<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 02:48:44 +0000</lastBuildDate>
    <item>
      <title>d6a7a656-2aa0-419b-9287-3c3549ddce5c</title>
      <link>https://db.gcve.eu/sighting/d6a7a656-2aa0-419b-9287-3c3549ddce5c/export</link>
      <description>{"uuid": "d6a7a656-2aa0-419b-9287-3c3549ddce5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1073", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11223", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1073\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L)\n\ud83d\udd39 Description: Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device.\n\ud83d\udccf Published: 2025-04-10T11:16:33.999Z\n\ud83d\udccf Modified: 2025-04-10T11:16:33.999Z\n\ud83d\udd17 References:\n1. https://lsin.panasonic.com/release-notes", "creation_timestamp": "2025-04-10T11:49:14.000000Z"}</description>
      <content:encoded>{"uuid": "d6a7a656-2aa0-419b-9287-3c3549ddce5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1073", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11223", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1073\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L)\n\ud83d\udd39 Description: Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device.\n\ud83d\udccf Published: 2025-04-10T11:16:33.999Z\n\ud83d\udccf Modified: 2025-04-10T11:16:33.999Z\n\ud83d\udd17 References:\n1. https://lsin.panasonic.com/release-notes", "creation_timestamp": "2025-04-10T11:49:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d6a7a656-2aa0-419b-9287-3c3549ddce5c/export</guid>
      <pubDate>Thu, 10 Apr 2025 11:49:14 +0000</pubDate>
    </item>
    <item>
      <title>3fe0ecb0-a82f-4d86-bbd7-321c73128d5a</title>
      <link>https://db.gcve.eu/sighting/3fe0ecb0-a82f-4d86-bbd7-321c73128d5a/export</link>
      <description>{"uuid": "3fe0ecb0-a82f-4d86-bbd7-321c73128d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1073", "type": "seen", "source": "https://t.me/cvedetector/22649", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1073 - Panasonic IR Control Hub Firmware Loading Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1073 \nPublished : April 10, 2025, 12:15 p.m. | 55\u00a0minutes ago \nDescription : Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T15:21:42.000000Z"}</description>
      <content:encoded>{"uuid": "3fe0ecb0-a82f-4d86-bbd7-321c73128d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1073", "type": "seen", "source": "https://t.me/cvedetector/22649", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1073 - Panasonic IR Control Hub Firmware Loading Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1073 \nPublished : April 10, 2025, 12:15 p.m. | 55\u00a0minutes ago \nDescription : Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T15:21:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3fe0ecb0-a82f-4d86-bbd7-321c73128d5a/export</guid>
      <pubDate>Thu, 10 Apr 2025 15:21:42 +0000</pubDate>
    </item>
    <item>
      <title>a02a21ae-46db-46c5-a933-8e9fee362c1c</title>
      <link>https://db.gcve.eu/sighting/a02a21ae-46db-46c5-a933-8e9fee362c1c/export</link>
      <description>{"uuid": "a02a21ae-46db-46c5-a933-8e9fee362c1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10732", "type": "seen", "source": "https://gist.github.com/Darkcrai86/b0e654420a5b82cafbabb8f81cb57218", "content": "", "creation_timestamp": "2025-10-14T06:46:40.000000Z"}</description>
      <content:encoded>{"uuid": "a02a21ae-46db-46c5-a933-8e9fee362c1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10732", "type": "seen", "source": "https://gist.github.com/Darkcrai86/b0e654420a5b82cafbabb8f81cb57218", "content": "", "creation_timestamp": "2025-10-14T06:46:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a02a21ae-46db-46c5-a933-8e9fee362c1c/export</guid>
      <pubDate>Tue, 14 Oct 2025 06:46:40 +0000</pubDate>
    </item>
    <item>
      <title>d85db52b-41f1-4472-97cd-e4773ea86ae8</title>
      <link>https://db.gcve.eu/sighting/d85db52b-41f1-4472-97cd-e4773ea86ae8/export</link>
      <description>{"uuid": "d85db52b-41f1-4472-97cd-e4773ea86ae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10737", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3ytm7q3rn2m", "content": "", "creation_timestamp": "2025-10-25T07:12:42.493641Z"}</description>
      <content:encoded>{"uuid": "d85db52b-41f1-4472-97cd-e4773ea86ae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10737", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3ytm7q3rn2m", "content": "", "creation_timestamp": "2025-10-25T07:12:42.493641Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d85db52b-41f1-4472-97cd-e4773ea86ae8/export</guid>
      <pubDate>Sat, 25 Oct 2025 07:12:42 +0000</pubDate>
    </item>
    <item>
      <title>9e998ac9-a4a5-4e91-87fe-4d607a33106c</title>
      <link>https://db.gcve.eu/sighting/9e998ac9-a4a5-4e91-87fe-4d607a33106c/export</link>
