<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 20:30:22 +0000</lastBuildDate>
    <item>
      <title>9f777c4d-0af3-4455-9f9c-180f25f2526a</title>
      <link>https://vulnerability.circl.lu/sighting/9f777c4d-0af3-4455-9f9c-180f25f2526a/export</link>
      <description>{"uuid": "9f777c4d-0af3-4455-9f9c-180f25f2526a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0037", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17814", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0037\n\ud83d\udd25 CVSS Score: 6.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)\n\ud83d\udd39 Description: In AMD Versal Adaptive SoC devices, the lack of address validation when executing PLM runtime services through the PLM firmware can allow access to isolated or protected memory spaces, resulting in the loss of integrity and confidentiality.\n\ud83d\udccf Published: 2025-06-09T23:52:33.688Z\n\ud83d\udccf Modified: 2025-06-09T23:52:33.688Z\n\ud83d\udd17 References:\n1. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8010.html", "creation_timestamp": "2025-06-10T00:33:05.000000Z"}</description>
      <content:encoded>{"uuid": "9f777c4d-0af3-4455-9f9c-180f25f2526a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0037", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17814", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0037\n\ud83d\udd25 CVSS Score: 6.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)\n\ud83d\udd39 Description: In AMD Versal Adaptive SoC devices, the lack of address validation when executing PLM runtime services through the PLM firmware can allow access to isolated or protected memory spaces, resulting in the loss of integrity and confidentiality.\n\ud83d\udccf Published: 2025-06-09T23:52:33.688Z\n\ud83d\udccf Modified: 2025-06-09T23:52:33.688Z\n\ud83d\udd17 References:\n1. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8010.html", "creation_timestamp": "2025-06-10T00:33:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9f777c4d-0af3-4455-9f9c-180f25f2526a/export</guid>
      <pubDate>Tue, 10 Jun 2025 00:33:05 +0000</pubDate>
    </item>
    <item>
      <title>620f58eb-26bf-4aee-8e96-2aec83f7077c</title>
      <link>https://vulnerability.circl.lu/sighting/620f58eb-26bf-4aee-8e96-2aec83f7077c/export</link>
      <description>{"uuid": "620f58eb-26bf-4aee-8e96-2aec83f7077c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0037", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116126691392778847", "content": "", "creation_timestamp": "2026-02-24T17:04:49.039738Z"}</description>
      <content:encoded>{"uuid": "620f58eb-26bf-4aee-8e96-2aec83f7077c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0037", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116126691392778847", "content": "", "creation_timestamp": "2026-02-24T17:04:49.039738Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/620f58eb-26bf-4aee-8e96-2aec83f7077c/export</guid>
      <pubDate>Tue, 24 Feb 2026 17:04:49 +0000</pubDate>
    </item>
    <item>
      <title>50b1a026-96ec-4c55-9c4f-f61c860a2b96</title>
      <link>https://vulnerability.circl.lu/sighting/50b1a026-96ec-4c55-9c4f-f61c860a2b96/export</link>
      <description>{"uuid": "50b1a026-96ec-4c55-9c4f-f61c860a2b96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0037", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116205731192936507", "content": "", "creation_timestamp": "2026-03-10T16:05:40.766852Z"}</description>
      <content:encoded>{"uuid": "50b1a026-96ec-4c55-9c4f-f61c860a2b96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0037", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116205731192936507", "content": "", "creation_timestamp": "2026-03-10T16:05:40.766852Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/50b1a026-96ec-4c55-9c4f-f61c860a2b96/export</guid>
      <pubDate>Tue, 10 Mar 2026 16:05:40 +0000</pubDate>
    </item>
  </channel>
</rss>
