43.133970Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cb65fa08-77bf-4eb6-8791-d2b4bf60e2dd/export"/>
    <published>2026-05-07T16:06:43.133970+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/552e538e-d0f5-4f42-a572-7fb2f39d39c6/export</id>
    <title>552e538e-d0f5-4f42-a572-7fb2f39d39c6</title>
    <updated>2026-05-08T13:42:19.255444+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "552e538e-d0f5-4f42-a572-7fb2f39d39c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibyt32m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:43.926210Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/552e538e-d0f5-4f42-a572-7fb2f39d39c6/export"/>
    <published>2026-05-07T16:06:43.926210+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a086f7ac-a877-4beb-9112-26d78d80903a/export</id>
    <title>a086f7ac-a877-4beb-9112-26d78d80903a</title>
    <updated>2026-05-08T13:42:19.253745+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a086f7ac-a877-4beb-9112-26d78d80903a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/grapheneos.org/post/3mlcj47c6ws2i", "content": "CVE-2026-0073 is a Critical severity Remote Code Execution (RCE) vulnerability included as the only vulnerability fixed in the May 2026 Android Security Bulletin. GrapheneOS first shipped the patch in our 2026030501 security preview release on March 5th. It also isn't nearly as severe as it sounds.", "creation_timestamp": "2026-05-08T00:49:19.644453Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a086f7ac-a877-4beb-9112-26d78d80903a/export"/>
    <published>2026-05-08T00:49:19.644453+00:00</published>
  </entry>
</feed>
