{"vulnerability": "CVE-2025-0927", "sightings": [{"uuid": "62e1ba81-fe5c-4057-ada9-92745531c0b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://infosec.exchange/users/wdormann/statuses/114257437962283266", "content": "", "creation_timestamp": "2025-03-31T14:09:07.912430Z"}, {"uuid": "90b4dee4-f43b-4558-80d0-dc7e67c72318", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://infosec.exchange/users/wdormann/statuses/114257437962283266", "content": "", "creation_timestamp": "2025-03-31T14:09:07.915286Z"}, {"uuid": "0304c2b0-4554-45f2-a3bf-fc3c92e088cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://bsky.app/profile/wdormann.infosec.exchange.ap.brid.gy/post/3llojvegbzdk2", "content": "", "creation_timestamp": "2025-03-31T14:21:09.053918Z"}, {"uuid": "1f824c53-a4b8-472f-bbab-9d330d232bad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/114211236029248836", "content": "", "creation_timestamp": "2025-03-23T10:19:19.722104Z"}, {"uuid": "4e7d2ced-280d-4573-99a1-54e1d13032c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3ll6xboixpc2k", "content": "", "creation_timestamp": "2025-03-25T09:26:06.964340Z"}, {"uuid": "c7c69a5d-5c19-45df-bb27-d1acfc52098b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ll7fkqssl22f", "content": "", "creation_timestamp": "2025-03-25T13:41:43.373694Z"}, {"uuid": "9ef1d6fb-0ee9-4bb5-9461-28041f36a0c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3llsuzevwldz2", "content": "", "creation_timestamp": "2025-04-02T07:39:55.114019Z"}, {"uuid": "d47f3432-ad15-4615-aac1-1d15f095ec2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://bsky.app/profile/linkersec.bsky.social/post/3lu3vq6vy7k2q", "content": "", "creation_timestamp": "2025-07-16T17:07:13.263805Z"}, {"uuid": "9df04685-d9d5-4f16-99c5-703f60958666", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lknozrvqjv2i", "content": "", "creation_timestamp": "2025-03-18T12:43:14.846956Z"}, {"uuid": "5c63936a-4167-42ac-a24b-e940ee5155fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lknqiss3sm2g", "content": "", "creation_timestamp": "2025-03-18T13:09:32.324301Z"}, {"uuid": "f4c9fc47-f6d5-4df3-9573-fbbb23d34123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3loyilk3uu42e", "content": "", "creation_timestamp": "2025-05-12T17:27:57.432898Z"}, {"uuid": "670a9c68-cacd-41fe-be6a-d1e6abb98237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3loyiy2xjwhv2", "content": "", "creation_timestamp": "2025-05-12T17:43:00.916982Z"}, {"uuid": "12015b10-114e-4e32-b73f-e3d3f69da091", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://bsky.app/profile/linkersec.bsky.social/post/3lu3vqapvq22q", "content": "", "creation_timestamp": "2025-07-16T17:07:13.746937Z"}, {"uuid": "403b25bb-8180-4040-8036-83a89dcc7be1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "MISP/2bceffac-02c3-4c54-a709-6e253b38ec76", "content": "", "creation_timestamp": "2025-09-09T20:56:45.000000Z"}, {"uuid": "08f7bf00-0a6e-4637-aa75-f5ad94bfb1fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/1063", "content": "\u062f\u0631\u0627\u06cc\u0648\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0641\u0627\u06cc\u0644 HFS \u0647\u0633\u062a\u0647 \u0644\u06cc\u0646\u0648\u06a9\u0633 \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u0639\u0645\u0644\u06cc\u0627\u062a \u0628\u0627\u0641\u0631 \u062d\u0627\u0641\u0638\u0647 \u062e\u0627\u0631\u062c \u0627\u0632 \u0645\u062d\u062f\u0648\u062f\u0647 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u0646\u0635\u0628 \u06cc\u06a9 \u062a\u0635\u0648\u06cc\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0641\u0627\u06cc\u0644 \u0633\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u062e\u0627\u0635 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\nBDU: 