<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 05:02:11 +0000</lastBuildDate>
    <item>
      <title>0873f23f-241e-495e-aaac-4c6fdc2f47ba</title>
      <link>https://vulnerability.circl.lu/sighting/0873f23f-241e-495e-aaac-4c6fdc2f47ba/export</link>
      <description>{"uuid": "0873f23f-241e-495e-aaac-4c6fdc2f47ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/cvesentinel.bsky.social/post/3mlc3xyc2qf2a", "content": "\ud83d\uded1 CVE-2026-6973\nIvanti Endpoint Manager Mobile (EPMM)\nCVSS 7.2 / KEV\nTL;DR: An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1\u2026\nhttps://cvesentinel.replit.app/report/CVE-2026-6973?utm_source=bluesky&amp;amp;utm_medium=social&amp;amp;utm_campaign=cvesentinel\n#infosec #CVE #vulnerability", "creation_timestamp": "2026-05-07T20:54:19.211745Z"}</description>
      <content:encoded>{"uuid": "0873f23f-241e-495e-aaac-4c6fdc2f47ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/cvesentinel.bsky.social/post/3mlc3xyc2qf2a", "content": "\ud83d\uded1 CVE-2026-6973\nIvanti Endpoint Manager Mobile (EPMM)\nCVSS 7.2 / KEV\nTL;DR: An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1\u2026\nhttps://cvesentinel.replit.app/report/CVE-2026-6973?utm_source=bluesky&amp;amp;utm_medium=social&amp;amp;utm_campaign=cvesentinel\n#infosec #CVE #vulnerability", "creation_timestamp": "2026-05-07T20:54:19.211745Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0873f23f-241e-495e-aaac-4c6fdc2f47ba/export</guid>
      <pubDate>Thu, 07 May 2026 20:54:19 +0000</pubDate>
    </item>
    <item>
      <title>8c4dccea-c3f0-4010-99cf-3efa76f1eed4</title>
      <link>https://vulnerability.circl.lu/sighting/8c4dccea-c3f0-4010-99cf-3efa76f1eed4/export</link>
      <description>{"uuid": "8c4dccea-c3f0-4010-99cf-3efa76f1eed4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116535389806075712", "content": "Attention, elevated activities detected targeting Ivanti Endpoint Manager Mobile (CVE-2026-6973) https://vuldb.com/vuln/361893/cti", "creation_timestamp": "2026-05-07T21:22:18.315318Z"}</description>
      <content:encoded>{"uuid": "8c4dccea-c3f0-4010-99cf-3efa76f1eed4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116535389806075712", "content": "Attention, elevated activities detected targeting Ivanti Endpoint Manager Mobile (CVE-2026-6973) https://vuldb.com/vuln/361893/cti", "creation_timestamp": "2026-05-07T21:22:18.315318Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8c4dccea-c3f0-4010-99cf-3efa76f1eed4/export</guid>
      <pubDate>Thu, 07 May 2026 21:22:18 +0000</pubDate>
    </item>
    <item>
      <title>30963270-b6a1-45ce-acaf-e5ea8fc07560</title>
      <link>https://vulnerability.circl.lu/sighting/30963270-b6a1-45ce-acaf-e5ea8fc07560/export</link>
      <description>{"uuid": "30963270-b6a1-45ce-acaf-e5ea8fc07560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3mlc7txwz7h2m", "content": "Ivanti has issued a critical advisory for its Endpoint Manager Mobile (EPMM) product, revealing multiple actively exploited vulnerabilities, including CVE-2026-6973, which requires admin authentication. The flaws affect only on-premises EPMM deployments.", "creation_timestamp": "2026-05-07T22:03:40.445991Z"}</description>
      <content:encoded>{"uuid": "30963270-b6a1-45ce-acaf-e5ea8fc07560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3mlc7txwz7h2m", "content": "Ivanti has issued a critical advisory for its Endpoint Manager Mobile (EPMM) product, revealing multiple actively exploited vulnerabilities, including CVE-2026-6973, which requires admin authentication. The flaws affect only on-premises EPMM deployments.", "creation_timestamp": "2026-05-07T22:03:40.445991Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/30963270-b6a1-45ce-acaf-e5ea8fc07560/export</guid>
      <pubDate>Thu, 07 May 2026 22:03:40 +0000</pubDate>
    </item>
    <item>
      <title>ef33886a-3d19-422d-9b9e-b96acca50c41</title>
      <link>https://vulnerability.circl.lu/sighting/ef33886a-3d19-422d-9b9e-b96acca50c41/export</link>
      <description>{"uuid": "ef33886a-3d19-422d-9b9e-b96acca50c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/bitnewsbot.bsky.social/post/3mlcaz4d47m2x", "content": "A new, actively exploited flaw (CVE-2026-6973) in Ivanti Endpoint Manager Mobile allows authenticated admins remote code execution. The U.S. Cybersecurity [\u2026]", "creation_timestamp": "2026-05-07T22:24:27.086990Z"}</description>
