{"vulnerability": "CVE-2025-2249", "sightings": [{"uuid": "15182d76-1b6a-4371-9d8b-a7252725afe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22498", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmwdz7eum2f", "content": "", "creation_timestamp": "2025-01-13T14:15:35.712376Z"}, {"uuid": "71cedc8a-d939-4a2d-b3d3-de7d67fa93a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22499", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmwe3i5pj2r", "content": "", "creation_timestamp": "2025-01-13T14:15:38.140534Z"}, {"uuid": "9fbe1631-71bb-490b-8231-e3af8eb5a91d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22498", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfn37vht3v2b", "content": "", "creation_timestamp": "2025-01-13T15:42:48.240347Z"}, {"uuid": "4a1caad6-8774-4ce8-a636-65f439eb4053", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22495", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lix3n5wnzw2s", "content": "", "creation_timestamp": "2025-02-24T19:32:26.989923Z"}, {"uuid": "ec1c88ed-7b79-4d19-b4c6-979178a7707d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22495", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114060591554379342", "content": "", "creation_timestamp": "2025-02-24T19:48:27.422515Z"}, {"uuid": "29df1be2-7e8f-46b2-9ea0-f6ae363856f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22495", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114060062653263406", "content": "", "creation_timestamp": "2025-02-24T17:33:57.066936Z"}, {"uuid": "b0e8bdf6-6ae1-4e39-9c11-4d6c40016728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22496", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9142", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22496\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MarMar8x Notif Bell allows Stored XSS.This issue affects Notif Bell: from n/a through 0.9.8.\n\ud83d\udccf Published: 2025-03-27T15:32:31.029Z\n\ud83d\udccf Modified: 2025-03-27T16:03:15.567Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/notif-bell/vulnerability/wordpress-notif-bell-plugin-0-9-8-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T16:27:08.000000Z"}, {"uuid": "c722725f-3770-483e-91fb-1b636cfa71fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2249", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114245088705143041", "content": "", "creation_timestamp": "2025-03-29T09:48:30.545761Z"}, {"uuid": "7393ea7f-bdd0-4208-8510-ea4c2a6bc798", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2249", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114245088705143041", "content": "", "creation_timestamp": "2025-03-29T09:48:30.559089Z"}, {"uuid": "040a6a29-a998-436d-b7e9-f0f549402ef6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2249", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3llja6pje7h23", "content": "", "creation_timestamp": "2025-03-29T11:32:06.138175Z"}, {"uuid": "9a596be7-909d-4431-a2b4-181ae5a0e990", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22492", "type": "seen", "source": "https://t.me/cvedetector/19134", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22492 - Foreseer Reporting Software (FRS) Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-22492 \nPublished : Feb. 28, 2025, 9:15 a.m. | 51\u00a0minutes ago \nDescription : The connection string visible to users with access to FRSCore database on Foreseer Reporting Software (FRS) VM, this  \nstring can be used for gaining administrative access to the 4crXref database. This vulnerability has been resolved in the latest version 1.5.100 of FRS. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T11:10:20.000000Z"}, {"uuid": "9d7e9af0-d6fb-4c40-8509-9293792d3075", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22493", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6533", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22493\n\ud83d\udd25 CVSS Score: 5.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L)\n\ud83d\udd39 Description: Secure flag not set and SameSIte was set to Lax in the Foreseer Reporting Software (FRS). Absence of this secure flag could lead into the session cookie being transmitted over unencrypted HTTP connections. This security issue has been resolved in the latest version of FRS v1.5.100.\n\ud83d\udccf Published: 2025-03-05T08:53:59.122Z\n\ud83d\udccf Modified: 2025-03-05T08:53:59.122Z\n\ud83d\udd17 References:\n1. https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1009.pdf", "creation_timestamp": "2025-03-05T09:36:13.000000Z"}, {"uuid": "287de01c-9084-4fd2-a7b3-d892546e9e82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22491", "type": "seen", "source": "MISP/af1fbe07-e10c-40c4-844e-d4419bdf6f80", "content": "", "creation_timestamp": "2025-08-22T13:26:18.000000Z"}, {"uuid": "5aced3d6-d1e4-402e-8d03-f7f4a7c09a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22491", "type": "seen", "source": "https://t.me/cvedetector/19131", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22491 - Foreseer Reporting Software (FRS) Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-22491 \nPublished : Feb. 28, 2025, 9:15 a.m. | 51\u00a0minutes ago \nDescription : The user input was not sanitized on Reporting Hierarchy Management page of Foreseer Reporting Software (FRS) application which could lead into execution of arbitrary JavaScript in a browser context  \nfor all the interacting users. This security issue has been patched in the latest version 1.5.100 of the FRS. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T11:10:17.000000Z"}, {"uuid": "8ab2e9fb-8fbe-44f4-b605-c0ef0924b22d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22495", "type": "seen", "source": "https://t.me/cvedetector/18820", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22495 - \"Network-M2 NTP Server Configuration Command Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-22495 \nPublished : Feb. 24, 2025, 5:15 p.m. | 1\u00a0hour, 45\u00a0minutes ago \nDescription : An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4.   \nNote - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T20:28:12.000000Z"}, {"uuid": "623f1e92-cb0a-4c29-90f6-8fa2b3123cfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22491", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5852", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22491\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The user input was not sanitized on Reporting Hierarchy Management page of Foreseer Reporting Software (FRS) application which could lead into execution of arbitrary JavaScript in a browser context\nfor all the interacting users. This security issue has been patched in the latest version 1.5.100 of the FRS.