2025-03186\nCVE-2025-0927\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u06a9\u0647 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0622\u0646\u062a\u06cc \u0648\u06cc\u0631\u0648\u0633 \u0628\u0631\u0627\u06cc \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0627\u0632 \u062a\u0644\u0627\u0634 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc SIEM \u0628\u0631\u0627\u06cc \u0631\u062f\u06cc\u0627\u0628\u06cc \u062a\u0644\u0627\u0634 \u0647\u0627 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u0627\u06cc\u0633\u062a\u06af\u0627\u0647 \u06a9\u0627\u0631\u06cc \u0645\u062c\u0632\u0627 \u0628\u0631\u0627\u06cc \u0646\u0635\u0628 \u062a\u0635\u0627\u0648\u06cc\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0641\u0627\u06cc\u0644 \u0628\u0647 \u062f\u0633\u062a \u0622\u0645\u062f\u0647 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0646\u0627\u0645\u0639\u062a\u0628\u0631.\n\n \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627:\n\u0628\u0631\u0627\u06cc \u0644\u06cc\u0646\u0648\u06a9\u0633:\n \u0646\u0635\u0628 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc \u0647\u0633\u062a\u0647 \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0627\u0632 \u0645\u062e\u0632\u0646 \u0645\u0631\u06a9\u0632 \u0641\u0646\u0627\u0648\u0631\u06cc:\nhttps://git.linuxtesting.ru/pub/scm/linux/kernel/git/lvc/linux-stable.git/log/?h=v5.10.232-lvc40\nhttps://git.linuxtesting.ru/pub/scm/linux/kernel/git/lvc/linux-stable.git/log/?h=v6.1.121-lvc11\n\n\u0628\u0631\u0627\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0647\u0627\u06cc \u0627\u0648\u0628\u0648\u0646\u062a\u0648:\nhttps://ubuntu.com/security/CVE-2025-0927\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ICSCERT_IR", "creation_timestamp": "2025-03-31T21:30:52.000000Z"}, {"uuid": "a847d530-33fe-48a3-9394-aceeb1ca5c7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://t.me/cvedetector/20906", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0927 - Linux Kernel HFS+ Heap Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0927 \nPublished : March 23, 2025, 3:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Attila Sz\u00e1sz discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-23T18:09:27.000000Z"}, {"uuid": "a94287df-dc16-4e89-83d5-a22a420f8930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/438", "content": "Top Security News for Today\n\nAuditing language models for hidden objectives  \nhttps://arxiv.org/abs/2503.10965\n\nCombinatorial Optimization for All: Using LLMs to Aid Non-Experts in Improving Optimization Algorithms  \nhttps://arxiv.org/abs/2503.10968\n\nIs Security Human Factors Research Skewed Towards Western Ideas and Habits?  \nhttps://www.schneier.com/blog/archives/2025/03/is-security-human-factors-research-skewed-towards-western-ideas-and-habits.html\n\nLearn how an out-of-bounds write vulnerability in the Linux kernel can be exploited to achieve an LPE (CVE-2025-0927)  \nhttps://www.reddit.com/r/netsec/comments/1je3w9o/learn_how_an_outofbounds_write_vulnerability_in/\n\nWhat is Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)?  \nhttps://www.tripwire.com/state-of-security/what-is-bundesamt-fur-sicherheit-in-der-informationstechnik-bsi\n\nArbitrary File Write CVE-2024-0402 in GitLab (Exploit)  \nhttps://www.reddit.com/r/netsec/comments/1je4j6r/arbitrary_file_write_cve20240402_in_gitlab_exploit/\n\nSAML roulette: the hacker always wins  \nhttps://www.reddit.com/r/netsec/comments/1je8f1h/saml_roulette_the_hacker_always_wins/\n\nAI innovation requires AI security: Hear what\u2019s new at Microsoft Secure  \nhttps://techcommunity.microsoft.com/blog/microsoft-security-blog/ai-innovation-requires-ai-security-hear-what%e2%80%99s-new-at-microsoft-secure/4394130\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-03-19T09:30:20.000000Z"}, {"uuid": "09feca70-b33f-4957-82a3-cb9b822edd54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "seen", "source": "https://t.me/P0x3k_1N73LL1G3NC3/48", "content": "CVE-2025-0927 LPE\n\nHFS+ file system implementation in the Linux Kernel contains a heap overflow vulnerability that achieves local privilege escalation on Ubuntu 22.04 for active user sessions.