<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-14T21:41:07.310987+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/6e92391d-b770-47b4-a3b7-678981180c5b/export</id>
    <title>6e92391d-b770-47b4-a3b7-678981180c5b</title>
    <updated>2026-05-14T21:41:07.682269+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6e92391d-b770-47b4-a3b7-678981180c5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30072", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114521262474751027", "content": "", "creation_timestamp": "2025-05-17T04:23:10.725551Z"}</content>
    <link href="https://db.gcve.eu/sighting/6e92391d-b770-47b4-a3b7-678981180c5b/export"/>
    <published>2025-05-17T04:23:10.725551+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1442d4a5-78dc-4fa2-afc0-201c5365f3d9/export</id>
    <title>1442d4a5-78dc-4fa2-afc0-201c5365f3d9</title>
    <updated>2026-05-14T21:41:07.682188+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1442d4a5-78dc-4fa2-afc0-201c5365f3d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30072", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lpdqtu6ltw24", "content": "", "creation_timestamp": "2025-05-17T04:55:04.733692Z"}</content>
    <link href="https://db.gcve.eu/sighting/1442d4a5-78dc-4fa2-afc0-201c5365f3d9/export"/>
    <published>2025-05-17T04:55:04.733692+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3011aecb-0838-4421-baf8-1b607b90f95e/export</id>
    <title>3011aecb-0838-4421-baf8-1b607b90f95e</title>
    <updated>2026-05-14T21:41:07.682086+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3011aecb-0838-4421-baf8-1b607b90f95e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30072", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lpdquh2fvr2w", "content": "", "creation_timestamp": "2025-05-17T04:55:23.294797Z"}</content>
    <link href="https://db.gcve.eu/sighting/3011aecb-0838-4421-baf8-1b607b90f95e/export"/>
    <published>2025-05-17T04:55:23.294797+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8f00827b-8ed1-4133-a1bc-365b534b7985/export</id>
    <title>8f00827b-8ed1-4133-a1bc-365b534b7985</title>
    <updated>2026-05-14T21:41:07.681965+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8f00827b-8ed1-4133-a1bc-365b534b7985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30072", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lphlx7zimk2c", "content": "", "creation_timestamp": "2025-05-18T17:38:07.709585Z"}</content>
    <link href="https://db.gcve.eu/sighting/8f00827b-8ed1-4133-a1bc-365b534b7985/export"/>
    <published>2025-05-18T17:38:07.709585+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3ed12115-da00-4c62-99a5-6963d6a1c0c8/export</id>
    <title>3ed12115-da00-4c62-99a5-6963d6a1c0c8</title>
    <updated>2026-05-14T21:41:07.680250+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3ed12115-da00-4c62-99a5-6963d6a1c0c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30072", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16854", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30072\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tiiwee X1 Alarm System TWX1HAKV2 allows Authentication Bypass by Capture-replay, leading to physical Access to the protected facilities without triggering an alarm.\n\ud83d\udccf Published: 2025-05-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-19T14:27:22.815Z\n\ud83d\udd17 References:\n1. https://www.tiiwee.com/collections/x1-alarm-systems\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-006.txt", "creation_timestamp": "2025-05-19T14:38:42.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3ed12115-da00-4c62-99a5-6963d6a1c0c8/export"/>
    <published>2025-05-19T14:38:42+00:00</published>
  </entry>
</feed>
