{"vulnerability": "CVE-2025-2260", "sightings": [{"uuid": "924a78fa-cc16-41b3-9756-eb482284b535", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22600", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804851864420816", "content": "", "creation_timestamp": "2025-01-10T15:50:29.452478Z"}, {"uuid": "f9f18b6f-68f5-43fd-bbcf-e04ecc4b9b89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22600", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfflp7jkre25", "content": "", "creation_timestamp": "2025-01-10T16:16:22.059849Z"}, {"uuid": "9a3c6ec1-f6a8-4958-a13a-efd9f506191b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113901810192356434", "content": "", "creation_timestamp": "2025-01-27T18:48:17.053712Z"}, {"uuid": "e20ceae2-6745-4112-947b-5ac218fbf2c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lh7nvnkpq62e", "content": "", "creation_timestamp": "2025-02-02T18:30:10.948341Z"}, {"uuid": "b8f1c3c6-f709-460a-b106-544cdc621250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lguscw6bjh24", "content": "", "creation_timestamp": "2025-01-29T10:49:53.795233Z"}, {"uuid": "53793e40-3372-4ce6-a8c6-461a77a94987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/techit.bsky.social/post/3lgusv4w5jg2u", "content": "", "creation_timestamp": "2025-01-29T11:00:05.318320Z"}, {"uuid": "7e51d888-2b71-4837-b681-9870fab4d718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/ethicalhack3r.bsky.social/post/3lguszck77c2b", "content": "", "creation_timestamp": "2025-01-29T11:02:25.533391Z"}, {"uuid": "8532127a-7eec-40df-81f4-2f82a65ea0cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgut7xfqcr2y", "content": "", "creation_timestamp": "2025-01-29T11:06:08.043436Z"}, {"uuid": "dbe2e525-08c9-45a9-9576-dab187f235e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgutn47pf524", "content": "", "creation_timestamp": "2025-01-29T11:13:29.598849Z"}, {"uuid": "c28798e9-ab98-43ec-93d1-659de2f52825", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/OpenSource.activitypub.awakari.com.ap.brid.gy/post/3lgutopa24su2", "content": "", "creation_timestamp": "2025-01-29T11:16:15.483664Z"}, {"uuid": "ce169820-98c0-4710-bcc8-cbe513b7e5ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lguu4m7pf22l", "content": "", "creation_timestamp": "2025-01-29T11:22:13.275754Z"}, {"uuid": "d5e62178-8007-4f86-abe8-94b2640173d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lguvyexrfq2m", "content": "", "creation_timestamp": "2025-01-29T11:55:35.295416Z"}, {"uuid": "ce834c3e-c651-4e04-8331-230cc236442d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22609", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lgxwu2lt2y24", "content": "", "creation_timestamp": "2025-01-30T16:49:03.697690Z"}, {"uuid": "4fb42c8d-062a-48b8-a54e-76eecfe02913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html", "content": "", "creation_timestamp": "2025-01-29T09:21:00.000000Z"}, {"uuid": "523aacac-17d4-46a4-abcd-4b814e1708e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lgvasrrv5k22", "content": "", "creation_timestamp": "2025-01-29T15:09:19.177458Z"}, {"uuid": "5ab960be-1469-49fa-a0a4-b5d51f1195f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22601", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947614990713817", "content": "", "creation_timestamp": "2025-02-04T20:57:01.939450Z"}, {"uuid": "a4c7c652-03e1-4352-93d1-7efe5aebf5fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22602", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947615005883636", "content": "", "creation_timestamp": "2025-02-04T20:57:02.123424Z"}, {"uuid": "e69885a3-bdc4-4248-be5e-48e32934dc38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/113912448887880931", "content": "", "creation_timestamp": "2025-01-29T15:53:49.519103Z"}, {"uuid": "29c949bb-0597-4e8f-b771-8a0bff5e1ffe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22601", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhey4e2h7j2t", "content": "", "creation_timestamp": "2025-02-04T21:16:11.578408Z"}, {"uuid": "5929876c-ab6c-4541-bd01-084630207ffe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22602", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhey4gc3o62t", "content": "", "creation_timestamp": "2025-02-04T21:16:14.248832Z"}, {"uuid": "cb210885-8cb8-4379-89fb-e5c0a19ab09d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lgww7zkpr22n", "content": "", "creation_timestamp": "2025-01-30T07:05:11.108976Z"}, {"uuid": "029fd823-58e4-4cf8-a831-70ca8e16a949", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22602", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhf3uw3rlf2v", "content": "", "creation_timestamp": "2025-02-04T22:23:40.985249Z"}, {"uuid": "66490dc7-5350-4220-a96a-3c68f70347d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22601", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhf3uwcn3g2f", "content": "", "creation_timestamp": "2025-02-04T22:23:41.980432Z"}, {"uuid": "2abbb385-b656-422e-96e3-ee158f6571e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/lordman1982.bsky.social/