<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 23:35:44 +0000</lastBuildDate>
    <item>
      <title>672f70fa-b3cb-4343-b7f9-cd5f2a1d85c5</title>
      <link>https://vulnerability.circl.lu/sighting/672f70fa-b3cb-4343-b7f9-cd5f2a1d85c5/export</link>
      <description>{"uuid": "672f70fa-b3cb-4343-b7f9-cd5f2a1d85c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://t.me/GithubRedTeam/83176", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-0073-poc\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a u33pk\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Shell\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-07 07:49:04\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-07T08:00:04.000000Z"}</description>
      <content:encoded>{"uuid": "672f70fa-b3cb-4343-b7f9-cd5f2a1d85c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://t.me/GithubRedTeam/83176", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-0073-poc\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a u33pk\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Shell\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-07 07:49:04\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-07T08:00:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/672f70fa-b3cb-4343-b7f9-cd5f2a1d85c5/export</guid>
      <pubDate>Thu, 07 May 2026 08:00:04 +0000</pubDate>
    </item>
    <item>
      <title>39c899ae-2726-468a-bd54-4f00ad866103</title>
      <link>https://vulnerability.circl.lu/sighting/39c899ae-2726-468a-bd54-4f00ad866103/export</link>
      <description>{"uuid": "39c899ae-2726-468a-bd54-4f00ad866103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibk6c2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:36.031591Z"}</description>
      <content:encoded>{"uuid": "39c899ae-2726-468a-bd54-4f00ad866103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibk6c2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:36.031591Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/39c899ae-2726-468a-bd54-4f00ad866103/export</guid>
      <pubDate>Thu, 07 May 2026 16:06:36 +0000</pubDate>
    </item>
    <item>
      <title>b0279846-a41c-4a91-9c9c-97d59876aeae</title>
      <link>https://vulnerability.circl.lu/sighting/b0279846-a41c-4a91-9c9c-97d59876aeae/export</link>
      <description>{"uuid": "b0279846-a41c-4a91-9c9c-97d59876aeae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibsxk2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:36.758938Z"}</description>
      <content:encoded>{"uuid": "b0279846-a41c-4a91-9c9c-97d59876aeae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibsxk2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:36.758938Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b0279846-a41c-4a91-9c9c-97d59876aeae/export</guid>
      <pubDate>Thu, 07 May 2026 16:06:36 +0000</pubDate>
    </item>
    <item>
      <title>bb97d229-c3e6-4136-bbf2-e8c306f28c8c</title>
      <link>https://vulnerability.circl.lu/sighting/bb97d229-c3e6-4136-bbf2-e8c306f28c8c/export</link>
      <description>{"uuid": "bb97d229-c3e6-4136-bbf2-e8c306f28c8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibtws2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:37.421195Z"}</description>
      <content:encoded>{"uuid": "bb97d229-c3e6-4136-bbf2-e8c306f28c8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibtws2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:37.421195Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bb97d229-c3e6-4136-bbf2-e8c306f28c8c/export</guid>
      <pubDate>Thu, 07 May 2026 16:06:37 +0000</pubDate>
    </item>
    <item>
      <title>aa894c65-4c2d-4beb-800c-485ffb2456d0</title>
      <link>https://vulnerability.circl.lu/sighting/aa894c65-4c2d-4beb-800c-485ffb2456d0/export</link>
      <description>{"uuid": "aa894c65-4c2d-4beb-800c-485ffb2456d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibuw22m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:40.066545Z"}</description>
      <content:encoded>{"uuid": "aa894c65-4c2d-4beb-800c-485ffb2456d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibuw22m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:40.066545Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aa894c65-4c2d-4beb-800c-485ffb2456d0/export</guid>
      <pubDate>Thu, 07 May 2026 16:06:40 +0000</pubDate>
    </item>
    <item>
      <title>47c87132-b592-400d-ad22-1ea6b39bd32f</title>
      <link>https://vulnerability.circl.lu/sighting/47c87132-b592-400d-ad22-1ea6b39bd32f/export</link>
      <description>{"uuid": "47c87132-b592-400d-ad22-1ea6b39bd32f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibvvc2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:40.867755Z"}</description>
      <content:encoded>{"uuid": "47c87132-b592-400d-ad22-1ea6b39bd32f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibvvc2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:40.867755Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/47c87132-b592-400d-ad22-1ea6b39bd32f/export</guid>
      <pubDate>Thu, 07 May 2026 16:06:40 +0000</pubDate>
    </item>
    <item>
      <title>7193471c-0615-400a-af56-6f2dc7753269</title>
      <link>https://vulnerability.circl.lu/sighting/7193471c-0615-400a-af56-6f2dc7753269/export</link>
      <description>{"uuid": "7193471c-0615-400a-af56-6f2dc7753269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibwuk2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:41.643027Z"}</description>
      <content:encoded>{"uuid": "7193471c-0615-400a-af56-6f2dc7753269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibwuk2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:41.643027Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7193471c-0615-400a-af56-6f2dc7753269/export</guid>
      <pubDate>Thu, 07 May 2026 16:06:41 +0000</pubDate>
    </item>
    <item>
      <title>cb56d539-3554-45ce-a284-a300f945747d</title>
      <link>https://vulnerability.circl.lu/sighting/cb56d539-3554-45ce-a284-a300f945747d/export</link>
      <description>{"uuid": "cb56d539-3554-45ce-a284-a300f945747d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibxts2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:42.372421Z"}</description>
      <content:encoded>{"uuid": "cb56d539-3554-45ce-a284-a300f945747d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibxts2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:42.372421Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cb56d539-3554-45ce-a284-a300f945747d/export</guid>
      <pubDate>Thu, 07 May 2026 16:06:42 +0000</pubDate>
    </item>
    <item>
      <title>cb65fa08-77bf-4eb6-8791-d2b4bf60e2dd</title>
      <link>https://vulnerability.circl.lu/sighting/cb65fa08-77bf-4eb6-8791-d2b4bf60e2dd/export</link>
      <description>{"uuid": "cb65fa08-77bf-4eb6-8791-d2b4bf60e2dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibxtt2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:43.133970Z"}</description>
      <content:encoded>{"uuid": "cb65fa08-77bf-4eb6-8791-d2b4bf60e2dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibxtt2m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:43.133970Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cb65fa08-77bf-4eb6-8791-d2b4bf60e2dd/export</guid>
      <pubDate>Thu, 07 May 2026 16:06:43 +0000</pubDate>
    </item>
    <item>
      <title>552e538e-d0f5-4f42-a572-7fb2f39d39c6</title>
      <link>https://vulnerability.circl.lu/sighting/552e538e-d0f5-4f42-a572-7fb2f39d39c6/export</link>
      <description>{"uuid": "552e538e-d0f5-4f42-a572-7fb2f39d39c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibyt32m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:43.926210Z"}</description>
      <content:encoded>{"uuid": "552e538e-d0f5-4f42-a572-7fb2f39d39c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0073", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mlblvibyt32m", "content": "4/ \ud83d\udd10 Critical patches this week: CVE-2026-29014 (MetInfo, CVSS 9.8, actively exploited). CVE-2026-0073 (Android zero-click RCE). Palo Alto PAN-OS zero-day being exploited by state actors. Patch. Now.", "creation_timestamp": "2026-05-07T16:06:43.926210Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/552e538e-d0f5-4f42-a572-7fb2f39d39c6/export</guid>
      <pubDate>Thu, 07 May 2026 16:06:43 +0000</pubDate>
    </item>
  </channel>
</rss>
