{"vulnerability": "CVE-2025-2223", "sightings": [{"uuid": "71840b5b-f833-4512-bed8-73ae3c7bb60c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3llcri6d7ri2p", "content": "", "creation_timestamp": "2025-03-26T21:52:59.666525Z"}, {"uuid": "609f2af4-53e3-45fc-b595-543a82ed0af0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3llcwtnxzci26", "content": "", "creation_timestamp": "2025-03-26T23:28:53.955754Z"}, {"uuid": "9c097b8f-d26f-49f6-bb25-44cb0bb0148d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3llcywc3y7s2c", "content": "", "creation_timestamp": "2025-03-27T00:06:11.155785Z"}, {"uuid": "c27e73bf-da2e-4fb8-9021-97610194e6d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3lld6uwsjrh2e", "content": "", "creation_timestamp": "2025-03-27T01:52:46.919898Z"}, {"uuid": "9c28d4c2-c12c-4fdc-9b41-afefb7ad57b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3llataxcaoc2l", "content": "", "creation_timestamp": "2025-03-26T03:19:27.811539Z"}, {"uuid": "85acd7fd-7f85-493c-93a0-a179ef51f392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lld7n4l46k2x", "content": "", "creation_timestamp": "2025-03-27T02:06:17.882009Z"}, {"uuid": "0061bc2a-88e9-4e66-8896-8c5ca0c54bfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3ll7kl3j2jy2i", "content": "", "creation_timestamp": "2025-03-25T15:11:22.134523Z"}, {"uuid": "b5f15d7e-213d-4425-9c78-842cbb37cb51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3llddltpnys2x", "content": "", "creation_timestamp": "2025-03-27T03:17:09.848010Z"}, {"uuid": "79b14973-8417-45c4-a7f2-99baa48fe9a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3ll7nlrrqthg2", "content": "", "creation_timestamp": "2025-03-25T16:11:32.055787Z"}, {"uuid": "43f39fa5-fd01-4220-a09c-adc38cd4c3b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3llazpypigo26", "content": "", "creation_timestamp": "2025-03-26T05:15:12.893438Z"}, {"uuid": "547315b1-fa65-40d7-ad62-1bffd889ba7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll7oliukaem2", "content": "", "creation_timestamp": "2025-03-25T16:29:27.310905Z"}, {"uuid": "7d7373dc-0570-4839-a85c-c09880ada540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3llazvw7nns2z", "content": "", "creation_timestamp": "2025-03-26T05:18:31.868695Z"}, {"uuid": "bce48a12-648b-4628-a024-4823a73e2481", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-22230", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llb5gf6sndh2", "content": "", "creation_timestamp": "2025-03-26T06:28:59.266401Z"}, {"uuid": "c0b126da-9951-401f-b76e-77ef1e1e1b6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/it-connect.bsky.social/post/3llb7mm52vw2q", "content": "", "creation_timestamp": "2025-03-26T07:00:41.272717Z"}, {"uuid": "1567deea-5691-45b0-b3f6-f1a2bfce5b3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llcollmu322m", "content": "", "creation_timestamp": "2025-03-26T21:01:15.360429Z"}, {"uuid": "e4bbe47a-290f-4b4a-b002-80eae6568125", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/windowsforest.bsky.social/post/3llba5dtlzk2q", "content": "", "creation_timestamp": "2025-03-26T07:10:03.040020Z"}, {"uuid": "074e7a77-c460-49a3-a52d-11062f992968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llcnwkapzs2m", "content": "", "creation_timestamp": "2025-03-26T20:49:27.952983Z"}, {"uuid": "18a59ffa-8b83-4c49-9297-59f0e7bc659d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://thehackernews.com/2025/03/new-security-flaws-found-in-vmware.html", "content": "", "creation_timestamp": "2025-03-26T03:20:00.000000Z"}, {"uuid": "9c1b9367-e57d-4a9d-9517-32e4d211554c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llberowix22m", "content": "", "creation_timestamp": "2025-03-26T08:33:02.478101Z"}, {"uuid": "5b049815-234f-4fce-b6f1-2f1375764d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llbb5zm4ol2k", "content": "", "creation_timestamp": "2025-03-26T07:28:19.065718Z"}, {"uuid": "1c07d0c6-11c8-4799-968d-251a6f9d5351", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/mbissey.bsky.social/post/3llbbr6s4gv2f", "content": "", "creation_timestamp": "2025-03-26T07:39:02.798203Z"}, {"uuid": "092e530a-1f5a-4a02-b976-9fa6a6c94862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3llbbusfrq32e", "content": "", "creation_timestamp": "2025-03-26T07:41:03.858924Z"}, {"uuid": "39feed55-149e-4aea-848a-5f198aab9cdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lla5p7uf7k2x", "content": "", "creation_timestamp": "2025-03-25T20:53:50.563063Z"}, {"uuid": "4f32b474-97e9-45d7-962a-660da50bac83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lla5v42dec2x", "content": "", "creation_timestamp": "2025-03-25T20:57:04.928251Z"}, {"uuid": "76cdcfc6-27f9-4985-8f95-2881bb317680", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22231", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llrgszesrf2k", "content": "", "creation_timestamp": "2025-04-01T17:52:07.732374Z"}, {"uuid": "d2df8b2a-9299-41bd-8f01-106301706bbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22231", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llsyn5zclc2v", "content": "", "creation_timestamp": "2025-04-02T08:43:41.073029Z"}, {"uuid": "373e9c95-c396-4c91-b9eb-2beb542adb36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22231", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114263066271453967", "content": "", "creation_timestamp": "2025-