{"vulnerability": "CVE-2026-6973", "sightings": [{"uuid": "0fec9f59-b167-4e23-a834-271fd7e2668c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mlbljw4svm2u", "content": "\ud83d\udd17 CVE : CVE-2026-5786, CVE-2026-5787, CVE-2026-5788, CVE-2026-6973, CVE-2026-7821", "creation_timestamp": "2026-05-07T16:00:08.074004Z"}, {"uuid": "1ae74826-3237-4dd3-81fe-5a9655d84e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/6433076", "content": "2026-05-07: [CVE-2026-6973] Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation VulnerabilityIvanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability that allows a remotely authenticated user with administrative access to achieve remote code execution.\ncisakev", "creation_timestamp": "2026-05-07T17:08:54.682170Z"}, {"uuid": "9f61f014-659e-42a3-a5f1-dd52634cdb63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3mlblzctkjv2a", "content": "~Cybergcca~\nCCCS issued 5 advisories, highlighting critical updates for Spring, VM2, VMware, and an actively exploited Ivanti EPMM flaw.\n-\nIOCs: CVE-2026-6973, CVE-2026-40981\n-\n#Ivanti #ThreatIntel #Vulnerability", "creation_timestamp": "2026-05-07T16:08:44.128054Z"}, {"uuid": "af701273-0231-4aea-adbf-ae9d5d217e08", "vulnerability_lookup_origin": "405284c2-e461-4670-8979-7fd2c9755a60", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2026-6973", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/e2e02b4e-2925-4e83-80b2-04175c33125d", "content": "", "creation_timestamp": "2026-05-07T17:00:02.188283Z"}, {"uuid": "9c1b70a6-c5e9-4eb1-adcf-2589fa089553", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/ivanti-security-advisory-av26-435", "content": "", "creation_timestamp": "2026-05-07T08:35:50.000000Z"}, {"uuid": "d85eda67-2923-4dca-8e60-2d6025c576fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0135", "content": "", "creation_timestamp": "2026-05-07T09:17:26.000000Z"}, {"uuid": "1ae4ff5f-c7a1-4f48-a01d-4f798358e25c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116534135685499824", "content": "CIAS has updated the KEV catalogue.\n-  CVE-2026-6973: Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-6973 #infosec #CISA #Ivanti #vulnerability", "creation_timestamp": "2026-05-07T16:03:20.347918Z"}, {"uuid": "8bf0f738-06c2-41e7-96fb-409e467c5bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116534136643812529", "content": "CISA has updated the KEV catalogue.\n-  CVE-2026-6973: Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-6973 #infosec #CISA #Ivanti #vulnerability", "creation_timestamp": "2026-05-07T16:03:31.737116Z"}, {"uuid": "717ae356-454f-4be4-90d8-115741a454b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html", "content": "Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild.\nThe high-severity vulnerability, CVE-2026-6973 (CVSS score: 7.2), is a case of improper input validation affecting EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1.\nIt allows \"a remotely authenticated user with administrative access to achieve remote code", "creation_timestamp": "2026-05-07T15:55:00.000000Z"}, {"uuid": "051dd804-093a-4934-959c-b271b8f768ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mlbrwwvyrb2k", "content": "Ivanti EPMM Under Fire: CVE-2026-6973 Admin\u2011Auth 0\u2011Day Already Weaponized \u2013 Patch Now! +\u00a0Video\n\nIntroduction: Ivanti\u2019s Endpoint Manager Mobile (EPMM) on\u2011premises product is currently under active attack due to a newly disclosed zero\u2011day vulnerability, tracked as CVE\u20112026\u20116973. Although exploitation\u2026", "creation_timestamp": "2026-05-07T17:54:47.200500Z"}, {"uuid": "213e60a8-f3f6-44f5-9058-9236ef41b311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-authenticated-remote-code-execution-vulnerability-ivanti-epmm-exploited-patch", "content": "", "creation_timestamp": "2026-05-07T07:54:45.000000Z"}, {"uuid": "30bbf77b-3ed1-4177-8b29-dceb4e276950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-6973", "type": "seen", "source": "https://bsky.app/profile/montxt.bsky.social/post/3mlbuvtsqy325", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access  https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html", "creation_timestamp": "2026-05-07T18:47:51.595860Z"}, {"uuid": "f176f4da-b44e-427e-b030-3d07a67fa193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mlbvguyggu2v", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access", "creation_timestamp": "2026-05-07T18:57:23.730087Z"}, {"uuid": "22c191b7-6c7e-42d2-8f3e-5bcabd66cc8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://t.me/ctinow/249922", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access\nhttps://ift.tt/kwxzoRy", "creation_timestamp": "2026-05-07T18:29:48.000000Z"}, {"uuid": "536a9d54-f07f-4917-89cc-8841f10189ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3mlbz5cfg342k", "content": "~Cisa~\nCISA added CVE-2026-6973, an actively exploited Ivanti EPMM vulnerability, to its KEV catalog.