<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T05:02:11.281381+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0873f23f-241e-495e-aaac-4c6fdc2f47ba/export</id>
    <title>0873f23f-241e-495e-aaac-4c6fdc2f47ba</title>
    <updated>2026-05-08T05:02:11.289279+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0873f23f-241e-495e-aaac-4c6fdc2f47ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/cvesentinel.bsky.social/post/3mlc3xyc2qf2a", "content": "\ud83d\uded1 CVE-2026-6973\nIvanti Endpoint Manager Mobile (EPMM)\nCVSS 7.2 / KEV\nTL;DR: An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1\u2026\nhttps://cvesentinel.replit.app/report/CVE-2026-6973?utm_source=bluesky&amp;amp;utm_medium=social&amp;amp;utm_campaign=cvesentinel\n#infosec #CVE #vulnerability", "creation_timestamp": "2026-05-07T20:54:19.211745Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0873f23f-241e-495e-aaac-4c6fdc2f47ba/export"/>
    <published>2026-05-07T20:54:19.211745+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8c4dccea-c3f0-4010-99cf-3efa76f1eed4/export</id>
    <title>8c4dccea-c3f0-4010-99cf-3efa76f1eed4</title>
    <updated>2026-05-08T05:02:11.289181+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8c4dccea-c3f0-4010-99cf-3efa76f1eed4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116535389806075712", "content": "Attention, elevated activities detected targeting Ivanti Endpoint Manager Mobile (CVE-2026-6973) https://vuldb.com/vuln/361893/cti", "creation_timestamp": "2026-05-07T21:22:18.315318Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8c4dccea-c3f0-4010-99cf-3efa76f1eed4/export"/>
    <published>2026-05-07T21:22:18.315318+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/30963270-b6a1-45ce-acaf-e5ea8fc07560/export</id>
    <title>30963270-b6a1-45ce-acaf-e5ea8fc07560</title>
    <updated>2026-05-08T05:02:11.289101+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "30963270-b6a1-45ce-acaf-e5ea8fc07560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3mlc7txwz7h2m", "content": "Ivanti has issued a critical advisory for its Endpoint Manager Mobile (EPMM) product, revealing multiple actively exploited vulnerabilities, including CVE-2026-6973, which requires admin authentication. The flaws affect only on-premises EPMM deployments.", "creation_timestamp": "2026-05-07T22:03:40.445991Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/30963270-b6a1-45ce-acaf-e5ea8fc07560/export"/>
    <published>2026-05-07T22:03:40.445991+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ef33886a-3d19-422d-9b9e-b96acca50c41/export</id>
    <title>ef33886a-3d19-422d-9b9e-b96acca50c41</title>
    <updated>2026-05-08T05:02:11.289017+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ef33886a-3d19-422d-9b9e-b96acca50c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/bitnewsbot.bsky.social/post/3mlcaz4d47m2x", "content": "A new, actively exploited flaw (CVE-2026-6973) in Ivanti Endpoint Manager Mobile allows authenticated admins remote code execution. The U.S. Cybersecurity [\u2026]", "creation_timestamp": "2026-05-07T22:24:27.086990Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ef33886a-3d19-422d-9b9e-b96acca50c41/export"/>
    <published>2026-05-07T22:24:27.086990+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e665eaab-083c-4b91-be30-4935ba179d28/export</id>
    <title>e665eaab-083c-4b91-be30-4935ba179d28</title>
    <updated>2026-05-08T05:02:11.288924+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e665eaab-083c-4b91-be30-4935ba179d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mlcgoza2gr23", "content": "CISA\u304c\u65e2\u77e5\u306e\u60aa\u7528\u3055\u308c\u305f\u8106\u5f31\u6027\u30921\u4ef6\u30ab\u30bf\u30ed\u30b0\u306b\u8ffd\u52a0 \n\nCISA Adds One Known Exploited Vulnerability to Catalog  #CISA (May 7)\n\nCVE-2026-6973  Ivanti Endpoint Manager Mobile (EPMM) \u306e\u4e0d\u9069\u5207\u306a\u5165\u529b\u691c\u8a3c\u306e\u8106\u5f31\u6027 \n\nwww.cisa.gov/news-events/...", "creation_timestamp": "2026-05-08T00:06:10.338330Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e665eaab-083c-4b91-be30-4935ba179d28/export"/>