      <content:encoded>{"uuid": "ef33886a-3d19-422d-9b9e-b96acca50c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/bitnewsbot.bsky.social/post/3mlcaz4d47m2x", "content": "A new, actively exploited flaw (CVE-2026-6973) in Ivanti Endpoint Manager Mobile allows authenticated admins remote code execution. The U.S. Cybersecurity [\u2026]", "creation_timestamp": "2026-05-07T22:24:27.086990Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ef33886a-3d19-422d-9b9e-b96acca50c41/export</guid>
      <pubDate>Thu, 07 May 2026 22:24:27 +0000</pubDate>
    </item>
    <item>
      <title>e665eaab-083c-4b91-be30-4935ba179d28</title>
      <link>https://vulnerability.circl.lu/sighting/e665eaab-083c-4b91-be30-4935ba179d28/export</link>
      <description>{"uuid": "e665eaab-083c-4b91-be30-4935ba179d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mlcgoza2gr23", "content": "CISA\u304c\u65e2\u77e5\u306e\u60aa\u7528\u3055\u308c\u305f\u8106\u5f31\u6027\u30921\u4ef6\u30ab\u30bf\u30ed\u30b0\u306b\u8ffd\u52a0 \n\nCISA Adds One Known Exploited Vulnerability to Catalog  #CISA (May 7)\n\nCVE-2026-6973  Ivanti Endpoint Manager Mobile (EPMM) \u306e\u4e0d\u9069\u5207\u306a\u5165\u529b\u691c\u8a3c\u306e\u8106\u5f31\u6027 \n\nwww.cisa.gov/news-events/...", "creation_timestamp": "2026-05-08T00:06:10.338330Z"}</description>
      <content:encoded>{"uuid": "e665eaab-083c-4b91-be30-4935ba179d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mlcgoza2gr23", "content": "CISA\u304c\u65e2\u77e5\u306e\u60aa\u7528\u3055\u308c\u305f\u8106\u5f31\u6027\u30921\u4ef6\u30ab\u30bf\u30ed\u30b0\u306b\u8ffd\u52a0 \n\nCISA Adds One Known Exploited Vulnerability to Catalog  #CISA (May 7)\n\nCVE-2026-6973  Ivanti Endpoint Manager Mobile (EPMM) \u306e\u4e0d\u9069\u5207\u306a\u5165\u529b\u691c\u8a3c\u306e\u8106\u5f31\u6027 \n\nwww.cisa.gov/news-events/...", "creation_timestamp": "2026-05-08T00:06:10.338330Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e665eaab-083c-4b91-be30-4935ba179d28/export</guid>
      <pubDate>Fri, 08 May 2026 00:06:10 +0000</pubDate>
    </item>
    <item>
      <title>1c8a1fec-cc98-4ac0-90a3-106f3f99e38a</title>
      <link>https://vulnerability.circl.lu/sighting/1c8a1fec-cc98-4ac0-90a3-106f3f99e38a/export</link>
      <description>{"uuid": "1c8a1fec-cc98-4ac0-90a3-106f3f99e38a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mlcgraupr32m", "content": "Ivanti EPMM\u306eCVE-2026-6973 RCE\u8106\u5f31\u6027\u304c\u5b9f\u969b\u306b\u60aa\u7528\u3055\u308c\u3001\u7ba1\u7406\u8005\u30ec\u30d9\u30eb\u306e\u30a2\u30af\u30bb\u30b9\u6a29\u304c\u4ed8\u4e0e\u3055\u308c\u308b \n\nIvanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access  #HackerNews (May 7)\n\nthehackernews.com/2026/05/ivan...", "creation_timestamp": "2026-05-08T00:07:24.939978Z"}</description>
      <content:encoded>{"uuid": "1c8a1fec-cc98-4ac0-90a3-106f3f99e38a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mlcgraupr32m", "content": "Ivanti EPMM\u306eCVE-2026-6973 RCE\u8106\u5f31\u6027\u304c\u5b9f\u969b\u306b\u60aa\u7528\u3055\u308c\u3001\u7ba1\u7406\u8005\u30ec\u30d9\u30eb\u306e\u30a2\u30af\u30bb\u30b9\u6a29\u304c\u4ed8\u4e0e\u3055\u308c\u308b \n\nIvanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access  #HackerNews (May 7)\n\nthehackernews.com/2026/05/ivan...", "creation_timestamp": "2026-05-08T00:07:24.939978Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1c8a1fec-cc98-4ac0-90a3-106f3f99e38a/export</guid>
      <pubDate>Fri, 08 May 2026 00:07:24 +0000</pubDate>
    </item>
    <item>
      <title>110b3ef6-1988-4e94-a7b8-c742e4e4dccd</title>
      <link>https://vulnerability.circl.lu/sighting/110b3ef6-1988-4e94-a7b8-c742e4e4dccd/export</link>
      <description>{"uuid": "110b3ef6-1988-4e94-a7b8-c742e4e4dccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/tajallius.bsky.social/post/3mlchyculfx2w", "content": "Ivanti Under Attack\n\nIvanti has confirmed the exploitation of a high-severity vulnerability, CVE-2026-6973, in Endpoint Manager Mobile, allowing authenticated admin users to execute arbitrary code. It highlights the risks of credential theft and emphasizes immediate patching, rotating admin\u2026", "creation_timestamp": "2026-05-08T00:29:16.334978Z"}</description>