\n\ud83d\udccf Published: 2025-02-28T08:24:21.219Z\n\ud83d\udccf Modified: 2025-02-28T08:24:21.219Z\n\ud83d\udd17 References:\n1. https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1009.pdf", "creation_timestamp": "2025-02-28T09:27:21.000000Z"}, {"uuid": "d11e78e5-355e-40fd-a616-1f1408e91d24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22492", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5850", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22492\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L)\n\ud83d\udd39 Description: The connection string visible to users with access to FRSCore database on Foreseer Reporting Software (FRS) VM, this\nstring can be used for gaining administrative access to the 4crXref database. This vulnerability has been resolved in the latest version 1.5.100 of FRS.\n\ud83d\udccf Published: 2025-02-28T08:29:33.347Z\n\ud83d\udccf Modified: 2025-02-28T08:29:33.347Z\n\ud83d\udd17 References:\n1. https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1009.pdf", "creation_timestamp": "2025-02-28T09:27:19.000000Z"}, {"uuid": "59a4b336-bb9a-4d7d-a191-678a5dba402f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22497", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9140", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22497\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in A.H.C. Waasdorp Simple Google Calendar Outlook Events Block Widget allows Stored XSS.This issue affects Simple Google Calendar Outlook Events Block Widget: from n/a through 2.5.0.\n\ud83d\udccf Published: 2025-03-27T15:31:33.928Z\n\ud83d\udccf Modified: 2025-03-27T16:03:33.266Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/simple-google-icalendar-widget/vulnerability/wordpress-simple-google-calendar-outlook-events-block-widget-plugin-2-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T16:27:06.000000Z"}, {"uuid": "d386b873-f4ff-4c56-b97f-936fdeb103e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2249", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9535", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2249\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The SoJ SoundSlides plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the soj_soundslides_options_subpanel() function in all versions up to, and including, 1.2.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\ud83d\udccf Published: 2025-03-29T07:03:32.151Z\n\ud83d\udccf Modified: 2025-03-29T07:03:32.151Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/f648e7f3-d93a-4a46-ae77-81a94880869c?source=cve\n2. https://plugins.trac.wordpress.org/browser/soj-soundslides/tags/1.2.2/soj-soundslides.php", "creation_timestamp": "2025-03-29T07:28:40.000000Z"}, {"uuid": "317625ac-ebd4-420d-bcaf-e927a9b7b392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22495", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6264", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22495\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4. \nNote - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.\n\ud83d\udccf Published: 2025-02-24T16:27:46.924Z\n\ud83d\udccf Modified: 2025-03-03T19:12:12.175Z\n\ud83d\udd17 References:\n1. https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2025-1004.pdf\n2. https://www.eaton.com/content/dam/eaton/products/backup-power-ups-surge-it-power-distribution/power-management-software-connectivity/eaton-gigabit-network-card/Network-M2%20EOL.pdf", "creation_timestamp": "2025-03-03T19:30:59.000000Z"}, {"uuid": "2edb5843-68eb-4abc-99cb-18917b0e36c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2249", "type": "seen", "source": "https://t.me/cvedetector/21507", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2249 - \"WordPress SoJ SoundSlides Arbitrary File Upload Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2249 \nPublished : March 29, 2025, 7:15 a.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : The SoJ SoundSlides plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the soj_soundslides_options_subpanel() function in all versions up to, and including, 1.2.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-29T10:29:01.000000Z"}, {"uuid": "44854e00-8bc4-4158-843c-15ad037a98d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22498", "type": "seen", "source": "https://t.me/cvedetector/15149", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22498 - New Normal LLC LucidLMS Reflected Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-22498 \nPublished : Jan. 13, 2025, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Normal LLC LucidLMS allows Reflected XSS.This issue affects LucidLMS: from n/a through 1.0.5. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T16:14:23.000000Z"}, {"uuid": "7bbbb9d2-8beb-4bef-9046-68dec3af81b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22499", "type": "seen", "source": "https://t.me/cvedetector/15151", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22499 - FAKTOR VIER F4 Post Tree Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-22499 \nPublished : Jan. 13, 2025, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FAKTOR VIER F4 Post Tree allows Reflected XSS.This issue affects F4 Post Tree: from n/a through 1.1.18. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T16:14:28.000000Z"}, {"uuid": "75312c1c-89bb-4507-8df0-7d1aa33f9281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2249", "type": "published-proof-of-concept", "source": "Telegram/KggYeN27jZ-a4rfgVHT2MGe0BAzOSuPW6YEwI7pxp7JEmks", "content": "", "creation_timestamp": "2025-03-29T08:00:08.000000Z"}, {"uuid": "7eeae6e7-90de-49db-bad7-e313223fcb06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2249", "type": "published-proof-of-concept", "source": "Telegram/yCF7WZfcWyZ_gFovIoZAzXPmTHFRJxtDYTgLS7FkwxiTPY0", "content": "", "creation_timestamp": "2025-03-29T04:00:06.000000Z"}, {"uuid": "20f9d860-20db-4fff-9748-1da853a62c3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2249", "type": "seen", "source": "Telegram/aF4xicIreuyE5yRRD33dmWV9qZXjTlaEQ3JU-sQx2NkHh1A", "content": "", "creation_timestamp": "2025-03-29T09:31:14.000000Z"}]}