\n-\nIOCs: CVE-2026-6973\n-\n#CVE2026_6973 #Ivanti #ThreatIntel", "creation_timestamp": "2026-05-07T20:03:36.577503Z"}, {"uuid": "d85f4426-f6b9-4600-b8f4-530c3f055d35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mlbxhyrb2c22", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited at...\n\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-07T20:09:55.575364Z"}, {"uuid": "1a2239bd-61e9-493f-93d7-6f49e6b6eebe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/116534898889978683", "content": "The U.S. CISA has added a zero-day vulnerability (CVE-2026-6973) in Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities catalog, urging federal agencies to patch by May 10, 2026. This flaw, requiring admin privileges, allows for arbitrary code execution and is already being exploited.https://securityaffairs.com/191822/security/u-s-cisa-adds-a-flaw-in-ivanti-endpoint-manager-mobile-epmm-to-its-known-exploited-vulnerabilities-catalog.html", "creation_timestamp": "2026-05-07T19:17:24.094165Z"}, {"uuid": "a4df78cf-53a9-4506-bbd8-c0b739a95149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/cybersecurity0001.bsky.social/post/3mlc245yg5x2k", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access", "creation_timestamp": "2026-05-07T20:20:52.697166Z"}, {"uuid": "0873f23f-241e-495e-aaac-4c6fdc2f47ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/cvesentinel.bsky.social/post/3mlc3xyc2qf2a", "content": "\ud83d\uded1 CVE-2026-6973\nIvanti Endpoint Manager Mobile (EPMM)\nCVSS 7.2 / KEV\nTL;DR: An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1\u2026\nhttps://cvesentinel.replit.app/report/CVE-2026-6973?utm_source=bluesky&amp;utm_medium=social&amp;utm_campaign=cvesentinel\n#infosec #CVE #vulnerability", "creation_timestamp": "2026-05-07T20:54:19.211745Z"}, {"uuid": "afd38283-2b5a-4952-acd4-3b2000488581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://t.me/TengkorakCyberCrewzz/10229", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access \u2013 thehackernews.com\n\nFri, 08 May 2026 01:55:00", "creation_timestamp": "2026-05-07T20:03:10.000000Z"}, {"uuid": "8c4dccea-c3f0-4010-99cf-3efa76f1eed4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116535389806075712", "content": "Attention, elevated activities detected targeting Ivanti Endpoint Manager Mobile (CVE-2026-6973) https://vuldb.com/vuln/361893/cti", "creation_timestamp": "2026-05-07T21:22:18.315318Z"}, {"uuid": "b88ec2c1-aa19-46ea-b9f0-5290b2785372", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlbx724hl427", "content": "Ivanti EPMM\u306b\u672a\u4fee\u6b63\u306e\u8106\u5f31\u6027(CVE-2026-6973)\u304c\u3042\u308a\u3001\u653b\u6483\u8005\u306f\u7ba1\u7406\u8005\u6a29\u9650\u3067\u30ea\u30e2\u30fc\u30c8\u30b3\u30fc\u30c9\u5b9f\u884c\u53ef\u80fd\u3067\u3059\u3002", "creation_timestamp": "2026-05-07T19:28:48.119456Z"}, {"uuid": "444d49ac-9f5b-4c93-80e0-1bcfac3cc707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/it4intserver.bsky.social/post/3mlbxxuts4j2d", "content": "iT4iNT SERVER Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access VDS VPS Cloud #Ivanti #CVE20266973 #CyberSecurity #RCE #EndpointManagement", "creation_timestamp": "2026-05-07T19:42:41.214161Z"}, {"uuid": "ef33886a-3d19-422d-9b9e-b96acca50c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/bitnewsbot.bsky.social/post/3mlcaz4d47m2x", "content": "A new, actively exploited flaw (CVE-2026-6973) in Ivanti Endpoint Manager Mobile allows authenticated admins remote code execution. The U.S. Cybersecurity [\u2026]", "creation_timestamp": "2026-05-07T22:24:27.086990Z"}, {"uuid": "4a676426-f0e2-4a85-b277-10c55c8a78b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mlcvjirw6cdi", "content": "CVE-2026-6973 Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability ", "creation_timestamp": "2026-05-08T04:31:59.176202Z"}, {"uuid": "55f5f247-ee30-415a-9f00-d99f52a797a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/Firefox.activitypub.awakari.com.ap.brid.gy/post/3mlciqnkajrx2", "content": "Ivanti EPMM Vulnerability Exploited in Active Attacks Grants Admin Access A critical security vulnerability in Ivanti\u2019s Endpoint Manager Mobile (EPMM) software is currently under active exploitat...