<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T02:48:44.931183+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d6a7a656-2aa0-419b-9287-3c3549ddce5c/export</id>
    <title>d6a7a656-2aa0-419b-9287-3c3549ddce5c</title>
    <updated>2026-05-04T02:48:45.077196+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d6a7a656-2aa0-419b-9287-3c3549ddce5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1073", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11223", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1073\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L)\n\ud83d\udd39 Description: Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device.\n\ud83d\udccf Published: 2025-04-10T11:16:33.999Z\n\ud83d\udccf Modified: 2025-04-10T11:16:33.999Z\n\ud83d\udd17 References:\n1. https://lsin.panasonic.com/release-notes", "creation_timestamp": "2025-04-10T11:49:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d6a7a656-2aa0-419b-9287-3c3549ddce5c/export"/>
    <published>2025-04-10T11:49:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3fe0ecb0-a82f-4d86-bbd7-321c73128d5a/export</id>
    <title>3fe0ecb0-a82f-4d86-bbd7-321c73128d5a</title>
    <updated>2026-05-04T02:48:45.077133+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3fe0ecb0-a82f-4d86-bbd7-321c73128d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1073", "type": "seen", "source": "https://t.me/cvedetector/22649", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1073 - Panasonic IR Control Hub Firmware Loading Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1073 \nPublished : April 10, 2025, 12:15 p.m. | 55\u00a0minutes ago \nDescription : Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T15:21:42.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3fe0ecb0-a82f-4d86-bbd7-321c73128d5a/export"/>
    <published>2025-04-10T15:21:42+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a02a21ae-46db-46c5-a933-8e9fee362c1c/export</id>
    <title>a02a21ae-46db-46c5-a933-8e9fee362c1c</title>
    <updated>2026-05-04T02:48:45.077086+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a02a21ae-46db-46c5-a933-8e9fee362c1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10732", "type": "seen", "source": "https://gist.github.com/Darkcrai86/b0e654420a5b82cafbabb8f81cb57218", "content": "", "creation_timestamp": "2025-10-14T06:46:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a02a21ae-46db-46c5-a933-8e9fee362c1c/export"/>
    <published>2025-10-14T06:46:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d85db52b-41f1-4472-97cd-e4773ea86ae8/export</id>
    <title>d85db52b-41f1-4472-97cd-e4773ea86ae8</title>
    <updated>2026-05-04T02:48:45.077036+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d85db52b-41f1-4472-97cd-e4773ea86ae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10737", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3ytm7q3rn2m", "content": "", "creation_timestamp": "2025-10-25T07:12:42.493641Z"}</content>
    <link href="https://db.gcve.eu/sighting/d85db52b-41f1-4472-97cd-e4773ea86ae8/export"/>
    <published>2025-10-25T07:12:42.493641+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9e998ac9-a4a5-4e91-87fe-4d607a33106c/export</id>
    <title>9e998ac9-a4a5-4e91-87fe-4d607a33106c</title>
    <updated>2026-05-04T02:48:45.076984+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9e998ac9-a4a5-4e91-87fe-4d607a33106c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-10738", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115710977696604993", "content": "", "creation_timestamp": "2025-12-13T07:03:22.298668Z"}</content>
    <link href="https://db.gcve.eu/sighting/9e998ac9-a4a5-4e91-87fe-4d607a33106c/export"/>
    <published>2025-12-13T07:03:22.298668+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3043d938-6954-4171-b453-c5767aa62a5f/export</id>
    <title>3043d938-6954-4171-b453-c5767aa62a5f</title>
    <updated>2026-05-04T02:48:45.076928+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3043d938-6954-4171-b453-c5767aa62a5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-10738", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m7tzwnt5rw2g", "content": "", "creation_timestamp": "2025-12-13T07:03:23.737329Z"}</content>
    <link href="https://db.gcve.eu/sighting/3043d938-6954-4171-b453-c5767aa62a5f/export"/>
    <published>2025-12-13T07:03:23.737329+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/59f1da27-9287-4beb-add1-9260aa37453c/export</id>
    <title>59f1da27-9287-4beb-add1-9260aa37453c</title>
    <updated>2026-05-04T02:48:45.076862+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "59f1da27-9287-4beb-add1-9260aa37453c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10738", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7uile5hxx2r", "content": "", "creation_timestamp": "2025-12-13T11:25:30.325754Z"}</content>
    <link href="https://db.gcve.eu/sighting/59f1da27-9287-4beb-add1-9260aa37453c/export"/>
    <published>2025-12-13T11:25:30.325754+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f37260f8-6b4f-4205-b46f-552a7a776b05/export</id>
    <title>f37260f8-6b4f-4205-b46f-552a7a776b05</title>
    <updated>2026-05-04T02:48:45.075465+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f37260f8-6b4f-4205-b46f-552a7a776b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10738", "type": "seen", "source": "https://gist.github.com/Darkcrai86/b7ddfc848fe13c12840d2ae30c1c7649", "content": "", "creation_timestamp": "2025-12-15T08:55:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f37260f8-6b4f-4205-b46f-552a7a776b05/export"/>
    <published>2025-12-15T08:55:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/caccbbb7-3e2b-45a1-9502-ac9849edbf48/export</id>
    <title>caccbbb7-3e2b-45a1-9502-ac9849edbf48</title>
    <updated>2026-05-04T02:48:45.075138+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "caccbbb7-3e2b-45a1-9502-ac9849edbf48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-10736", "type": "seen", "source": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-10736", "content": "", "creation_timestamp": "2026-03-23T04:16:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/caccbbb7-3e2b-45a1-9502-ac9849edbf48/export"/>
    <published>2026-03-23T04:16:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e0864caa-9c32-4483-bb22-84cefd46fec8/export</id>
    <title>e0864caa-9c32-4483-bb22-84cefd46fec8</title>
    <updated>2026-05-04T02:48:45.072861+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "e0864caa-9c32-4483-bb22-84cefd46fec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-10734", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhq2h2u4ro2y", "content": "", "creation_timestamp": "2026-03-23T12:23:27.753570Z"}</content>
    <link href="https://db.gcve.eu/sighting/e0864caa-9c32-4483-bb22-84cefd46fec8/export"/>
    <published>2026-03-23T12:23:27.753570+00:00</published>
  </entry>
</feed>