04-01T14:00:26.578976Z"}, {"uuid": "c6290fab-8372-4ec6-b6f4-f7578ea1edc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22231", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114263066271453967", "content": "", "creation_timestamp": "2025-04-01T14:00:26.583557Z"}, {"uuid": "aadfeda5-9885-47ca-b8f1-1f0d5a664e44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llj4ip6xy22b", "content": "", "creation_timestamp": "2025-03-29T10:26:09.415007Z"}, {"uuid": "29f6ee04-08e5-43df-ac2f-038b6d5747e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llj5kvlgbk2b", "content": "", "creation_timestamp": "2025-03-29T10:45:15.726680Z"}, {"uuid": "deaef007-ff9d-4d01-b1cc-ca9f99f4f8bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22231", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lm27gqreg22g", "content": "", "creation_timestamp": "2025-04-05T05:34:00.182213Z"}, {"uuid": "cece15c1-236b-49ab-8cfb-ea98dda7dfe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22231", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lluenr5zqs2a", "content": "", "creation_timestamp": "2025-04-02T21:51:23.399912Z"}, {"uuid": "0bf73c40-a97d-4f3e-a053-3a353c8b96ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22231", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lluzpkhhes23", "content": "", "creation_timestamp": "2025-04-03T04:08:16.639721Z"}, {"uuid": "41e319c1-3bc1-48e2-b154-dcac9ac0bd7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22232", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114315104321433647", "content": "", "creation_timestamp": "2025-04-10T18:34:24.273451Z"}, {"uuid": "d722ab19-9731-4b15-b5f0-215098d8a0d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22232", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmihwdir7t2h", "content": "", "creation_timestamp": "2025-04-10T21:43:11.283415Z"}, {"uuid": "f1972232-9341-4d06-a251-805b39f4c5d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22234", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnhakzk6n22c", "content": "", "creation_timestamp": "2025-04-23T03:24:03.685871Z"}, {"uuid": "dbbc1d7e-1ec3-494f-8c53-65826b798071", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2223", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-107-03", "content": "", "creation_timestamp": "2025-04-17T10:00:00.000000Z"}, {"uuid": "b4178e04-aba8-4ae2-b4b2-6d33feb7c9a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22234", "type": "seen", "source": "https://bsky.app/profile/snicoll.be/post/3lnhqjzkeqc23", "content": "", "creation_timestamp": "2025-04-23T08:09:50.453159Z"}, {"uuid": "7ea32b29-a8fe-466e-9739-0746bb378a22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22234", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lnl5oyklky2h", "content": "", "creation_timestamp": "2025-04-24T16:43:14.645523Z"}, {"uuid": "6b45e610-942f-4a3b-b312-f2957f0a578a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22235", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnuhxjanxr2s", "content": "", "creation_timestamp": "2025-04-28T09:40:59.094425Z"}, {"uuid": "d2068ae0-c495-4969-9b0a-f4c12a0a55a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22234", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lnlpwihnf627", "content": "", "creation_timestamp": "2025-04-24T22:09:32.775429Z"}, {"uuid": "9d5eebe7-bb92-4ad9-9fb1-2f1c05e3fad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22235", "type": "seen", "source": "https://bsky.app/profile/snicoll.be/post/3lnmplyg7ms23", "content": "", "creation_timestamp": "2025-04-25T07:36:27.054987Z"}, {"uuid": "33bfa411-8f24-4714-ac03-3425954e76f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22235", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lnony6qhj42b", "content": "", "creation_timestamp": "2025-04-26T02:12:41.852204Z"}, {"uuid": "a18f025d-f2fb-488c-b82d-ea291cf330f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lpzm6iycjq2i", "content": "", "creation_timestamp": "2025-05-25T21:30:08.668332Z"}, {"uuid": "33e38361-2938-40e7-9599-9fbb345553f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22235", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114415227561670514", "content": "", "creation_timestamp": "2025-04-28T10:57:03.317085Z"}, {"uuid": "6201458f-4880-46d3-85f3-cd116b7bfba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22239", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lrhvusbskwj2", "content": "", "creation_timestamp": "2025-06-13T07:28:23.500726Z"}, {"uuid": "55cc8caf-c291-4917-8fcb-da4fae8281d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22236", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lrhvvbpjhex2", "content": "", "creation_timestamp": "2025-06-13T07:28:25.874706Z"}, {"uuid": "c34e8085-4961-4efa-b72e-d79a120665b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lq24gargcq2z", "content": "", "creation_timestamp": "2025-05-26T02:20:46.588975Z"}, {"uuid": "c96122b8-75fe-4192-92df-cedc0790c189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22238", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lrhvuuxu5im2", "content": "", "creation_timestamp": "2025-06-13T07:28:24.635896Z"}, {"uuid": "42941b08-e0ab-4adf-9572-a1e893c87003", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22237", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lrhvuuzpjx72", "content": "", "creation_timestamp": "2025-06-13T07:28:25.178919Z"}, {"uuid": "98ae3f3b-1b94-4d17-a664-368382cc5bcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22234", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3loccnpqve625", "content": "", "creation_timestamp": "2025-05-03T21:43:14.377892Z"}, {"uuid": "f67fb499-2199-4994-882f-0300d0a805d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22234", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lo75ab62wp2g", "content": "", "creation_timestamp": "2025-05-02T15:28:14.355851Z"}, {"uuid": "c25d420c-7b2a-49c1-8908-e50740f2eb13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22234", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3locqvp4vtw2b", "content": "", "creation_timestamp": "2025-05-04T01:58:14.571040Z"}, {"uuid": "508b2d5f-bc17-4710-a827-1c5ecb7e7545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22238", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lric6igo2g2q", "content": "", "creation_timestamp": "2025-06-13T11:06:16.013078Z"}, {"uuid": "fcf87c54-3e30-415f-bb4c-f3a31e5fc398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22239", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrid54hemi2e", "content": "", "creation_timestamp": "2025-06-13T11:23:23.716714Z"}, {"uuid": "54ca25e7-9292-41d5-a0fe-8aa38995cbf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22237", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lridozeep62m", "content": "", "creation_timestamp": "2025-06-13T11:33:24.440513Z"}, {"uuid": "9aea06c3-d3d3-4af0-b6ce-14e9a91061b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22234", "type": "seen", "source": "https://bsky.app/profile/davidwelch.io/post/3lp5dzwygls2u", "content": "", "creation_timestamp": "2025-05-14T15:49:51.258023Z"}, {"uuid": "3027ade8-3392-47fa-963f-a186eae57713", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22236", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lriga3zb5i2q", "content": "", "creation_timestamp": "2025-06-13T12:18:45.152350Z"}, {"uuid": "3e61679d-e2b0-4ef4-9777-55439390d187", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114507677820745663", "content": "", "creation_timestamp": "2025-05-14T18:48:49.776226Z"}, {"uuid": "0a2c6fe0-bc82-4285-b22a-27ed0608438e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lp5o2nz5x6n2", "content": "", "creation_timestamp": "2025-05-14T18:50:07.914856Z"}, {"uuid": "5ee7f3c1-eeb4-48c8-8def-6009cc5ddf3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-22233", "type": "seen", "source": "https://bsky.app/profile/costalfy.framapiaf.org.ap.brid.gy/post/3lp7pi3v7ekq2", "content": "", "creation_timestamp": "2025-05-15T14:20:33.675470Z"}, {"uuid": "460d0fe2-a76d-4ca9-b97d-e69e37d0b5e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22233", "type": "seen", "source": "https://bsky.app/profile/snicoll.be/post/3lp7q6x6i622x", "content": "", "creation_timestamp": "2025-05-15T14:32:44.162105Z"}, {"uuid": "2904f889-9322-4aab-8dae-6044ba54a39d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22233", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lpaxn43u5b2f", "content": "", "creation_timestamp": "2025-05-16T02:18:34.380745Z"}, {"uuid": "7bd4579e-924a-442e-a890-3f73d880bdd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22233", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mcctlphjie2i", "content": "", "creation_timestamp": "2026-01-13T15:10:12.786676Z"}, {"uuid": "068269ec-bfea-444c-ae1d-6d18a43fd406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lumq4usjnd2z", "content": "", "creation_timestamp": "2025-07-23T09:42:08.212671Z"}, {"uuid": "a41c3423-8bd7-4763-85d1-317e4ee0a80c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22234", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3md3dsuvvwc2x", "content": "", "creation_timestamp": "2026-01-23T09:04:32.950377Z"}, {"uuid": "948467f7-fef0-4174-81ee-5309640108cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22239", "type": "seen", "source": "Telegram/sBDh5C1zdFlaWSlBVyrMdS-46U_0ME-q4bAhLyd2EZru7fQ", "content": "", "creation_timestamp": "2025-06-13T07:34:25.000000Z"}, {"uuid": "2f765e62-e9bb-448a-a99d-a1ebf4b291ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22234", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3md2gin36zpe2", "content": "", "creation_timestamp": "2026-01-23T00:21:28.388874Z"}, {"uuid": "e3b4037d-5618-408e-aa13-eb3080e32586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-22234", "type": "seen", "source": "https://gist.github.com/alon710/a4455bbf4d33ed72c50734d18e9ff2c9", "content": "", "creation_timestamp": "2026-01-24T21:22:43.000000Z"}, {"uuid": "a02b645e-7f94-4f57-a38c-5a40e2e60f03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-22233", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "d1b7c9ae-503a-4f92-92c6-a715d08c388f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-22234", "type": "seen", "source": "https://gist.github.com/alon710/87221f1631f25bd006e389491515ce54", "content": "", "creation_timestamp": "2026-01-24T22:18:05.000000Z"}, {"uuid": "efe904cc-fd4e-404b-8468-ea07d6208843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-22234", "type": "seen", "source": "https://gist.github.com/alon710/0583327c838f8561239ecbcd988660df", "content": "", "creation_timestamp": "2026-01-24T22:18:03.000000Z"}, {"uuid": "28eee68e-bb8d-4b04-925e-e3971c228449