    <published>2026-05-08T00:06:10.338330+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1c8a1fec-cc98-4ac0-90a3-106f3f99e38a/export</id>
    <title>1c8a1fec-cc98-4ac0-90a3-106f3f99e38a</title>
    <updated>2026-05-08T05:02:11.288834+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1c8a1fec-cc98-4ac0-90a3-106f3f99e38a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mlcgraupr32m", "content": "Ivanti EPMM\u306eCVE-2026-6973 RCE\u8106\u5f31\u6027\u304c\u5b9f\u969b\u306b\u60aa\u7528\u3055\u308c\u3001\u7ba1\u7406\u8005\u30ec\u30d9\u30eb\u306e\u30a2\u30af\u30bb\u30b9\u6a29\u304c\u4ed8\u4e0e\u3055\u308c\u308b \n\nIvanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access  #HackerNews (May 7)\n\nthehackernews.com/2026/05/ivan...", "creation_timestamp": "2026-05-08T00:07:24.939978Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1c8a1fec-cc98-4ac0-90a3-106f3f99e38a/export"/>
    <published>2026-05-08T00:07:24.939978+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/110b3ef6-1988-4e94-a7b8-c742e4e4dccd/export</id>
    <title>110b3ef6-1988-4e94-a7b8-c742e4e4dccd</title>
    <updated>2026-05-08T05:02:11.288743+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "110b3ef6-1988-4e94-a7b8-c742e4e4dccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/tajallius.bsky.social/post/3mlchyculfx2w", "content": "Ivanti Under Attack\n\nIvanti has confirmed the exploitation of a high-severity vulnerability, CVE-2026-6973, in Endpoint Manager Mobile, allowing authenticated admin users to execute arbitrary code. It highlights the risks of credential theft and emphasizes immediate patching, rotating admin\u2026", "creation_timestamp": "2026-05-08T00:29:16.334978Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/110b3ef6-1988-4e94-a7b8-c742e4e4dccd/export"/>
    <published>2026-05-08T00:29:16.334978+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/55f5f247-ee30-415a-9f00-d99f52a797a7/export</id>
    <title>55f5f247-ee30-415a-9f00-d99f52a797a7</title>
    <updated>2026-05-08T05:02:11.288648+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "55f5f247-ee30-415a-9f00-d99f52a797a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/Firefox.activitypub.awakari.com.ap.brid.gy/post/3mlciqnkajrx2", "content": "Ivanti EPMM Vulnerability Exploited in Active Attacks Grants Admin Access A critical security vulnerability in Ivanti\u2019s Endpoint Manager Mobile (EPMM) software is currently under active exploitat...\n\n#Security #CVE-2026-6973 #EPMM #Ivanti #remote #code #execution #security #vulnerability\n\nOrigin [\u2026]", "creation_timestamp": "2026-05-08T00:43:00.587658Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/55f5f247-ee30-415a-9f00-d99f52a797a7/export"/>
    <published>2026-05-08T00:43:00.587658+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a676426-f0e2-4a85-b277-10c55c8a78b0/export</id>
    <title>4a676426-f0e2-4a85-b277-10c55c8a78b0</title>
    <updated>2026-05-08T05:02:11.288513+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a676426-f0e2-4a85-b277-10c55c8a78b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mlcvjirw6cdi", "content": "CVE-2026-6973 Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability ", "creation_timestamp": "2026-05-08T04:31:59.176202Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a676426-f0e2-4a85-b277-10c55c8a78b0/export"/>
    <published>2026-05-08T04:31:59.176202+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/718424b1-bd82-4374-b43e-83d9774b7ceb/export</id>
    <title>718424b1-bd82-4374-b43e-83d9774b7ceb</title>
    <updated>2026-05-08T05:02:11.286378+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "718424b1-bd82-4374-b43e-83d9774b7ceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-6973", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mlcx5kkcfsih", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html", "creation_timestamp": "2026-05-08T05:01:06.253835Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/718424b1-bd82-4374-b43e-83d9774b7ceb/export"/>
    <published>2026-05-08T05:01:06.253835+00:00</published>
  </entry>
</feed>