\n\nAffected Versions:\n \u2022 Linux Kernel, up to 6.12.0\n \u2022 Ubuntu 22.04 with Linux Kernel 6.5.0-18-generic", "creation_timestamp": "2025-03-18T11:36:33.000000Z"}, {"uuid": "1532c93c-d2f5-4c54-9101-712630caf132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/325", "content": "Fuzzing Linux Kernel Modules, with Slava Moskvin\n\nStream by Slava Moskvin hosted by Stephen Sims about building a custom fuzzer to rediscover CVE-2025-0927 in the HFS+ filesystem implementation.\n\nSlava started with a simple fuzzer implementation and then improved it step-by-step by adding coverage collection, proper seed generation, mutations, etc.\n\nThe source code of the fuzzer is public.", "creation_timestamp": "2025-07-16T17:08:54.000000Z"}, {"uuid": "3bae0d55-5fb3-4b98-89cd-9d2e74530c1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "published-proof-of-concept", "source": "Telegram/_tBYQ5sXHOPpZPlcFwVWhcPBFfo28rK-2OYMPBuQVz7F5zc", "content": "", "creation_timestamp": "2025-04-25T21:00:06.000000Z"}, {"uuid": "00127deb-edb8-48ef-8575-030c7da42791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2554", "content": "CVE-2025-0927\n*\nAffected Versions\n*   Linux Kernel, up to 6.12.0\n*   Ubuntu 22.04 with Linux Kernel 6.5.0-18-generic\n/\n\u0411\u043e\u043b\u044c\u0448\u043e\u0439 WriteUP + Source Exploit.c -  Linux kernel hfsplus slab-out-of-bounds Write\n\nUPDATE:  \u0435\u0441\u043b\u0438 \u0441\u043e\u0432\u0441\u0435\u043c \u043a\u043e\u0440\u043e\u0442\u043a\u043e \u0442\u043e -\u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u044e\u0437\u0435\u0440\u044b (\u0431\u0435\u0437 \u043e\u0441\u043e\u0431\u044b\u0445 \u043f\u0440\u0430\u0432) \u043c\u043e\u0433\u0443\u0442 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u043e\u0432\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0447\u0435\u0440\u0435\u0437 Udisks2 \u0438\u0437-\u0437\u0430  \u043f\u0440\u0430\u0432\u0438\u043b \u0434\u043b\u044f Polkit. \u0412\u043a\u043b\u044e\u0447\u0430\u044f \u0432 \u0441\u0435\u0431\u044f \u0424\u0421, \u0447\u044c\u0438 \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0431\u044b\u0447\u043d\u043e \u0442\u0440\u0435\u0431\u0443\u044e\u0442 CAP_SYS_ADMIN \u0432 init user namespace.\n\n#linux", "creation_timestamp": "2025-03-22T10:11:01.000000Z"}, {"uuid": "78d24da9-29f3-4522-be99-2191c17e89dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11960", "content": "#exploit\n1. Windows LNK - Analysis &amp; PoC\nhttps://zeifan.my/Windows-LNK\n\n2. CVE-2025-0927:\nLinux Distros Unpatched Vulnerability\nhttps://ssd-disclosure.com/ssd-advisory-linux-kernel-hfsplus-slab-out-of-bounds-write\n\n3. CVE-2025-24071:\nhttps://github.com/shacojx/CVE-2025-24071-Exploit", "creation_timestamp": "2025-03-25T01:54:53.000000Z"}, {"uuid": "608292a0-51aa-4729-aed8-e14fc98f40d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0927", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/476", "content": "CVE-2025-0927\n*\nAffected Versions\n*   Linux Kernel, up to 6.12.0\n*   Ubuntu 22.04 with Linux Kernel 6.5.0-18-generic\n/\n\u0411\u043e\u043b\u044c\u0448\u043e\u0439 WriteUP + Source Exploit.c -  Linux kernel hfsplus slab-out-of-bounds Write\n\n#linux #ssd", "creation_timestamp": "2025-03-22T10:08:30.000000Z"}]}