{"vulnerability": "CVE-2025-1177", "sightings": [{"uuid": "4ff10d96-aec3-4d1f-8bc3-d5b0b9b27c19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1177", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhv7ygbxcb2a", "content": "", "creation_timestamp": "2025-02-11T08:19:51.956020Z"}, {"uuid": "1dc2178b-afa4-41f9-ad76-33c6b45b9d27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1177", "type": "seen", "source": "https://t.me/cvedetector/17671", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1177 - Dayrui XunRuiCMS Deserialization Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1177 \nPublished : Feb. 11, 2025, 6:15 a.m. | 1\u00a0hour, 50\u00a0minutes ago \nDescription : A vulnerability was found in dayrui XunRuiCMS 4.6.3. It has been classified as critical. Affected is the function import_add of the file dayrui/Fcms/Control/Admin/Linkage.php. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T09:49:32.000000Z"}, {"uuid": "bc1df90c-50f8-4163-8e8b-01fb7f60e358", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1177", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113983764845121626", "content": "", "creation_timestamp": "2025-02-11T06:10:25.032814Z"}, {"uuid": "d8cc733e-7f4e-430d-bd3c-4d3a20ae18e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1177", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuz2qyp6o2x", "content": "", "creation_timestamp": "2025-02-11T06:15:47.520017Z"}, {"uuid": "26f32634-79fa-42d6-b177-2e03a5947941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11776", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5ldgjfu7j2u", "content": "", "creation_timestamp": "2025-11-14T09:08:58.137024Z"}, {"uuid": "5768ab08-4202-40f3-ad39-02339ecfaa2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11776", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5lijovga3c2", "content": "", "creation_timestamp": "2025-11-14T10:41:32.896563Z"}, {"uuid": "a2bb4561-3bfd-4a40-a617-f6282a056089", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11777", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115543667410267689", "content": "", "creation_timestamp": "2025-11-13T17:54:09.101013Z"}, {"uuid": "39993ff5-8d8c-40cd-b23d-df26ccb826a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1177", "type": "seen", "source": "Telegram/FtA2c8HaxsZ8mwwHVUCXMcYOlCEIajtzpJM_G9gJF2JkDhXT", "content": "", "creation_timestamp": "2025-02-20T23:26:54.000000Z"}]}