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22237", "type": "seen", "source": "Telegram/sBDh5C1zdFlaWSlBVyrMdS-46U_0ME-q4bAhLyd2EZru7fQ", "content": "", "creation_timestamp": "2025-06-13T07:34:25.000000Z"}, {"uuid": "6f088aee-ce18-4d97-a59b-73666f7dff74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22236", "type": "seen", "source": "Telegram/sBDh5C1zdFlaWSlBVyrMdS-46U_0ME-q4bAhLyd2EZru7fQ", "content": "", "creation_timestamp": "2025-06-13T07:34:25.000000Z"}, {"uuid": "d0b946b0-29d8-4c87-b3a2-e1181990f969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22239", "type": "seen", "source": "Telegram/YAQ_JQCmsPiXmqZ7phOl7Olo1teqLC4-3XH11jchkPqYPeM", "content": "", "creation_timestamp": "2025-06-13T09:22:49.000000Z"}, {"uuid": "4f28f939-e0db-46c7-a173-6306fb728cd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2223", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11040", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2223\n\ud83d\udd25 CVSS Score: 8.4 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: CWE-20: Improper Input Validation vulnerability exists that could cause a loss of Confidentiality, Integrity and\nAvailability of engineering workstation when a malicious project file is loaded by a user from the local system.\n\ud83d\udccf Published: 2025-04-09T10:16:04.119Z\n\ud83d\udccf Modified: 2025-04-09T10:16:04.119Z\n\ud83d\udd17 References:\n1. https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-098-01&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2025-098-01.pdf", "creation_timestamp": "2025-04-09T10:47:57.000000Z"}, {"uuid": "48addf3a-65ba-484e-98e8-967599f867a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22239", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18274", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22239\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L)\n\ud83d\udd39 Description: Arbitrary event injection on Salt Master. The master's \"_minion_event\" method can be used by and authorized minion to send arbitrary events onto the master's event bus.\n\ud83d\udccf Published: 2025-06-13T07:00:53.681Z\n\ud83d\udccf Modified: 2025-06-13T07:00:53.681Z\n\ud83d\udd17 References:\n1. https://docs.saltproject.io/en/3006/topics/releases/3006.12.html\n2. https://docs.saltproject.io/en/3007/topics/releases/3007.4.html", "creation_timestamp": "2025-06-13T07:33:13.000000Z"}, {"uuid": "0f85933d-9642-446e-97d6-236b66e17661", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8677", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22230\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control.\u00a0A malicious actor with non-administrative privileges on a guest VM may gain ability to perform certain high privilege operations within that VM.\n\ud83d\udccf Published: 2025-03-25T14:06:35.413Z\n\ud83d\udccf Modified: 2025-03-25T14:06:35.413Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25518", "creation_timestamp": "2025-03-25T14:24:34.000000Z"}, {"uuid": "74a48306-2b93-4510-b8cc-3bc7566e93f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22231", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9949", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22231\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: VMware Aria Operations contains a local privilege escalation vulnerability.\u00a0A malicious actor with local administrative privileges can escalate their privileges to root on the appliance running VMware Aria Operations.\n\ud83d\udccf Published: 2025-04-01T12:59:49.815Z\n\ud83d\udccf Modified: 2025-04-01T16:06:30.689Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25541", "creation_timestamp": "2025-04-01T16:32:33.000000Z"}, {"uuid": "31934818-145c-4d9d-b97b-fb9772f9b4c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22232", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11290", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22232\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Spring Cloud Config Server may not use Vault token sent by clients using a X-CONFIG-TOKEN\u00a0header when making requests to Vault.\nYour application may be affected by this if the following are true:\n  *  You have Spring Vault on the classpath of your Spring Cloud Config Server and\n  *  You are using the X-CONFIG-TOKEN\u00a0header to send a Vault token to the Spring Cloud Config Server for the Config Server to use when making requests to Vault and\n  *  You are using the default Spring Vault SessionManager\u00a0implementation LifecycleAwareSessionManager\u00a0or a SessionManager\u00a0implementation that persists the Vault token such as SimpleSessionManager.\n\nIn this case the SessionManager\u00a0persists the first token it retrieves and will continue to use that token even if client requests to the Spring Cloud Config Server include a X-CONFIG-TOKEN\u00a0header with a different value.\nAffected Spring Products and Versions\nSpring Cloud Config:\n  *  2.2.1.RELEASE - 4.2.1\n\n\nMitigation\nUsers of affected versions should upgrade to the corresponding fixed version.\n\nAffected version(s)Fix versionAvailability4.2.x4.2.2OSS4.1.x4.1.6OSS4.0.x4.0.10Commercial3.1.x3.1.10Commercial3.0.x4.1.6OSS2.2.x4.1.6OSS\nNOTE: Spring Cloud Config 3.0.x and 2.2.x are no longer under open source or commercial support. Users of these versions are encouraged to upgrade to a supported version.