post/3lhgwwws65d2d", "content": "", "creation_timestamp": "2025-02-05T16:00:36.161075Z"}, {"uuid": "7db87d7e-75fb-4871-a787-2a8bb714f5f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22605", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113883928607483631", "content": "", "creation_timestamp": "2025-01-24T15:00:44.665861Z"}, {"uuid": "0e81f8eb-80dc-408f-a96d-01ef9e36fd84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22608", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113884286717742726", "content": "", "creation_timestamp": "2025-01-24T16:31:49.147932Z"}, {"uuid": "0d608119-4ecf-4cd2-b804-eaf521671d11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22609", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113884286733931596", "content": "", "creation_timestamp": "2025-01-24T16:31:49.376661Z"}, {"uuid": "7dec80a6-c62d-47fe-bbda-1a3f0c19e831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22607", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113884118072683940", "content": "", "creation_timestamp": "2025-01-24T15:48:55.616187Z"}, {"uuid": "46c44431-06f8-40af-9096-3aee3e3913f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgyemociv225", "content": "", "creation_timestamp": "2025-01-30T20:55:27.937199Z"}, {"uuid": "26742c8b-30fb-4594-a293-50175b6b17ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgxckchjss2f", "content": "", "creation_timestamp": "2025-01-30T10:45:49.559975Z"}, {"uuid": "216eb52a-7a7b-4aa5-b511-99c223541f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgyernidss25", "content": "", "creation_timestamp": "2025-01-30T20:58:18.618088Z"}, {"uuid": "a4e8ee44-5c79-4db9-a620-f65ebcd1ee67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22609", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113884389353887186", "content": "", "creation_timestamp": "2025-01-24T16:57:55.355090Z"}, {"uuid": "fbdc6b4a-3dff-457c-a435-e9fe3b36d3fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://threatintel.cc/2025/01/29/critical-cacti-security-flaw-cve.html", "content": "", "creation_timestamp": "2025-01-29T11:19:08.000000Z"}, {"uuid": "22e1a455-77bb-44b4-a379-831b94bdc063", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22609", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113884588172935119", "content": "", "creation_timestamp": "2025-01-24T17:48:30.516827Z"}, {"uuid": "a8dd8763-734a-48a1-8274-ba0663d8db1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22609", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgxclr6auk2w", "content": "", "creation_timestamp": "2025-01-30T10:46:31.612830Z"}, {"uuid": "5c08d2d0-00aa-4f1d-a860-2132df43e57e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-22604", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgubidfvc22n", "content": "", "creation_timestamp": "2025-01-29T05:48:41.917347Z"}, {"uuid": "11e38811-72d0-4229-86c5-264ffa817666", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lgsoamsic422", "content": "", "creation_timestamp": "2025-01-28T14:31:45.220981Z"}, {"uuid": "f8a9dfee-2c41-47f6-8ee9-3e4f9c444b15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-22609", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgubj3myys2n", "content": "", "creation_timestamp": "2025-01-29T05:49:07.428665Z"}, {"uuid": "532fefee-48b0-4d2f-9704-d0cd4ebbc03a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqgy6m74v2i", "content": "", "creation_timestamp": "2025-01-27T17:16:23.186692Z"}, {"uuid": "e557521a-e368-484e-bfd8-14ea9d5e59e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3lgvoo3whde2h", "content": "", "creation_timestamp": "2025-01-29T19:17:14.292706Z"}, {"uuid": "6ca744ed-c7e8-4b18-bcf5-1c019b2ee149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2260", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm6l22kccy2w", "content": "", "creation_timestamp": "2025-04-06T23:12:17.825505Z"}, {"uuid": "677b83e4-153a-4937-ade4-f3499c2dee0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3lh3hwvsifz2d", "content": "", "creation_timestamp": "2025-02-01T02:32:52.028421Z"}, {"uuid": "711e6071-c947-436a-ac68-b52e153aac35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/mrbyte.bsky.social/post/3lgvyd3hem22e", "content": "", "creation_timestamp": "2025-01-29T22:10:10.506671Z"}, {"uuid": "accb4f16-7af6-43f6-a14f-3b153eff9bee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22603", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:32.000000Z"}, {"uuid": "5b4c3f0d-5dad-4e60-8722-4ec0de3c63db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22603", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "e03b8c80-c82a-4d3f-ac32-6b53fa2f5240", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2260", "type": "seen", "source": "https://infosec.place/objects/e33c10e0-6bba-414c-bef3-74aea48d157a", "content": "", "creation_timestamp": "2025-04-14T14:00:05.854319Z"}, {"uuid": "b76134dc-38ec-44b2-816c-87a103465a2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2260", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lms2jufbwh2y", "content": "", "creation_timestamp": "2025-04-14T17:10:07.705402Z"}, {"uuid": "62eb89d5-94fb-4896-8c46-7947f4ccf44f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22609", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3loyfeaar2k2z", "content": "", "creation_timestamp": "2025-05-12T16:30:11.905701Z"}, {"uuid": "4d84528f-cb8f-444b-b222-cd39e94178e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22602", "type": "seen", "source": "https://t.me/cvedetector/17253", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22602 - Discourse Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-22602 \nPublished : Feb. 4, 2025, 9:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Discourse is an open source platform for community discussion. In affected versions an attacker can execute arbitrary JavaScript on users' browsers by posting a malicious video placeholder html element. This issue only affects sites with CSP disabled. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should enable CSP. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T00:45:57.000000Z"}, {"uuid": "3f1087a2-bd75-4f9b-8d64-1556283236cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22606", "type": "seen", "source": "https://t.me/cvedetector/16294", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22606 - Coolify Server Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22606 \nPublished : Jan. 24, 2025, 4:15 p.m. | 22\u00a0minutes ago \nDescription : Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In version 4.0.0-beta.358 and possibly earlier versions, when creating or updating a \"project,\" it is possible to inject arbitrary shell commands by altering the project name. If a name includes unescaped characters, such as single quotes (`'`), it breaks out of the intended command structure, allowing attackers to execute arbitrary commands on the host system. This vulnerability allows attackers to execute arbitrary commands on the host server, which could result in full system compromise; create, modify, or delete sensitive system files; and escalate privileges depending on the permissions of the executed process. Attackers with access to project management features could exploit this flaw to gain unauthorized control over the host environment. Version 4.0.0-beta.359 fixes this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T17:45:11.000000Z"}, {"uuid": "0c621920-3456-4c54-9673-39fbadf449cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22607", "type": "seen", "source": "https://t.me/cvedetector/16295", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22607 - Coolify GitHub/GitLab Configuration Disclosure Impermissible Access\", \n  \"Content\": \"CVE ID : CVE-2025-22607 \nPublished : Jan. 24, 2025, 4:15 p.m. | 22\u00a0minutes ago \nDescription : Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to fetch the details page for any GitHub / GitLab configuration on a Coolify instance by only knowing the UUID of the model. This exposes the \"client id\", \"client secret\" and \"webhook secret.\" Version 4.0.0-beta.361 fixes this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T17:45:12.000000Z"}, {"uuid": "b86a2108-8292-4939-a6d0-872cda8e3500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22601", "type": "seen", "source": "https://t.me/cvedetector/17252", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22601 - Discourse Username Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22601 \nPublished : Feb. 4, 2025, 9:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T00:45:56.000000Z"}, {"uuid": "70671a74-60aa-42f1-9961-25bbe007ce99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22605", "type": "seen", "source": "https://t.me/cvedetector/16282", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22605 - Coolify Remote Command Execution Vulnerability (RCE)\", \n  \"Content\": \"CVE ID : CVE-2025-22605 \nPublished : Jan. 24, 2025, 3:15 p.m. | 30\u00a0minutes ago \nDescription : Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Starting in version 4.0.0-beta.18 and prior to 4.0.0-beta.253, a vulnerability in the execution of commands on remote servers allows an authenticated user to execute arbitrary code on the local Coolify container, gaining access to data and private keys or tokens of other users/teams. The ability to inject malicious commands into the Coolify container gives authenticated attackers the ability to fully retrieve and control the data and availability of the software. Centrally hosted Coolify instances (open registration and/or multiple teams with potentially untrustworthy users) are especially at risk, as sensitive data of all users and connected servers can be leaked by any user. Additionally, attackers are able to modify the running software, potentially deploying malicious images to remote nodes or generally changing its behavior. Version 4.0.0-beta.253 patches this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T16:54:45.000000Z"}, {"uuid": "bafd5364-2751-4665-9f97-a874e5af75cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22609", "type": "seen", "source": "https://t.me/cvedetector/16307", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22609 - Coolify Remote Command Execution as Unprivileged User\", \n  \"Content\": \"CVE ID : CVE-2025-22609 \nPublished : Jan. 24, 2025, 5:15 p.m. | 44\u00a0minutes ago \nDescription : Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to attach any existing private key on a coolify instance to his own server. If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can use the `Terminal` feature and execute arbitrary commands on the victim's server. Version 4.0.0-beta.361 fixes the issue. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T19:25:34.000000Z"}, {"uuid": "b87da9d4-3fb5-4d77-9c04-9eacb2b48d7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22608", "type": "seen", "source": "https://t.me/cvedetector/16315", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22608 - Coolify Missing Authorization Denial-of-Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2025-22608 \nPublished : Jan. 24, 2025, 5:15 p.m. | 44\u00a0minutes ago \nDescription : Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to revoke any team invitations on a Coolify instance by only providing a predictable and incrementing ID, resulting in a Denial-of-Service attack (DOS). Version 4.0.0-beta.361 fixes the issue. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T19:25:46.000000Z"}, {"uuid": "6d02d1dd-93fe-40bb-9200-faadfb3c4df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22605", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2908", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22605\n\ud83d\udd39 Description: Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Starting in version 4.0.0-beta.18 and prior to 4.0.0-beta.253, a vulnerability in the execution of commands on remote servers allows an authenticated user to execute arbitrary code on the local Coolify container, gaining access to data and private keys or tokens of other users/teams. The ability to inject malicious commands into the Coolify container gives authenticated attackers the ability to fully retrieve and control the data and availability of the software. Centrally hosted Coolify instances (open registration and/or multiple teams with potentially untrustworthy users) are especially at risk, as sensitive data of all users and connected servers can be leaked by any user. Additionally, attackers are able to modify the running software, potentially deploying malicious images to remote nodes or generally changing its behavior. Version 4.0.0-beta.253 patches this issue.\n\ud83d\udccf Published: 2025-01-24T14:54:18.707Z\n\ud83d\udccf Modified: 2025-01-24T14:54:18.707Z\n\ud83d\udd17 References:\n1. https://github.com/coollabsio/coolify/security/advisories/GHSA-9wqm-fg79-4748\n2. https://github.com/coollabsio/coolify/pull/1524\n3. https://github.com/coollabsio/coolify/pull/1625\n4. https://github.com/coollabsio/coolify/commit/353245bb7de9680f238bae30443af1696bc977b0\n5. https://github.com/coollabsio/coolify/blob/40a239ddda3fc919f57a052d7b52b8e1a6696b81/bootstrap/helpers/remoteProcess.php#L70", "creation_timestamp": "2025-01-24T15:04:49.000000Z"}, {"uuid": "0b58b242-7de1-4e42-802f-d3049f5368fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22600", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1158", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22600\n\ud83d\udd39 Description: WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the configuracao_doacao.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the avulso parameter. This vulnerability is fixed in 3.2.8.\n\ud83d\udccf Published: 2025-01-10T15:30:15.534Z\n\ud83d\udccf Modified: 2025-01-10T15:46:26.253Z\n\ud83d\udd17 References:\n1. https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v856-wjh3-4rhg", "creation_timestamp": "2025-01-10T16:03:18.000000Z"}, {"uuid": "e7212716-903a-4675-a48d-6a128effd8b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_News/226", "content": "\ud83d\udea8 News Alert!\n\nSource: The Hacker News\nTitle: Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution\nLink: https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html", "creation_timestamp": "2025-01-29T10:48:06.000000Z"}, {"uuid": "e8a73dd9-d77c-4f2c-8a1c-38cabc81ff5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22607", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2916", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22607\n\ud83d\udd39 Description: Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to fetch the details page for any GitHub / GitLab configuration on a Coolify instance by only knowing the UUID of the model. This exposes the \"client id\", \"client secret\" and \"webhook secret.\" Version 4.0.0-beta.361 fixes this issue.