      <content:encoded>{"uuid": "110b3ef6-1988-4e94-a7b8-c742e4e4dccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/tajallius.bsky.social/post/3mlchyculfx2w", "content": "Ivanti Under Attack\n\nIvanti has confirmed the exploitation of a high-severity vulnerability, CVE-2026-6973, in Endpoint Manager Mobile, allowing authenticated admin users to execute arbitrary code. It highlights the risks of credential theft and emphasizes immediate patching, rotating admin\u2026", "creation_timestamp": "2026-05-08T00:29:16.334978Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/110b3ef6-1988-4e94-a7b8-c742e4e4dccd/export</guid>
      <pubDate>Fri, 08 May 2026 00:29:16 +0000</pubDate>
    </item>
    <item>
      <title>55f5f247-ee30-415a-9f00-d99f52a797a7</title>
      <link>https://vulnerability.circl.lu/sighting/55f5f247-ee30-415a-9f00-d99f52a797a7/export</link>
      <description>{"uuid": "55f5f247-ee30-415a-9f00-d99f52a797a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/Firefox.activitypub.awakari.com.ap.brid.gy/post/3mlciqnkajrx2", "content": "Ivanti EPMM Vulnerability Exploited in Active Attacks Grants Admin Access A critical security vulnerability in Ivanti\u2019s Endpoint Manager Mobile (EPMM) software is currently under active exploitat...\n\n#Security #CVE-2026-6973 #EPMM #Ivanti #remote #code #execution #security #vulnerability\n\nOrigin [\u2026]", "creation_timestamp": "2026-05-08T00:43:00.587658Z"}</description>
      <content:encoded>{"uuid": "55f5f247-ee30-415a-9f00-d99f52a797a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/Firefox.activitypub.awakari.com.ap.brid.gy/post/3mlciqnkajrx2", "content": "Ivanti EPMM Vulnerability Exploited in Active Attacks Grants Admin Access A critical security vulnerability in Ivanti\u2019s Endpoint Manager Mobile (EPMM) software is currently under active exploitat...\n\n#Security #CVE-2026-6973 #EPMM #Ivanti #remote #code #execution #security #vulnerability\n\nOrigin [\u2026]", "creation_timestamp": "2026-05-08T00:43:00.587658Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/55f5f247-ee30-415a-9f00-d99f52a797a7/export</guid>
      <pubDate>Fri, 08 May 2026 00:43:00 +0000</pubDate>
    </item>
    <item>
      <title>4a676426-f0e2-4a85-b277-10c55c8a78b0</title>
      <link>https://vulnerability.circl.lu/sighting/4a676426-f0e2-4a85-b277-10c55c8a78b0/export</link>
      <description>{"uuid": "4a676426-f0e2-4a85-b277-10c55c8a78b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mlcvjirw6cdi", "content": "CVE-2026-6973 Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability ", "creation_timestamp": "2026-05-08T04:31:59.176202Z"}</description>
      <content:encoded>{"uuid": "4a676426-f0e2-4a85-b277-10c55c8a78b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mlcvjirw6cdi", "content": "CVE-2026-6973 Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability ", "creation_timestamp": "2026-05-08T04:31:59.176202Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4a676426-f0e2-4a85-b277-10c55c8a78b0/export</guid>
      <pubDate>Fri, 08 May 2026 04:31:59 +0000</pubDate>
    </item>
    <item>
      <title>718424b1-bd82-4374-b43e-83d9774b7ceb</title>
      <link>https://vulnerability.circl.lu/sighting/718424b1-bd82-4374-b43e-83d9774b7ceb/export</link>
      <description>{"uuid": "718424b1-bd82-4374-b43e-83d9774b7ceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-6973", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mlcx5kkcfsih", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html", "creation_timestamp": "2026-05-08T05:01:06.253835Z"}</description>
      <content:encoded>{"uuid": "718424b1-bd82-4374-b43e-83d9774b7ceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-6973", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mlcx5kkcfsih", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html", "creation_timestamp": "2026-05-08T05:01:06.253835Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/718424b1-bd82-4374-b43e-83d9774b7ceb/export</guid>
      <pubDate>Fri, 08 May 2026 05:01:06 +0000</pubDate>
    </item>
  </channel>
</rss>