\n\nNo other mitigation steps are necessary.\n\ud83d\udccf Published: 2025-04-10T17:26:56.755Z\n\ud83d\udccf Modified: 2025-04-10T17:26:56.755Z\n\ud83d\udd17 References:\n1. https://spring.io/security/cve-2025-22232", "creation_timestamp": "2025-04-10T17:49:10.000000Z"}, {"uuid": "aef57a5f-0618-475c-a27a-1c55b1770bc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22233", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16737", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22233\n\ud83d\udd25 CVSS Score: 3.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: CVE-2024-38820 ensured Locale-independent, lowercase conversion for both the configured disallowedFields patterns and for request parameter names. However, there are still cases where it is possible to bypass the disallowedFields checks.\n\nAffected Spring Products and Versions\n\nSpring Framework:\n  *  6.2.0 - 6.2.6\n\n  *  6.1.0 - 6.1.19\n\n  *  6.0.0 - 6.0.27\n\n  *  5.3.0 - 5.3.42\n  *  Older, unsupported versions are also affected\n\n\n\nMitigation\n\nUsers of affected versions should upgrade to the corresponding fixed version.\n\nAffected version(s)Fix Version\u00a0Availability\u00a06.2.x\n 6.2.7\nOSS6.1.x\n 6.1.20\nOSS6.0.x\n 6.0.28\n Commercial https://enterprise.spring.io/ 5.3.x\n 5.3.43\n Commercial https://enterprise.spring.io/ \nNo further mitigation steps are necessary.\n\n\nGenerally, we recommend using a dedicated model object with properties only for data binding, or using constructor binding since constructor arguments explicitly declare what to bind together with turning off setter binding through the declarativeBinding flag. See the Model Design section in the reference documentation.\n\nFor setting binding, prefer the use of allowedFields (an explicit list) over disallowedFields.\n\nCredit\n\nThis issue was responsibly reported by the TERASOLUNA Framework Development Team from NTT DATA Group Corporation.\n\ud83d\udccf Published: 2025-05-16T19:14:07.500Z\n\ud83d\udccf Modified: 2025-05-16T19:14:07.500Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&amp;version=3.1", "creation_timestamp": "2025-05-16T19:34:36.000000Z"}, {"uuid": "91af597e-d964-494b-9dd6-a3cda79eb998", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22235", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13663", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22235\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: EndpointRequest.to()\u00a0creates a matcher for null/**\u00a0if the actuator endpoint, for which the EndpointRequest\u00a0has been created, is disabled or not exposed.\n\nYour application may be affected by this if all the following conditions are met:\n\n  *  You use Spring Security\n  *  EndpointRequest.to()\u00a0has been used in a Spring Security chain configuration\n  *  The endpoint which EndpointRequest\u00a0references is disabled or not exposed via web\n  *  Your application handles requests to /null\u00a0and this path needs protection\n\n\nYou are not affected if any of the following is true:\n\n  *  You don't use Spring Security\n  *  You don't use EndpointRequest.to()\n  *  The endpoint which EndpointRequest.to()\u00a0refers to is enabled and is exposed\n  *  Your application does not handle requests to /null\u00a0or this path does not need protection\n\ud83d\udccf Published: 2025-04-28T07:10:35.370Z\n\ud83d\udccf Modified: 2025-04-28T07:10:35.370Z\n\ud83d\udd17 References:\n1. https://spring.io/security/cve-2025-22235", "creation_timestamp": "2025-04-28T08:10:50.000000Z"}, {"uuid": "463f54f0-1b4d-4e18-8868-6939592ef562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22237", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18276", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22237\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.\n\ud83d\udccf Published: 2025-06-13T06:55:39.704Z\n\ud83d\udccf Modified: 2025-06-13T06:55:39.704Z\n\ud83d\udd17 References:\n1. https://docs.saltproject.io/en/3006/topics/releases/3006.12.html\n2. https://docs.saltproject.io/en/3007/topics/releases/3007.4.html", "creation_timestamp": "2025-06-13T07:33:15.000000Z"}, {"uuid": "9c80cac2-c9db-45fc-bb48-2dfff38f261d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22238", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18275", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22238\n\ud83d\udd25 CVSS Score: 4.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: Directory traversal attack in minion file cache creation. The master's default cache is vulnerable to a directory traversal attack. Which could be leveraged to write or overwrite 'cache' files outside of the cache directory.\n\ud83d\udccf Published: 2025-06-13T06:58:19.550Z\n\ud83d\udccf Modified: 2025-06-13T06:58:19.550Z\n\ud83d\udd17 References:\n1. https://docs.saltproject.io/en/3006/topics/releases/3006.12.html\n2. https://docs.saltproject.io/en/3007/topics/releases/3007.4.html", "creation_timestamp": "2025-06-13T07:33:14.000000Z"}, {"uuid": "1243e347-132b-485e-89fa-48e519797772", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22236", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18277", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22236\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L)\n\ud83d\udd39 Description: Minion event bus authorization bypass. An attacker with access to a minion key can craft a message which may be able to execute a job on other minions (&gt;= 3007.0).