\n\ud83d\udccf Published: 2025-01-24T15:45:03.711Z\n\ud83d\udccf Modified: 2025-01-24T15:58:23.987Z\n\ud83d\udd17 References:\n1. https://github.com/coollabsio/coolify/security/advisories/GHSA-8w24-gfgq-jg72", "creation_timestamp": "2025-01-24T16:04:36.000000Z"}, {"uuid": "a9f1c88f-183a-40c9-af70-3a0014af646c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22606", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2926", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22606\n\ud83d\udd39 Description: Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In version 4.0.0-beta.358 and possibly earlier versions, when creating or updating a \"project,\" it is possible to inject arbitrary shell commands by altering the project name. If a name includes unescaped characters, such as single quotes (`'`), it breaks out of the intended command structure, allowing attackers to execute arbitrary commands on the host system. This vulnerability allows attackers to execute arbitrary commands on the host server, which could result in full system compromise; create, modify, or delete sensitive system files; and escalate privileges depending on the permissions of the executed process. Attackers with access to project management features could exploit this flaw to gain unauthorized control over the host environment. Version 4.0.0-beta.359 fixes this issue.\n\ud83d\udccf Published: 2025-01-24T15:38:47.352Z\n\ud83d\udccf Modified: 2025-01-24T15:40:44.749Z\n\ud83d\udd17 References:\n1. https://github.com/coollabsio/coolify/security/advisories/GHSA-ccp8-v65g-m526", "creation_timestamp": "2025-01-24T16:04:50.000000Z"}, {"uuid": "58fd76fb-d929-4b18-a870-f7f843903df2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22609", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2953", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22609\n\ud83d\udd39 Description: Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to attach any existing private key on a coolify instance to his own server. If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can use the `Terminal` feature and execute arbitrary commands on the victim's server. Version 4.0.0-beta.361 fixes the issue.\n\ud83d\udccf Published: 2025-01-24T16:30:34.465Z\n\ud83d\udccf Modified: 2025-01-24T16:33:08.221Z\n\ud83d\udd17 References:\n1. https://github.com/coollabsio/coolify/security/advisories/GHSA-3w2c-jfr2-9pg9", "creation_timestamp": "2025-01-24T17:05:11.000000Z"}, {"uuid": "90b0fab1-bf6e-4857-816d-a1ba6c6a67ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22603", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7029", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22603\n\ud83d\udd25 CVSS Score: 7.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Versions prior to autogpt-platform-beta-v0.4.2 contains a server-side request forgery (SSRF) vulnerability inside component (or block) `Send Web Request`. The root cause is  that IPV6 address is not restricted or filtered, which allows attackers to perform a server side request forgery to visit an IPV6 service. autogpt-platform-beta-v0.4.2 fixes the issue.\n\ud83d\udccf Published: 2025-03-10T18:09:51.419Z\n\ud83d\udccf Modified: 2025-03-10T19:17:04.406Z\n\ud83d\udd17 References:\n1. https://github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-4c8v-hwxc-2356\n2. https://github.com/Significant-Gravitas/AutoGPT/commit/26214e1b2c6777e0fae866642b23420adaadd6c4\n3. https://boatneck-faucet-cba.notion.site/SSRF-of-AutoGPT-153b650a4d88804d923ad65a015a7d61\n4. https://github.com/Significant-Gravitas/AutoGPT/blob/2121ffd06b26a438706bf642372cc46d81c94ddc/autogpt_platform/backend/backend/util/request.py#L11", "creation_timestamp": "2025-03-10T19:38:18.000000Z"}, {"uuid": "a7265d02-6ead-4c21-a215-f9265b7f4d11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2260", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10639", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2260\n\ud83d\udd25 CVSS Score: 7.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before \nversion 6.4.3, an attacker can cause a denial of service by specially \ncrafted packets. The core issue is missing closing of a file in case of \nan error condition, resulting in the 404 error for each further file \nrequest. Users can work-around the issue by disabling the PUT request \nsupport.\n\n\n\n\nThis issue follows an incomplete fix of CVE-2025-0726.\n\ud83d\udccf Published: 2025-04-06T18:56:34.730Z\n\ud83d\udccf Modified: 2025-04-06T18:56:34.730Z\n\ud83d\udd17 References:\n1. https://github.com/eclipse-threadx/netxduo/commit/fb3195bbb6d0d6fe71a7a19585c008623c217f9e\n2. https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-f42f-6fvv-xqx3", "creation_timestamp": "2025-04-06T19:44:13.000000Z"}, {"uuid": "d5b3fa82-e2a8-4797-8d8a-368b6954c867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/ics_cert/1006", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062d\u06cc\u0627\u062a\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0646\u0638\u0627\u0631\u062a \u0648 \u0645\u062f\u06cc\u0631\u06cc\u062a \u062e\u0637\u0627\u06cc \u0634\u0628\u06a9\u0647 \u0645\u0646\u0628\u0639 \u0628\u0627\u0632 Cacti \u06a9\u0634\u0641 \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u06a9\u062f \u0631\u0627 \u0631\u0648\u06cc \u0646\u0645\u0648\u0646\u0647\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0646\u0627\u0645 CVE-2025-22604 \u0631\u062f\u06cc\u0627\u0628\u06cc \u0645\u06cc \u0634\u0648\u062f \u0648 \u062f\u0627\u0631\u0627\u06cc \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS 9.1 \u0627\u0632 \u062d\u062f\u0627\u06a9\u062b\u0631 10.0 \u0627\u0633\u062a \u0648 \u062a\u0648\u0633\u0637 \u06cc\u06a9 \u0645\u062d\u0642\u0642 \u062e\u0635\u0648\u0635\u06cc \u0628\u0627 \u0646\u0627\u0645 \u0645\u0633\u062a\u0639\u0627\u0631 \u0622\u0646\u0644\u0627\u06cc\u0646 u32i \u0641\u0627\u0634 \u0634\u062f\u0647 \u0627\u0633\u062a.