{"vulnerability": "CVE-2025-2259", "sightings": [{"uuid": "81631619-1f69-42fb-9f78-eec6d8443b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22594", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfd3ciq6kr2k", "content": "", "creation_timestamp": "2025-01-09T16:17:36.435751Z"}, {"uuid": "56764228-0e1e-4299-8190-ca83be1c02a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22595", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfd3cl6e7l22", "content": "", "creation_timestamp": "2025-01-09T16:17:38.667387Z"}, {"uuid": "1f27893c-e859-4735-be3c-035f989fbc6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22596", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804779601066352", "content": "", "creation_timestamp": "2025-01-10T15:32:06.746992Z"}, {"uuid": "214d6486-15cf-4278-be70-90e39bf7adb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804779615596755", "content": "", "creation_timestamp": "2025-01-10T15:32:07.112083Z"}, {"uuid": "5f7289e6-f11c-4811-bef4-2b4c7840e475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22598", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804779630653898", "content": "", "creation_timestamp": "2025-01-10T15:32:07.260799Z"}, {"uuid": "3121b75d-12f6-46c7-8c83-231735b08c2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22592", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62ivvow62a", "content": "", "creation_timestamp": "2025-01-07T16:19:58.879730Z"}, {"uuid": "ba1392b3-f40c-4710-afb8-87ad48e3be95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22593", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62iymfny2e", "content": "", "creation_timestamp": "2025-01-07T16:20:01.667058Z"}, {"uuid": "24519f65-bfca-4b9c-bf63-391958417b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22596", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804792788825014", "content": "", "creation_timestamp": "2025-01-10T15:35:28.051611Z"}, {"uuid": "e75f8dd2-c5d3-46f6-83b6-effc5057eab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804792804444750", "content": "", "creation_timestamp": "2025-01-10T15:35:28.259843Z"}, {"uuid": "4ad5209f-e231-48e2-846f-b39f06129be9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22598", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804792818857490", "content": "", "creation_timestamp": "2025-01-10T15:35:28.483416Z"}, {"uuid": "b8301f8f-0c4f-4198-b31f-d684fa105399", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22599", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804851849608369", "content": "", "creation_timestamp": "2025-01-10T15:50:29.226073Z"}, {"uuid": "3fc1c0af-df1f-4152-a31d-f2421b4de67d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22599", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfflp5gpc52i", "content": "", "creation_timestamp": "2025-01-10T16:16:19.849652Z"}, {"uuid": "495b5a98-eb76-499c-a7c9-490b539d297a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22596", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfflowegbp2m", "content": "", "creation_timestamp": "2025-01-10T16:16:12.420519Z"}, {"uuid": "bc31c334-8777-45c4-b6b3-c58fdc4458a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffloyuuip2m", "content": "", "creation_timestamp": "2025-01-10T16:16:15.058859Z"}, {"uuid": "08ad4aee-205b-4795-9bf4-5b3d6e0508f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22598", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfflp36h7l22", "content": "", "creation_timestamp": "2025-01-10T16:16:17.569296Z"}, {"uuid": "79422b31-9f09-443b-bb90-3447c7d4e8d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22591", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62ithyhu2o", "content": "", "creation_timestamp": "2025-01-07T16:19:56.759959Z"}, {"uuid": "f19aa140-b98c-4f84-96b9-de1fdc901688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffnjo3cti25", "content": "", "creation_timestamp": "2025-01-10T16:49:04.133729Z"}, {"uuid": "755866be-9d30-48af-8085-408da075dc21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22598", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffnjo6npd2g", "content": "", "creation_timestamp": "2025-01-10T16:49:04.762462Z"}, {"uuid": "eee776df-e2a1-416f-8359-4fba06a7aff3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22590", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62ir632h25", "content": "", "creation_timestamp": "2025-01-07T16:19:53.871653Z"}, {"uuid": "8d135955-0633-447b-bf18-b173b82c5eef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22598", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805082341821804", "content": "", "creation_timestamp": "2025-01-10T16:49:19.761575Z"}, {"uuid": "c711b210-e0dd-4d26-8d7a-35bdde0bd416", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805082288619323", "content": "", "creation_timestamp": "2025-01-10T16:49:18.697780Z"}, {"uuid": "37be9572-122f-4ec5-b88c-baa7aa2b08ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "3d375c87-538c-4a7d-bd62-e2b65ba4c008", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2259", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm6kzzzsje2b", "content": "", "creation_timestamp": "2025-04-06T23:12:15.264192Z"}, {"uuid": "9d34794d-d0d1-4d4c-abc3-4eac7dac86b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2259", "type": "seen", "source": "https://infosec.place/objects/e13629f6-a9f6-4003-b74e-14e535bdc612", "content": "", "creation_timestamp": "2025-04-14T14:00:11.397060Z"}, {"uuid": "3812c3dd-c037-4a04-9b99-5fc361fe44b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2259", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lms2jufbwh2y", "content": "", "creation_timestamp": "2025-04-14T17:10:07.557877Z"}, {"uuid": "6cce8e81-c2af-4d63-b437-7bd95d0c1ee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22599", "type": "seen", "source": "https://t.me/cvedetector/14965", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22599 - WeGIA Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-22599 \nPublished : Jan. 10, 2025, 4:15 p.m. | 38\u00a0minutes ago \nDescription : WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the home.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T18:00:44.000000Z"}, {"uuid": "5ddbff6d-7eb7-48c0-9244-4c60dd9ce866", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22599", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1155", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22599\n\ud83d\udd39 Description: WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the home.