\n\ud83d\udccf Published: 2025-06-13T06:53:04.233Z\n\ud83d\udccf Modified: 2025-06-13T06:53:04.233Z\n\ud83d\udd17 References:\n1. https://docs.saltproject.io/en/3006/topics/releases/3006.12.html\n2. https://docs.saltproject.io/en/3007/topics/releases/3007.4.html", "creation_timestamp": "2025-06-13T07:33:19.000000Z"}, {"uuid": "9896c767-4650-4120-923e-65b03b631b98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22235", "type": "published-proof-of-concept", "source": "Telegram/opjiOOneFpadqYqN0qV4PAE3kRpAo7UluVD5MZZwTsLrBTk", "content": "", "creation_timestamp": "2025-08-21T15:00:13.000000Z"}, {"uuid": "98ded6c1-a8a7-49c4-9ddc-474245885b97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://t.me/ics_cert/1064", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0645\u062c\u0645\u0648\u0639\u0647 \u0627\u0628\u0632\u0627\u0631 VMware Tools \u0628\u0631\u0627\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0647\u0627\u06cc \u0648\u06cc\u0646\u062f\u0648\u0632 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u062f\u0648\u0631 \u0632\u062f\u0646 \u0631\u0648\u06cc\u0647 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u0645\u0633\u06cc\u0631 \u06cc\u0627 \u06a9\u0627\u0646\u0627\u0644 \u062c\u0627\u06cc\u06af\u0632\u06cc\u0646 \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u062e\u0648\u062f \u0631\u0627 \u062f\u0631 \u06cc\u06a9 \u0645\u0627\u0634\u06cc\u0646 \u0645\u062c\u0627\u0632\u06cc \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0647\u062f.\n\nBDU: 2025-03269\nCVE-2025-22230\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u06a9\u0647 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0645\u0627\u0634\u06cc\u0646 \u0647\u0627\u06cc \u0645\u062c\u0627\u0632\u06cc.\n- \u062a\u0642\u0633\u06cc\u0645 \u0628\u0646\u062f\u06cc \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0645\u0627\u0634\u06cc\u0646 \u0647\u0627\u06cc \u0645\u062c\u0627\u0632\u06cc \u0627\u0632 \u0632\u06cc\u0631\u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062f\u06cc\u06af\u0631.\n- \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0627\u0631\u062c\u06cc (\u0627\u06cc\u0646\u062a\u0631\u0646\u062a)\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc SIEM \u0628\u0631\u0627\u06cc \u0631\u062f\u06cc\u0627\u0628\u06cc \u062a\u0644\u0627\u0634 \u0647\u0627 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 \u0646\u0641\u0648\u0630 \u0648 \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc (IDS/IPS) \u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0648 \u067e\u0627\u0633\u062e \u0628\u0647 \u062a\u0644\u0627\u0634\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627:\nhttps://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25518\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ICSCERT_IR", "creation_timestamp": "2025-03-31T21:32:52.000000Z"}, {"uuid": "6cfb92b3-65aa-46c9-a2ee-823152b8e226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://t.me/kasperskyb2b/1678", "content": "\ud83d\udc40 Patch Wednesday: \u043d\u0430\u043a\u043e\u043f\u0438\u043b\u043e\u0441\u044c\n\n\u041a\u0440\u043e\u043c\u0435 \u0432\u0447\u0435\u0440\u0430\u0448\u043d\u0435\u0433\u043e 0day \u0432 Chrome, \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0437\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0441\u0442\u043e\u0438\u0442 \u043c\u043e\u0431\u0438\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0418\u0422-\u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0434\u043b\u044f \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0440\u0430\u0437\u043d\u043e\u0448\u0451\u0440\u0441\u0442\u043d\u044b\u0445, \u043d\u043e \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u043c \u041f\u041e:\n\nIngressNightmare: 4 CVE \u0432 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u0435 Ingress-NGINX, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d \u043d\u0430 41% \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u043e\u0432 Kubernetes, \u0432\u0438\u0434\u0438\u043c\u044b\u0445 \u0438\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430. \u0426\u0435\u043f\u043e\u0447\u043a\u0430 \u0447\u0435\u0442\u044b\u0440\u0451\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043a\u043e\u043b\u043b\u0435\u043a\u0442\u0438\u0432\u043d\u043e \u0442\u044f\u043d\u0435\u0442 \u043d\u0430 CVSS 9.8 \u0438 \u0432 \u0438\u0442\u043e\u0433\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a RCE \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438. \u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u043c\u043e\u0433\u0443\u0442 \u0443\u0442\u0430\u0449\u0438\u0442\u044c \u0432\u0441\u0435 \u0441\u0435\u043a\u0440\u0435\u0442\u044b, \u0441\u043e\u0445\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u0435 \u0432 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0435 \u0438 \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0435\u0433\u043e \u0432 \u0446\u0435\u043b\u043e\u043c. \u041e\u0431\u044b\u0447\u043d\u043e admission endpoint \u043d\u0435 \u0441\u0442\u043e\u0438\u0442 \u0432\u044b\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c \u0432 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0439 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442, \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043d\u0435\u043c\u0443 \u043d\u0443\u0436\u0435\u043d \u0442\u043e\u043b\u044c\u043a\u043e API-\u0441\u0435\u0440\u0432\u0435\u0440\u0443 K8s, \u0442\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043f\u043e \u043e\u0446\u0435\u043d\u043a\u0430\u043c Wiz \u0431\u043e\u043b\u0435\u0435 6500 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u0439 \u0441\u0434\u0435\u043b\u0430\u043b\u0438 \u0438\u043c\u0435\u043d\u043d\u043e \u044d\u0442\u043e.