\n\n\u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u062a\u062c\u0632\u06cc\u0647 \u06a9\u0646\u0646\u062f\u0647 \u0646\u062a\u06cc\u062c\u0647 SNMP \u0686\u0646\u062f \u062e\u0637\u06cc \u0627\u0633\u062a \u0648 \u0628\u0627\u0639\u062b \u0645\u06cc \u0634\u0648\u062f \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647 OID \u0647\u0627\u06cc \u0646\u0627\u062f\u0631\u0633\u062a \u0631\u0627 \u062f\u0631 \u067e\u0627\u0633\u062e \u0648\u0627\u0631\u062f \u06a9\u0646\u0646\u062f.\n\n\u0647\u0646\u06af\u0627\u0645\u06cc \u06a9\u0647 \u0628\u0627 ss_net_snmp_disk_io() \u06cc\u0627 ss_net_snmp_disk_bytes() \u067e\u0631\u062f\u0627\u0632\u0634 \u0645\u06cc \u0634\u0648\u062f\u060c \u0628\u062e\u0634\u06cc \u0627\u0632 \u0647\u0631 OID \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u06cc\u06a9 \u06a9\u0644\u06cc\u062f \u062f\u0631 \u0622\u0631\u0627\u06cc\u0647 \u0627\u06cc \u06a9\u0647 \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0628\u062e\u0634\u06cc \u0627\u0632 \u06cc\u06a9 \u0641\u0631\u0645\u0627\u0646 \u0633\u06cc\u0633\u062a\u0645 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u062f\u060c \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u062f \u0648 \u0645\u0646\u062c\u0631 \u0628\u0647 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u062c\u0631\u0627\u06cc \u062f\u0633\u062a\u0648\u0631 \u0645\u06cc \u0634\u0648\u062f.\n\n\u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0645\u0648\u0641\u0642\u06cc\u062a\u200c\u0622\u0645\u06cc\u0632 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0628\u0627 \u062d\u0642\u0648\u0642 \u06a9\u0646\u062a\u0631\u0644 \u062f\u0633\u062a\u06af\u0627\u0647 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0631\u0648\u06cc \u0633\u0631\u0648\u0631 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f\u060c \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u0631\u0627 \u0633\u0631\u0642\u062a\u060c \u0648\u06cc\u0631\u0627\u06cc\u0634 \u06cc\u0627 \u062d\u0630\u0641 \u06a9\u0646\u062f.\n\nCVE-2025-22604 \u0628\u0631 \u062a\u0645\u0627\u0645 \u0646\u0633\u062e\u0647 \u0647\u0627\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u062a\u0627 \u0648 \u0627\u0632 \u062c\u0645\u0644\u0647 1.2.28 \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc \u06af\u0630\u0627\u0631\u062f. \u0645\u0634\u06a9\u0644 \u062f\u0631 \u0646\u0633\u062e\u0647 1.2.29 \u0628\u0631\u0637\u0631\u0641 \u0634\u062f\u0647 \u0627\u0633\u062a.\n\n\u0646\u0633\u062e\u0647 \u062c\u062f\u06cc\u062f \u0647\u0645\u0686\u0646\u06cc\u0646 CVE-2025-24367 (CVSS: 7.2) \u0631\u0627 \u0628\u0631\u0637\u0631\u0641 \u0645\u06cc \u06a9\u0646\u062f\u060c \u06a9\u0647 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u062a\u0623\u06cc\u06cc\u062f \u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0628\u0627 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u06cc\u062c\u0627\u062f \u0646\u0645\u0648\u062f\u0627\u0631 \u0648 \u0639\u0645\u0644\u06a9\u0631\u062f \u0627\u0644\u06af\u0648\u06cc \u0646\u0645\u0648\u062f\u0627\u0631\u060c \u0627\u0633\u06a9\u0631\u06cc\u067e\u062a \u0647\u0627\u06cc PHP \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u062f\u0631 \u0631\u06cc\u0634\u0647 \u0648\u0628 \u0628\u0631\u0646\u0627\u0645\u0647 \u0627\u06cc\u062c\u0627\u062f \u06a9\u0646\u062f \u0648 \u062f\u0631 \u0646\u062a\u06cc\u062c\u0647 RCE \u0627\u06cc\u062c\u0627\u062f \u0634\u0648\u062f.\n\n\u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u062a\u062c\u0631\u0628\u0647 \u0646\u0627\u062e\u0648\u0634\u0627\u06cc\u0646\u062f \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627 \u062f\u0631 Cacti\u060c \u06a9\u0633\u0627\u0646\u06cc \u06a9\u0647 \u0627\u0632 \u0627\u06cc\u0646 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0628\u0631\u0627\u06cc \u0646\u0638\u0627\u0631\u062a \u0628\u0631 \u0634\u0628\u06a9\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u06a9\u0646\u0646\u062f \u0628\u0627\u06cc\u062f \u0628\u0647 \u0633\u0631\u0639\u062a \u0648\u0635\u0644\u0647 \u0647\u0627\u06cc \u0644\u0627\u0632\u0645 \u0631\u0627 \u0628\u0631\u0627\u06cc \u06a9\u0627\u0647\u0634 \u062e\u0637\u0631 \u0633\u0627\u0632\u0634 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0646\u0646\u062f.