{"vulnerability": "CVE-2025-12654", "sightings": [{"uuid": "f977ffd5-f3e5-45f1-880c-cb03aa45fa7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mahxn6lfjr2o", "content": "", "creation_timestamp": "2025-12-21T05:15:36.251414Z"}, {"uuid": "720b25c0-fcb3-4e83-a142-42b09c7f62e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "seen", "source": "https://sploitus.com/exploit?id=021C3B1D-4E08-5419-8393-B7EA3BF573F8", "content": "", "creation_timestamp": "2025-10-21T17:31:17.000000Z"}, {"uuid": "ac762d93-5125-4fb8-a038-348ba6c46752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/xOF0wKG3E1tSWdpJ4_yjov1SC7Athylo3WSDX12biA3TA_o", "content": "", "creation_timestamp": "2025-09-03T11:00:08.000000Z"}, {"uuid": "53d586a0-0571-4c56-acea-aa19fd6d540f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/M55qH6QYe-KBA7mZNwV8_jlIWOEL_cjM3W0DUQ4qOjLB_IE", "content": "", "creation_timestamp": "2025-10-22T03:00:06.000000Z"}, {"uuid": "cffe82af-4c9c-4160-a825-8f99d138bccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/ZlyfXxEysizE2a9CgVhv6-jtRmvieJPR9VHjuRNQcl4lSwQ", "content": "", "creation_timestamp": "2025-10-21T23:00:11.000000Z"}, {"uuid": "6897681d-c565-4db4-b3ff-9603c7b40a16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "seen", "source": "https://gist.github.com/Darkcrai86/7878f127b3e5035bce59992908497bcc", "content": "", "creation_timestamp": "2025-12-22T11:35:32.000000Z"}, {"uuid": "f56baf95-2156-44cf-98b8-f9e4fbd86e1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/ktfF1YjAfTgGnV4T6AQBqxJFytPD6zIUM1POBEH3rhcPUWE", "content": "", "creation_timestamp": "2025-09-03T15:00:07.000000Z"}, {"uuid": "6e5d6c71-24b9-46ce-8797-e62e05aefc4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/29665", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.\nURL\uff1ahttps://github.com/Kirbirls/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-04T13:30:21.000000Z"}, {"uuid": "d3d2f7ea-f734-4f37-bbff-ea73a06b3ad2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/56414", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aPaloAlto RCE Elastic SOC (case03) \u2013 detec\u00e7\u00e3o e resposta em SOC usando Elastic.\nURL\uff1ahttps://github.com/Tarimaow/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-10-21T19:34:49.000000Z"}, {"uuid": "c836d9dd-40b6-4378-83f5-9d7ff0537fad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/37158", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2\nURL\uff1ahttps://github.com/Taonauz/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-17T18:48:47.000000Z"}, {"uuid": "35a22c3f-6f3e-412a-9c73-0a6d8ae55623", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/29939", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.\nURL\uff1ahttps://github.com/ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-05T18:03:01.000000Z"}, {"uuid": "b068870c-8b37-4c1e-9e8c-a7acd6b7c269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/41504", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-3248 \u2013 Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage\nURL\uff1ahttps://github.com/Taowmz/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-22T21:36:52.000000Z"}, {"uuid": "a924648d-8a72-444a-b1e0-f018c5cb9cff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50100", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-3515 WordPress lab for Drag and Drop Multiple File Upload for CF7: Dockerized PoC &amp; Nuclei testing\nURL\uff1ahttps://github.com/Maitonnx/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-03T10:13:07.000000Z"}, {"uuid": "dd53898c-e171-40d5-a3d8-8bb24746dea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/34053", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aPatches the RCE Exploit in XWorm\nURL\uff1ahttps://github.com/ThreeMens/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-04-24T16:04:04.000000Z"}, {"uuid": "3256a2ba-281d-4b8e-ab6f-6d65cdf58463", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/37632", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.\nURL\uff1ahttps://github.com/Laertharaz/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-21T16:56:05.000000Z"}, {"uuid": "164bebdc-63ea-4c4a-9188-905148da46ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/38855", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.\nURL\uff1ahttps://github.com/Quelvara/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-01T06:51:40.000000Z"}, {"uuid": "e0b1d65c-1bb4-4d70-8dbf-612319bafbfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/35169", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2\nURL\uff1ahttps://github.com/Yuweixn/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-03T16:18:18.000000Z"}, {"uuid": "f946c6c4-6852-4983-a255-c649376ad97e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/35304", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.