\n\nCVE-2025-22230 (CVSS 7.8), \u043e\u0431\u0445\u043e\u0434 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 VMWare tools, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u043f\u0440\u0438\u0432\u0435\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0432 \u0433\u043e\u0441\u0442\u0435\u0432\u043e\u0439 VM \u043d\u0430 Windows.\n\n\u0414\u044b\u0440\u0430 \u0431\u0435\u0437 CVE \u0432 CrushFTP 11, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0434\u0430\u043d\u043d\u044b\u043c \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u0440\u0442\u044b HTTP(S). \u0412\u0435\u043d\u0434\u043e\u0440 \u0441\u0442\u044b\u0434\u043b\u0438\u0432\u043e \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u043b \u043e \u0434\u0435\u0444\u0435\u043a\u0442\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u0432 \u043a\u043b\u0438\u0435\u043d\u0442\u0441\u043a\u043e\u0439 \u0440\u0430\u0441\u0441\u044b\u043b\u043a\u0435, \u043d\u043e \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b \u0434\u0435\u0444\u0435\u043a\u0442 \u0438 \u043e\u0431\u0435\u0449\u0430\u043b \u043d\u043e\u043c\u0435\u0440 CVE \u043f\u043e\u043f\u043e\u0437\u0436\u0435.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2025-03-26T12:33:50.000000Z"}, {"uuid": "8369869a-10f1-49e0-b1cb-705fbe5e03c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22235", "type": "seen", "source": "https://t.me/cvedetector/23891", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22235 - Spring Security Endpoint Request Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2025-22235 \nPublished : April 28, 2025, 8:15 a.m. | 54\u00a0minutes ago \nDescription : EndpointRequest.to()\u00a0creates a matcher for null/**\u00a0if the actuator endpoint, for which the EndpointRequest\u00a0has been created, is disabled or not exposed.  \n  \nYour application may be affected by this if all the following conditions are met:  \n  \n  *  You use Spring Security  \n  *  EndpointRequest.to()\u00a0has been used in a Spring Security chain configuration  \n  *  The endpoint which EndpointRequest\u00a0references is disabled or not exposed via web  \n  *  Your application handles requests to /null\u00a0and this path needs protection  \n  \n  \nYou are not affected if any of the following is true:  \n  \n  *  You don't use Spring Security  \n  *  You don't use EndpointRequest.to()  \n  *  The endpoint which EndpointRequest.to()\u00a0refers to is enabled and is exposed  \n  *  Your application does not handle requests to /null\u00a0or this path does not need protection \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-28T11:33:09.000000Z"}, {"uuid": "f3f46a67-2130-4f26-910a-aa391034f3c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://t.me/cvedetector/21110", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22230 - VMware Tools for Windows Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22230 \nPublished : March 25, 2025, 2:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control.\u00a0A malicious actor with non-administrative privileges on a guest VM may gain ability to perform certain high privilege operations within that VM. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T17:49:21.000000Z"}, {"uuid": "81d85321-8d58-41c7-9ac4-6a19f978eddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2223", "type": "seen", "source": "https://t.me/cvedetector/22553", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2223 - Citrix Engineering Workstation Malicious File Load Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2223 \nPublished : April 9, 2025, 11:15 a.m. | 50\u00a0minutes ago \nDescription : CWE-20: Improper Input Validation vulnerability exists that could cause a loss of Confidentiality, Integrity and  \nAvailability of engineering workstation when a malicious project file is loaded by a user from the local system. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T14:15:53.000000Z"}, {"uuid": "ce0e8e5f-3011-4c2f-821a-5de76df07a96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22232", "type": "seen", "source": "https://t.me/cvedetector/22676", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22232 - Spring Cloud Config Server Vault Token Token Persistence Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22232 \nPublished : April 10, 2025, 6:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Spring Cloud Config Server may not use Vault token sent by clients using a X-CONFIG-TOKEN\u00a0header when making requests to Vault.  \nYour application may be affected by this if the following are true:  \n  *  You have Spring Vault on the classpath of your Spring Cloud Config Server and  \n  *  You are using the X-CONFIG-TOKEN\u00a0header to send a Vault token to the Spring Cloud Config Server for the Config Server to use when making requests to Vault and  \n  *  You are using the default Spring Vault SessionManager\u00a0implementation LifecycleAwareSessionManager\u00a0or a SessionManager\u00a0implementation that persists the Vault token such as SimpleSessionManager.  \n  \nIn this case the SessionManager\u00a0persists the first token it retrieves and will continue to use that token even if client requests to the Spring Cloud Config Server include a X-CONFIG-TOKEN\u00a0header with a different value.  \nAffected Spring Products and Versions  \nSpring Cloud Config:  \n  *  2.2.1.RELEASE - 4.2.1  \n  \n  \nMitigation  \nUsers of affected versions should upgrade to the corresponding fixed version.  \n  \nAffected version(s)Fix versionAvailability4.2.x4.2.2OSS4.1.x4.1.6OSS4.0.x4.0.10Commercial3.1.x3.1.10Commercial3.0.x4.1.6OSS2.2.x4.1.6OSS  \nNOTE: Spring Cloud Config 3.0.x and 2.2.x are no longer under open source or commercial support. Users of these versions are encouraged to upgrade to a supported version.  \n  \nNo other mitigation steps are necessary. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T22:02:58.000000Z"}, {"uuid": "6d6e2021-b60f-4bfe-b6c5-4f4aa7e3817e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "Telegram/oqbOWgQG_SDaSpdfqWt_FQElVfQZ9iWGEQBw8h52LDy6PA", "content": "", "creation_timestamp": "2025-03-26T09:32:41.000000Z"}, {"uuid": "f789f108-3dec-4c38-ba82-b137cb1e0afd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://t.me/true_secator/6877", "content": "VMware \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0441\u0440\u043e\u0447\u043d\u043e\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0432\u043b\u0438\u044f\u044e\u0449\u0435\u0439 \u043d\u0430 \u0435\u0433\u043e \u043d\u0430\u0431\u043e\u0440 \u0443\u0442\u0438\u043b\u0438\u0442 VMware Tools for Windows.\n\n\u042d\u0442\u043e \u043d\u0430\u0431\u043e\u0440 \u0443\u0442\u0438\u043b\u0438\u0442 \u0438 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0432\u044b\u0448\u0430\u0435\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u043e\u0441\u0442\u044c \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044f \u0442\u0430\u043a\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438, \u043a\u0430\u043a \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u043d\u0430\u044f \u0433\u0440\u0430\u0444\u0438\u043a\u0430, \u0438\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0438\u044f \u043c\u044b\u0448\u0438 \u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u044f \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043c\u0435\u0436\u0434\u0443 \u0445\u043e\u0441\u0442\u043e\u0432\u043e\u0439 \u0438 \u0433\u043e\u0441\u0442\u0435\u0432\u043e\u0439 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u043c\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438.\n\n\u0417\u0430\u043a\u0440\u044b\u0442\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2025-22230 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u043d\u0435\u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u043d\u0430 \u0433\u043e\u0441\u0442\u0435\u0432\u043e\u0439 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u0435 Windows \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0432 \u044d\u0442\u043e\u0439 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u0435.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e\u00a0\u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044e\u00a0VMware, \u043e\u0448\u0438\u0431\u043a\u0430 \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043d\u0435\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0438\u043c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0435\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 CVSS 7,8/10.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u0440\u0438\u043f\u0438\u0441\u0430\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Positive Technologies \u0438 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u044b\u043b\u0438 \u0432\u043d\u0435\u0441\u0435\u043d\u044b \u0432 VMware Tools for Windows v 12.5.1.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0432\u0435\u0440\u0441\u0438\u0438 \u0443\u0442\u0438\u043b\u0438\u0442\u044b \u0434\u043b\u044f Linux \u0438 macOS \u043d\u0435 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b.", "creation_timestamp": "2025-03-25T19:30:05.000000Z"}, {"uuid": "ffbde0b5-a43f-43fa-a96b-eb349dcd8e7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "Telegram/UPegbdrUObQcnilNjDwpJsece7fi6CrosD2C8DpjNeOtPKM", "content": "", "creation_timestamp": "2025-03-25T16:30:59.000000Z"}, {"uuid": "70ada0bd-00d5-4ce3-af95-6eb4143a7e58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://t.me/thehackernews/6551", "content": "\ud83d\udea8 Broadcom just patched CVE-2025-22230, a 7.8 CVSS auth bypass in VMware Tools for Windows (v11.x.x &amp; 12.x.x). No workaround. Fixed in v12.5.1\u2014patch now.\n\nAlso: CrushFTP v10 &amp; v11 hit by unauth\u2019d HTTP(S) access bug. Not actively exploited, but still dangerous.\n\n\ud83d\udd17 Full details + patch links: https://thehackernews.com/2025/03/new-security-flaws-found-in-vmware.html", "creation_timestamp": "2025-03-26T05:27:01.000000Z"}, {"uuid": "c9a0f409-ebbb-47d0-84bb-643326a2d211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22230", "type": "seen", "source": "https://t.me/ctinow/232836", "content": "Authentication bypass CVE-2025-22230 impacts VMware Windows Tools\nhttps://ift.tt/HTcKLGD", "creation_timestamp": "2025-03-26T08:19:48.000000Z"}]}