\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-02-07T12:56:59.000000Z"}, {"uuid": "8b9fe60c-e822-417e-85bf-11c1f9418acc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/cvedetector/16498", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22604 - \"Cacti SNMP Command Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-22604 \nPublished : Jan. 27, 2025, 5:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T20:11:32.000000Z"}, {"uuid": "c270efee-5120-45e3-8ebe-fabd89329773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22600", "type": "seen", "source": "https://t.me/cvedetector/14966", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22600 - WeGIA Web Manager Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-22600 \nPublished : Jan. 10, 2025, 4:15 p.m. | 38\u00a0minutes ago \nDescription : WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the configuracao_doacao.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the avulso parameter. This vulnerability is fixed in 3.2.8. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T18:00:48.000000Z"}, {"uuid": "d17b34d8-ebda-4ab7-b8f5-8a8fc678e903", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2260", "type": "seen", "source": "https://t.me/cvedetector/22230", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2260 - Eclipse ThreadX NetX Duo HTTP Server Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2260 \nPublished : April 6, 2025, 7:15 p.m. | 2\u00a0hours, 48\u00a0minutes ago \nDescription : In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before   \nversion 6.4.3, an attacker can cause a denial of service by specially   \ncrafted packets. The core issue is missing closing of a file in case of   \nan error condition, resulting in the 404 error for each further file   \nrequest. Users can work-around the issue by disabling the PUT request   \nsupport.  \n  \n  \n  \n  \nThis issue follows an incomplete fix of CVE-2025-0726. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T00:20:07.000000Z"}, {"uuid": "b8eea917-0539-4227-99df-c0efb82d2f41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/cibsecurity/82363", "content": "\ud83d\udd8b\ufe0f Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution \ud83d\udd8b\ufe0f\n\nA critical security flaw has been disclosed in the Cacti opensource network monitoring and fault management framework that could allow an authenticated attacker to achieve remote code execution on susceptible instances. The flaw, tracked as CVE202522604, carries a CVSS score of 9.1 out of a maximum of 10.0. \"Due to a flaw in the multiline SNMP result parser, authenticated users can inject.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-01-29T14:31:19.000000Z"}, {"uuid": "3f8dd80b-1ee2-4d03-a489-3abc40adb7d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "Telegram/GNrdmoXGCQ375jwLJrUoj89-c5tJbyGJMa5WfNNrhtSu7UI", "content": "", "creation_timestamp": "2025-01-29T13:03:30.000000Z"}, {"uuid": "8697a78e-3c2d-4be0-b7da-32dd7a56eb39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/CyberBulletin/2202", "content": "\u26a1Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2025-01-29T13:14:35.000000Z"}, {"uuid": "b29f3fa3-8a79-4c2d-adab-792d3e34c4d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/7698", "content": "Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution \u2013 thehackernews.com\n\nWed, 29 Jan 2025 18:21:00", "creation_timestamp": "2025-01-29T13:03:33.000000Z"}, {"uuid": "33a7f600-9c34-4a28-98f8-97a74aba3b37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/1533", "content": "Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution \u2013 thehackernews.com\n\nWed, 29 Jan 2025 18:21:00", "creation_timestamp": "2025-01-29T13:03:33.000000Z"}, {"uuid": "9faeb18a-86e5-4581-8e2d-95d680c3571e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "published-proof-of-concept", "source": "Telegram/SnpHxs1XXk4J-T3I2AOALLhhy8S2AglcplsaWCEEBmhevQ", "content": "", "creation_timestamp": "2025-01-29T12:11:37.000000Z"}, {"uuid": "cfc5c95b-aac0-461a-9a2e-cdec1923e3ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "published-proof-of-concept", "source": "Telegram/F9apoNc9UTyyUETLpOlEKbLM2DdTcoCrk7Z65IbUMlEhyVQ", "content": "", "creation_timestamp": "2025-01-30T04:26:38.000000Z"}, {"uuid": "5034de04-cceb-4394-ad60-f6e832573ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/ctinow/230054", "content": "Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution\nhttps://ift.tt/LYvoCMZ", "creation_timestamp": "2025-01-29T11:54:16.000000Z"}, {"uuid": "660d70b4-3e04-46b0-be68-9df2be4ae171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2260", "type": "published-proof-of-concept", "source": "Telegram/9YoJkce8ZLrbJOFjVGYj1Vi2UBwBRdx3KAe6xADJGY12VGo", "content": "", "creation_timestamp": "2025-04-06T22:30:35.000000Z"}, {"uuid": "79cf419b-11a8-4172-967c-c7a913bfe816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2509", "content": "CVE-2025-22604 \n(CVSS 9.1)\nRemote Code Execution Flaw in Cacti\n*\nPOC", "creation_timestamp": "2025-02-07T16:14:13.000000Z"}, {"uuid": "1b3dc912-5b98-43f4-8fe4-190ab68eaa80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/true_secator/6679", "content": "\u0412 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0441\u0435\u0442\u0438 \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u0438\u0441\u043f\u0440\u0430\u0432\u043d\u043e\u0441\u0442\u044f\u043c\u0438 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c Cacti \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u0430\u0445.