{"vulnerability": "CVE-2025-2286", "sightings": [{"uuid": "879c732a-367f-4162-8bee-513c77ae2292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22867", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjqsuqwo72a", "content": "", "creation_timestamp": "2025-02-06T18:49:00.073337Z"}, {"uuid": "b2f1f451-a6be-49bc-bf13-8e7c38472503", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22866", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113957993164493622", "content": "", "creation_timestamp": "2025-02-06T16:56:20.183505Z"}, {"uuid": "b9e6ff3e-7271-4907-bbb6-acb907e38944", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22866", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjlnmekyk27", "content": "", "creation_timestamp": "2025-02-06T17:16:30.608755Z"}, {"uuid": "b656167b-a55a-4ad9-9e1b-7cc9943ae604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22865", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgrvbtdafs2r", "content": "", "creation_timestamp": "2025-01-28T07:05:00.501995Z"}, {"uuid": "9cfe0351-e1ab-4861-94c2-11eb02b12d34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22867", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958085535561893", "content": "", "creation_timestamp": "2025-02-06T17:19:49.938125Z"}, {"uuid": "7dd91ff8-40e9-44d2-b512-ff1063c2cb53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22867", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113958587763084191", "content": "", "creation_timestamp": "2025-02-06T19:27:33.507647Z"}, {"uuid": "185881c7-b5b6-4cff-974f-771c9febf6b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22867", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjoz35rgv2x", "content": "", "creation_timestamp": "2025-02-06T18:16:36.939285Z"}, {"uuid": "86ad3dd3-60e0-4705-a8d0-944747d474b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22865", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113903437660870963", "content": "", "creation_timestamp": "2025-01-28T01:42:09.320909Z"}, {"uuid": "35d88cb3-8269-4ff1-b04a-daae17215a0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22865", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgrf5lmtpa2r", "content": "", "creation_timestamp": "2025-01-28T02:16:17.131954Z"}, {"uuid": "9e4bf17e-af60-4c3d-b595-f28ecdd86037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22866", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjqsujz2626", "content": "", "creation_timestamp": "2025-02-06T18:48:58.796070Z"}, {"uuid": "0384b96a-afdf-4c91-a537-58544507fc26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22868", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3ls7cjups2k2f", "content": "", "creation_timestamp": "2025-06-22T14:43:54.404468Z"}, {"uuid": "514e8a77-5d4f-4d07-8730-9890e518ea4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114659899868645807", "content": "", "creation_timestamp": "2025-06-10T16:00:27.230359Z"}, {"uuid": "1809875b-d54f-4e12-a515-3a456894f189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2286", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308189037550499", "content": "", "creation_timestamp": "2025-04-09T13:15:45.598452Z"}, {"uuid": "d4871546-0179-4ee0-b85f-c76afcfac4e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2286", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmd754sapx2q", "content": "", "creation_timestamp": "2025-04-08T19:22:32.272648Z"}, {"uuid": "15267d30-720c-4396-9a88-fd3a6c815378", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://gist.github.com/EbonJaeger/085847d246bc8a2ec125431370f20129", "content": "", "creation_timestamp": "2025-05-02T21:10:10.000000Z"}, {"uuid": "7b2a2f12-fcf0-48fe-822a-2bc151c49eef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2286", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-07", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "ece6c90f-7cf3-4346-b0de-890b9bb3d25c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://gist.github.com/cwayne18/b3bd7aa9ff8e5404f51c85d9125a2747", "content": "", "creation_timestamp": "2025-04-22T18:35:15.000000Z"}, {"uuid": "fc6713f7-10ce-4c4b-ac0e-cc5bea59d2ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://bsky.app/profile/psionicalch.com/post/3lp7pjxndt22n", "content": "", "creation_timestamp": "2025-05-15T14:20:59.924566Z"}, {"uuid": "09903703-ac29-49fa-b66c-530aa4d4e650", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22868", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lwuceumgxc2n", "content": "", "creation_timestamp": "2025-08-20T20:47:46.597468Z"}, {"uuid": "080b7be2-6c0f-411b-9736-29da822e15f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lwbhmhcjkb25", "content": "", "creation_timestamp": "2025-08-13T09:00:53.617334Z"}, {"uuid": "c4c9e0fe-cb8e-494a-9850-ccaaa80009ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lwuceumgxc2n", "content": "", "creation_timestamp": "2025-08-20T20:47:46.727182Z"}, {"uuid": "7f65c5a9-cb6b-471e-8b9d-77f80667b6bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22863", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lx25umcos22t", "content": "", "creation_timestamp": "2025-08-23T04:43:06.446148Z"}, {"uuid": "238ca088-16a6-4282-9cdb-2f72fea38dc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22861", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lx265cvfmv2a", "content": "", "creation_timestamp": "2025-08-23T04:47:55.175500Z"}, {"uuid": "a83fb6d6-ae96-40fe-b1c8-d505788d4948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22864", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lx26c7bdbl2t", "content": "", "creation_timestamp": "2025-08-23T04:50:39.802771Z"}, {"uuid": "a