\nURL\uff1ahttps://github.com/Subha-coder-hash/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-02T17:42:18.000000Z"}, {"uuid": "39e77732-4e30-4689-ae30-7cc933afe678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/49655", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance.\nURL\uff1ahttps://github.com/Kastowm/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-30T19:55:23.000000Z"}, {"uuid": "adebd0e5-c6a0-4d21-8a60-143822f31f67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/7omxUZ2uMXoER28uRMclbQ_dLv3_MyobI63W53jiSYQupcI", "content": "", "creation_timestamp": "2025-09-15T03:00:05.000000Z"}, {"uuid": "c72dcd8b-a1ac-45b0-ad17-6d2698b79278", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51614", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExample PoC for CVE-2025-24813 (Tomcat RCE)\nURL\uff1ahttps://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-14T21:31:42.000000Z"}, {"uuid": "9fa9905e-5b86-43d3-80ab-5ec6c59b074a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51623", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExample PoC for CVE-2025-24813 (Tomcat RCE)\nURL\uff1ahttps://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-14T23:30:29.000000Z"}, {"uuid": "0edcd299-ba92-444a-8c08-2ae8269e1f30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/O1bdREQmivL5F1dxXfHUpQX3tNqR9chZ70LS_WlqEUqEy0A", "content": "", "creation_timestamp": "2025-09-14T23:00:11.000000Z"}, {"uuid": "f6b5e05b-f0f9-4b77-afac-c1c1c4eefce0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/8800", "content": "#exploit\n1. CVE-2025-2748:\nXSS To RCE By Abusing Custom File Handlers - Kentico Xperience CMS\nhttps://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748\n\n2. CVE-2025-44228:\nAnyDesk RCE PoC\nhttps://github.com/ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n3. CVE-2025-30065:\nApache Parquet RCE\nhttps://github.com/ron-imperva/CVE-2025-30065-PoC", "creation_timestamp": "2025-04-10T12:05:52.000000Z"}, {"uuid": "dd7329fd-9ccf-469e-b4b9-483af973cf03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/3505", "content": "#exploit\n1. CVE-2025-2748:\nXSS To RCE By Abusing Custom File Handlers - Kentico Xperience CMS\nhttps://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748\n\n2. CVE-2025-44228:\nAnyDesk RCE PoC\nhttps://github.com/ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n3. CVE-2025-30065:\nApache Parquet RCE\nhttps://github.com/ron-imperva/CVE-2025-30065-PoC", "creation_timestamp": "2025-04-10T12:05:52.000000Z"}, {"uuid": "61684279-c00e-4b58-bd1f-d8563ce8b942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/Mmw8NJswMa8MBY7fmplhnbmILmbvICjTn6K1dvcLgCKKIIM", "content": "", "creation_timestamp": "2025-05-03T09:00:07.000000Z"}, {"uuid": "b51105c5-d19a-4f29-afc0-c834cddfd3c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/GjmfxAFkHHj4diJhry9pNxvB4fZf4prNAionz1b1rAx8M8o", "content": "", "creation_timestamp": "2025-05-02T01:00:06.000000Z"}, {"uuid": "b7c49c37-c271-49ab-a7ca-6189bc187b47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/12011", "content": "#exploit\n1. CVE-2025-2748:\nXSS To RCE By Abusing Custom File Handlers - Kentico Xperience CMS\nhttps://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748\n\n2. CVE-2025-44228:\nAnyDesk RCE PoC\nhttps://github.com/ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n3. CVE-2025-30065:\nApache Parquet RCE\nhttps://github.com/ron-imperva/CVE-2025-30065-PoC", "creation_timestamp": "2025-04-07T16:10:19.000000Z"}, {"uuid": "8ef7f914-0881-454f-a6b7-7874c5881c47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "seen", "source": "Telegram/3YaL5NJ3mrXrZFN27gURTYsXHBbf7WMRfmylIEh94F4elYg", "content": "", "creation_timestamp": "2025-08-31T03:00:05.000000Z"}, {"uuid": "d34f9a3f-5793-4629-baa6-d4a22b5b0313", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/csGbeR-gKB27UEejL4m2Ukh8zJIknZbnF-z6pYTPEQr_cg4", "content": "", "creation_timestamp": "2025-08-30T23:00:10.000000Z"}, {"uuid": "402b71c7-cc01-4f9d-82b6-fc9da21e9ca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/pNTteL-Xx8i8chGncpiIBXbULPUr3pQKBk06IlAIn1UZCI0", "content": "", "creation_timestamp": "2025-06-23T11:00:06.000000Z"}, {"uuid": "d1e4ab9a-1fe2-4b02-8c3e-99315d3f4c97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/CcyjHkNjVgkEwMecQxDV2tqoHdYRDeP6dqEdCkr6R7KZfXo", "content": "", "creation_timestamp": "2025-06-23T03:00:06.000000Z"}, {"uuid": "8ee35a5a-e9f4-4f7a-9220-c5cb35f21f71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/Hfte5K5JRMTfmEi8KMw9E8ziTEtCcWsXnQMYOD3-afvSXGU", "content": "", "creation_timestamp": "2025-04-05T23:00:06.000000Z"}, {"uuid": "0b89d674-5d20-4b5f-8a35-d6b42a63da16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12654", "type": "published-proof-of-concept", "source": "Telegram/fRz85g4eDbVFk_EmTWHzF9ll2KANwEqcSW_5eU9ztMIPBRw", "content": "", "creation_timestamp": "2025-04-06T09:00:07.000000Z"}]}