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2025-22604 \u0438 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,1 \u0438\u0437 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0445 10,0, \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0447\u0430\u0441\u0442\u043d\u044b\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u043f\u043e\u0434 \u0441\u0435\u0442\u0435\u0432\u044b\u043c \u043f\u0441\u0435\u0432\u0434\u043e\u043d\u0438\u043c\u043e\u043c u32i.\n\n\u041e\u043d\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043c\u043d\u043e\u0433\u043e\u0441\u0442\u0440\u043e\u0447\u043d\u044b\u043c \u0430\u043d\u0430\u043b\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u043c \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u043e\u0432 SNMP \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c \u0432 \u043e\u0442\u0432\u0435\u0442 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u0435 OID.\n\n\u041f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e ss_net_snmp_disk_io() \u0438\u043b\u0438 ss_net_snmp_disk_bytes() \u0447\u0430\u0441\u0442\u044c \u043a\u0430\u0436\u0434\u043e\u0433\u043e OID \u0431\u0443\u0434\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043a\u043b\u044e\u0447\u0430 \u0432 \u043c\u0430\u0441\u0441\u0438\u0432\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0447\u0430\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0443\u043a\u0440\u0430\u0441\u0442\u044c, \u043e\u0442\u0440\u0435\u0434\u0430\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435.\n\nCVE-2025-22604 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 1.2.28 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 1.2.29. \n\n\u0412 \u043d\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 CVE-2025-24367\u00a0(CVSS: 7,2), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 PHP-\u0441\u043a\u0440\u0438\u043f\u0442\u044b \u0432 \u043a\u043e\u0440\u043d\u0435\u0432\u043e\u043c \u0432\u0435\u0431-\u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f, \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u044f \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0433\u0440\u0430\u0444\u043e\u0432 \u0438 \u0448\u0430\u0431\u043b\u043e\u043d\u043e\u0432 \u0433\u0440\u0430\u0444\u043e\u0432, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a RCE.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u0435\u0447\u0430\u043b\u044c\u043d\u044b\u0439 \u043e\u043f\u044b\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Cacti, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u043c \u044d\u0442\u043e \u041f\u041e \u0434\u043b\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0441\u0435\u0442\u0438, \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043d\u0430\u043a\u0430\u0442\u0438\u0442\u044c \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0447\u0442\u043e\u0431\u044b \u0441\u043d\u0438\u0437\u0438\u0442\u044c \u0440\u0438\u0441\u043a \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438.", "creation_timestamp": "2025-01-30T18:04:04.000000Z"}, {"uuid": "b75f417c-3b2b-4bc5-a128-0d35dc2feff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/thehackernews/6250", "content": "\u26a0\ufe0f A critical flaw (CVE-2025-22604) in Cacti could lead to remote code execution. If exploited, authenticated attackers could steal or manipulate sensitive data.\n\nPatch to version 1.2.29 to fix this flaw and protect your systems.\n\nLearn more: https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html", "creation_timestamp": "2025-01-29T11:27:21.000000Z"}, {"uuid": "7f5f7dc7-9ffb-4d3f-87ee-6ba9c56e795e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22604", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/779", "content": "https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36\n\ncve-2025-22604\n#github #poc", "creation_timestamp": "2025-02-07T16:16:05.000000Z"}, {"uuid": "e7486bb0-46d7-4e9b-b0a1-e401cc52a0f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22609", "type": "seen", "source": "https://t.me/suboxone_chatroom/7370", "content": "CVE-2025-22609, -22611, -22612: Multiple vulnerabilities in Coolify, 10.0 rating \ud83d\udd25\ud83d\udd25\ud83d\udd25\n\nThree vulnerabilities of highest severity in Coolify allow for RCE, privilege escalation, and authentication bypass.\n\nSearch at Netlas.io:\n\ud83d\udc49 Link: https://nt.ls/vUWWf\n\ud83d\udc49 Dork: http.favicon.hash_sha256:eaf648b6000a49599ed58bda49e576d0f981e535a8075d524a4be890edcf96d0 AND uri:*login*\n\nVendor's advisory: https://github.com/coollabsio/coolify/security/advisories/GHSA-3w2c-jfr2-9pg9", "creation_timestamp": "2025-04-01T12:36:06.000000Z"}]}