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8.\n\ud83d\udccf Published: 2025-01-10T15:29:46.506Z\n\ud83d\udccf Modified: 2025-01-10T15:50:15.244Z\n\ud83d\udd17 References:\n1. https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8354-6cxw-7g8c", "creation_timestamp": "2025-01-10T16:03:07.000000Z"}, {"uuid": "868d0449-4a03-4c66-ae48-471ef0ffd0c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2259", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10638", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2259\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before \nversion 6.4.3, an attacker can cause an integer underflow and a \nsubsequent denial of service by writing a very large file, by specially \ncrafted packets with Content-Length in one packet smaller than the data \nrequest size of the other packet. A possible workaround is to disable \nHTTP PUT support.\n\n\n\n\nThis issue follows an incomplete fix of CVE-2025-0727\n\ud83d\udccf Published: 2025-04-06T19:01:20.233Z\n\ud83d\udccf Modified: 2025-04-06T19:01:20.233Z\n\ud83d\udd17 References:\n1. https://github.com/eclipse-threadx/netxduo/commit/fb3195bbb6d0d6fe71a7a19585c008623c217f9e\n2. https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-chhp-gmxc-46rq", "creation_timestamp": "2025-04-06T19:44:12.000000Z"}, {"uuid": "5e4ab532-955f-4a9b-96cc-20b028dfb5ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2259", "type": "seen", "source": "https://t.me/cvedetector/22229", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2259 - Eclipse ThreadX NetX Duo HTTP Server Integer Underflow Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-2259 \nPublished : April 6, 2025, 7:15 p.m. | 2\u00a0hours, 48\u00a0minutes ago \nDescription : In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before   \nversion 6.4.3, an attacker can cause an integer underflow and a   \nsubsequent denial of service by writing a very large file, by specially   \ncrafted packets with Content-Length in one packet smaller than the data   \nrequest size of the other packet. A possible workaround is to disable   \nHTTP PUT support.  \n  \n  \n  \n  \nThis issue follows an incomplete fix of CVE-2025-0727 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T00:20:07.000000Z"}, {"uuid": "d1faa970-7917-43e7-9d28-8d03d43f9e15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22598", "type": "seen", "source": "https://t.me/cvedetector/14964", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22598 - WeGIA Cadastral Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22598 \nPublished : Jan. 10, 2025, 4:15 p.m. | 38\u00a0minutes ago \nDescription : WeGIA is a web manager for charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the cadastrarSocio.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the local_recepcao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.8. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T18:00:44.000000Z"}, {"uuid": "d3d2aa52-dc72-4293-bc89-3ac3818dbd42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://t.me/cvedetector/14963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22597 - WeGIA Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22597 \nPublished : Jan. 10, 2025, 4:15 p.m. | 38\u00a0minutes ago \nDescription : WeGIA is a web manager for charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the CobrancaController.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the local_recepcao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.8. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T18:00:43.000000Z"}, {"uuid": "0db6e85a-903b-443e-8d3e-114be8105191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22596", "type": "seen", "source": "https://t.me/cvedetector/14962", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22596 - WeGIA Web Manager Reflected Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22596 \nPublished : Jan. 10, 2025, 4:15 p.m. | 38\u00a0minutes ago \nDescription : WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the modulos_visiveis.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T18:00:42.000000Z"}, {"uuid": "5e0e1f09-8c35-4037-96d0-8bba804360ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22593", "type": "seen", "source": "https://t.me/cvedetector/14551", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22593 - Burria Laika Pedigree Tree Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-22593 \nPublished : Jan. 7, 2025, 4:15 p.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Burria Laika Pedigree Tree allows Stored XSS.This issue affects Laika Pedigree Tree: from n/a through 1.4. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T18:03:17.000000Z"}, {"uuid": "63425d23-2fad-489c-811c-3b9cf822f6a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22591", "type": "seen", "source": "https://t.me/cvedetector/14550", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22591 - Lenderd 1003 Mortgage Application Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22591 \nPublished : Jan. 7, 2025, 4:15 p.m. | 41\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Lenderd 1003 Mortgage Application allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects 1003 Mortgage Application: from n/a through 1.87. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T18:03:17.000000Z"}, {"uuid": "b2bfc200-337e-4496-8709-9c681365cddc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22590", "type": "seen", "source": "https://t.me/cvedetector/14549", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22590 - Prayer Times Anywhere CSRF-Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22590 \nPublished : Jan. 7, 2025, 4:15 p.m. | 41\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in mmrs151 Prayer Times Anywhere allows Stored XSS.This issue affects Prayer Times Anywhere: from n/a through 2.0.1. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T18:03:16.000000Z"}, {"uuid": "560a019a-7b07-4b1c-98b4-28f0923cbfe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22592", "type": "seen", "source": "https://t.me/cvedetector/14548", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22592 - Lenderd 1003 Mortgage Application Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22592 \nPublished : Jan. 7, 2025, 4:15 p.m. | 41\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Lenderd 1003 Mortgage Application allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects 1003 Mortgage Application: from n/a through 1.87. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T18:03:15.000000Z"}]}