      <description>{"uuid": "9e998ac9-a4a5-4e91-87fe-4d607a33106c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-10738", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115710977696604993", "content": "", "creation_timestamp": "2025-12-13T07:03:22.298668Z"}</description>
      <content:encoded>{"uuid": "9e998ac9-a4a5-4e91-87fe-4d607a33106c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-10738", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115710977696604993", "content": "", "creation_timestamp": "2025-12-13T07:03:22.298668Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9e998ac9-a4a5-4e91-87fe-4d607a33106c/export</guid>
      <pubDate>Sat, 13 Dec 2025 07:03:22 +0000</pubDate>
    </item>
    <item>
      <title>3043d938-6954-4171-b453-c5767aa62a5f</title>
      <link>https://db.gcve.eu/sighting/3043d938-6954-4171-b453-c5767aa62a5f/export</link>
      <description>{"uuid": "3043d938-6954-4171-b453-c5767aa62a5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-10738", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m7tzwnt5rw2g", "content": "", "creation_timestamp": "2025-12-13T07:03:23.737329Z"}</description>
      <content:encoded>{"uuid": "3043d938-6954-4171-b453-c5767aa62a5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-10738", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m7tzwnt5rw2g", "content": "", "creation_timestamp": "2025-12-13T07:03:23.737329Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3043d938-6954-4171-b453-c5767aa62a5f/export</guid>
      <pubDate>Sat, 13 Dec 2025 07:03:23 +0000</pubDate>
    </item>
    <item>
      <title>59f1da27-9287-4beb-add1-9260aa37453c</title>
      <link>https://db.gcve.eu/sighting/59f1da27-9287-4beb-add1-9260aa37453c/export</link>
      <description>{"uuid": "59f1da27-9287-4beb-add1-9260aa37453c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10738", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7uile5hxx2r", "content": "", "creation_timestamp": "2025-12-13T11:25:30.325754Z"}</description>
      <content:encoded>{"uuid": "59f1da27-9287-4beb-add1-9260aa37453c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10738", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7uile5hxx2r", "content": "", "creation_timestamp": "2025-12-13T11:25:30.325754Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/59f1da27-9287-4beb-add1-9260aa37453c/export</guid>
      <pubDate>Sat, 13 Dec 2025 11:25:30 +0000</pubDate>
    </item>
    <item>
      <title>f37260f8-6b4f-4205-b46f-552a7a776b05</title>
      <link>https://db.gcve.eu/sighting/f37260f8-6b4f-4205-b46f-552a7a776b05/export</link>
      <description>{"uuid": "f37260f8-6b4f-4205-b46f-552a7a776b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10738", "type": "seen", "source": "https://gist.github.com/Darkcrai86/b7ddfc848fe13c12840d2ae30c1c7649", "content": "", "creation_timestamp": "2025-12-15T08:55:10.000000Z"}</description>
      <content:encoded>{"uuid": "f37260f8-6b4f-4205-b46f-552a7a776b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-10738", "type": "seen", "source": "https://gist.github.com/Darkcrai86/b7ddfc848fe13c12840d2ae30c1c7649", "content": "", "creation_timestamp": "2025-12-15T08:55:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f37260f8-6b4f-4205-b46f-552a7a776b05/export</guid>
      <pubDate>Mon, 15 Dec 2025 08:55:10 +0000</pubDate>
    </item>
    <item>
      <title>caccbbb7-3e2b-45a1-9502-ac9849edbf48</title>
      <link>https://db.gcve.eu/sighting/caccbbb7-3e2b-45a1-9502-ac9849edbf48/export</link>
      <description>{"uuid": "caccbbb7-3e2b-45a1-9502-ac9849edbf48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-10736", "type": "seen", "source": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-10736", "content": "", "creation_timestamp": "2026-03-23T04:16:04.000000Z"}</description>
      <content:encoded>{"uuid": "caccbbb7-3e2b-45a1-9502-ac9849edbf48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-10736", "type": "seen", "source": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-10736", "content": "", "creation_timestamp": "2026-03-23T04:16:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/caccbbb7-3e2b-45a1-9502-ac9849edbf48/export</guid>
      <pubDate>Mon, 23 Mar 2026 04:16:04 +0000</pubDate>
    </item>
    <item>
      <title>e0864caa-9c32-4483-bb22-84cefd46fec8</title>
      <link>https://db.gcve.eu/sighting/e0864caa-9c32-4483-bb22-84cefd46fec8/export</link>
      <description>{"uuid": "e0864caa-9c32-4483-bb22-84cefd46fec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-10734", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhq2h2u4ro2y", "content": "", "creation_timestamp": "2026-03-23T12:23:27.753570Z"}</description>
      <content:encoded>{"uuid": "e0864caa-9c32-4483-bb22-84cefd46fec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-10734", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhq2h2u4ro2y", "content": "", "creation_timestamp": "2026-03-23T12:23:27.753570Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e0864caa-9c32-4483-bb22-84cefd46fec8/export</guid>
      <pubDate>Mon, 23 Mar 2026 12:23:27 +0000</pubDate>
    </item>
  </channel>
</rss>