\n\n#Security #CVE-2026-6973 #EPMM #Ivanti #remote #code #execution #security #vulnerability\n\nOrigin [\u2026]", "creation_timestamp": "2026-05-08T00:43:00.587658Z"}, {"uuid": "7de91dba-12c3-40e7-8acc-448c871bfb57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://threatintel.cc/2026/05/07/us-cisa-adds-a-flaw.html", "content": "U.S. CISA adds a flaw in Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities catalog\n\nThe U.S. CISA has added a zero-day vulnerability (CVE-2026-6973) in Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities catalog, urging federal agencies to patch by May 10, 2026. This flaw, requiring admin privileges, allows for arbitrary code execution and is already being exploited.", "creation_timestamp": "2026-05-07T17:17:27.000000Z"}, {"uuid": "30963270-b6a1-45ce-acaf-e5ea8fc07560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3mlc7txwz7h2m", "content": "Ivanti has issued a critical advisory for its Endpoint Manager Mobile (EPMM) product, revealing multiple actively exploited vulnerabilities, including CVE-2026-6973, which requires admin authentication. The flaws affect only on-premises EPMM deployments.", "creation_timestamp": "2026-05-07T22:03:40.445991Z"}, {"uuid": "e665eaab-083c-4b91-be30-4935ba179d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mlcgoza2gr23", "content": "CISA\u304c\u65e2\u77e5\u306e\u60aa\u7528\u3055\u308c\u305f\u8106\u5f31\u6027\u30921\u4ef6\u30ab\u30bf\u30ed\u30b0\u306b\u8ffd\u52a0 \n\nCISA Adds One Known Exploited Vulnerability to Catalog  #CISA (May 7)\n\nCVE-2026-6973  Ivanti Endpoint Manager Mobile (EPMM) \u306e\u4e0d\u9069\u5207\u306a\u5165\u529b\u691c\u8a3c\u306e\u8106\u5f31\u6027 \n\nwww.cisa.gov/news-events/...", "creation_timestamp": "2026-05-08T00:06:10.338330Z"}, {"uuid": "1c8a1fec-cc98-4ac0-90a3-106f3f99e38a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mlcgraupr32m", "content": "Ivanti EPMM\u306eCVE-2026-6973 RCE\u8106\u5f31\u6027\u304c\u5b9f\u969b\u306b\u60aa\u7528\u3055\u308c\u3001\u7ba1\u7406\u8005\u30ec\u30d9\u30eb\u306e\u30a2\u30af\u30bb\u30b9\u6a29\u304c\u4ed8\u4e0e\u3055\u308c\u308b \n\nIvanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access  #HackerNews (May 7)\n\nthehackernews.com/2026/05/ivan...", "creation_timestamp": "2026-05-08T00:07:24.939978Z"}, {"uuid": "110b3ef6-1988-4e94-a7b8-c742e4e4dccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/tajallius.bsky.social/post/3mlchyculfx2w", "content": "Ivanti Under Attack\n\nIvanti has confirmed the exploitation of a high-severity vulnerability, CVE-2026-6973, in Endpoint Manager Mobile, allowing authenticated admin users to execute arbitrary code. It highlights the risks of credential theft and emphasizes immediate patching, rotating admin\u2026", "creation_timestamp": "2026-05-08T00:29:16.334978Z"}, {"uuid": "6a0b65f5-e827-4e2c-86d0-02bbd59eb8f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mlcxvqgbocih", "content": "Ivanti\u3001\u30bc\u30ed\u30c7\u30a4\u306b\u60aa\u7528\u53ef\u80fd\u306a\u6b20\u9665\u542b\u3080EPMM\u306e\u8106\u5f31\u6027\u3092\u8907\u6570\u4fee\u6b63\uff08CVE-2026-6973\u3001CVE-2026-7821\u4ed6\uff09 | Codebook\uff5cSecurity News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45488/", "creation_timestamp": "2026-05-08T05:14:37.561704Z"}, {"uuid": "245c0a09-4f8d-4f56-a62f-3cce725d43b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus-2026-12", "content": "", "creation_timestamp": "2026-05-07T08:14:00.000000Z"}, {"uuid": "718424b1-bd82-4374-b43e-83d9774b7ceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-6973", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mlcx5kkcfsih", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html", "creation_timestamp": "2026-05-08T05:01:06.253835Z"}, {"uuid": "050d5118-3e7d-42d3-9687-88bcea386840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-6973", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3mlcxrztivm2x", "content": "Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...", "creation_timestamp": "2026-05-08T05:12:05.880113Z"}]}