886b2af-f320-4f3b-b890-39f8d66161c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22860", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lx273wtvr62p", "content": "", "creation_timestamp": "2025-08-23T05:05:06.824960Z"}, {"uuid": "13dfbdee-05c5-4cf2-815d-0e9feecf13d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://gist.github.com/sebrandon1/758455dc1ea03ac2d7e445037c445895", "content": "", "creation_timestamp": "2026-02-04T22:01:28.000000Z"}, {"uuid": "5e3351d7-9154-4a36-bf50-cb5bf4926010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22865", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:02.000000Z"}, {"uuid": "966d767b-bdc1-44e2-b83e-980d06c55ee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "43671eb7-23e7-47d6-b8f0-5f0dc06389bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://gist.github.com/sebrandon1/c199b003a46d397532dfba6a35744bd3", "content": "", "creation_timestamp": "2026-02-05T16:21:21.000000Z"}, {"uuid": "5a4343b9-bd37-4953-953f-abbd7271831e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22866", "type": "seen", "source": "https://t.me/cvedetector/17408", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22866 - Cisco Systems Elliptic Curve Key Leak Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22866 \nPublished : Feb. 6, 2025, 5:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:15:04.000000Z"}, {"uuid": "3dc6da3d-2e9d-4956-8ec9-beaecc912374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-22868", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "a891d05d-06cd-4b78-a7dc-354470050258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22868", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5438", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22868\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.\n\ud83d\udccf Published: 2025-02-26T03:07:49.012Z\n\ud83d\udccf Modified: 2025-02-26T03:07:49.012Z\n\ud83d\udd17 References:\n1. https://go.dev/cl/652155\n2. https://go.dev/issue/71490\n3. https://pkg.go.dev/vuln/GO-2025-3488", "creation_timestamp": "2025-02-26T03:24:37.000000Z"}, {"uuid": "04ac72e5-a2ad-46bc-badd-cc8f4abf48fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22867", "type": "seen", "source": "https://t.me/cvedetector/17399", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22867 - Apple ld Arbritary Code Execution in Darwin Go Module\", \n  \"Content\": \"CVE ID : CVE-2025-22867 \nPublished : Feb. 6, 2025, 6:15 p.m. | 25\u00a0minutes ago \nDescription : On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the @executable_path, @loader_path, or @rpath special values in a \"#cgo LDFLAGS\" directive. This issue only affected go1.24rc2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:14:51.000000Z"}, {"uuid": "d3e9c26f-8367-44e1-9d99-a3e03dc7daca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22865", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3214", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22865\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.\n\ud83d\udccf Published: 2025-01-28T03:31:14Z\n\ud83d\udccf Modified: 2025-01-28T03:31:14Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-22865\n2. https://go.dev/cl/643098\n3. https://go.dev/issue/71216\n4. https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ\n5. https://pkg.go.dev/vuln/GO-2025-3421", "creation_timestamp": "2025-01-28T04:09:12.000000Z"}, {"uuid": "8e75077d-b6df-45d2-9d23-b843f11f951e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22866", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4941", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22866\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.\n\ud83d\udccf Published: 2025-02-06T16:54:10.252Z\n\ud83d\udccf Modified: 2025-02-21T18:03:36.215Z\n\ud83d\udd17 References:\n1. https://go.dev/cl/643735\n2. https://go.dev/issue/71383\n3. https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k\n4. https://pkg.go.dev/vuln/GO-2025-3447", "creation_timestamp": "2025-02-21T18:18:55.000000Z"}, {"uuid": "402f1bf9-527e-452d-b434-26b3b0ea3bd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5439", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22869\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.\n\ud83d\udccf Published: 2025-02-26T03:07:48.855Z\n\ud83d\udccf Modified: 2025-02-26T03:07:48.855Z\n\ud83d\udd17 References:\n1. https://go.dev/cl/652135\n2. https://go.dev/issue/71931\n3. https://pkg.go.dev/vuln/GO-2025-3487", "creation_timestamp": "2025-02-26T03:24:38.000000Z"}, {"uuid": "867811a9-5db7-4fe3-90aa-e376233638fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2286", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10931", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2286\n\ud83d\udd25 CVSS Score: 8.5 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae \u00a0due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.\n\ud83d\udccf Published: 2025-04-08T15:16:00.777Z\n\ud83d\udccf Modified: 2025-04-08T15:36:43.255Z\n\ud83d\udd17 References:\n1. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", "creation_timestamp": "2025-04-08T15:47:04.000000Z"}, {"uuid": "ca9faad3-08d3-4d56-9ee7-14fe3d81d710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22869", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11499", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22869\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.\n\ud83d\udccf Published: 2025-02-26T03:07:48.855Z\n\ud83d\udccf Modified: 2025-04-11T22:03:24.222Z\n\ud83d\udd17 References:\n1. https://go.dev/cl/652135\n2. https://go.dev/issue/71931\n3. https://pkg.go.dev/vuln/GO-2025-3487", "creation_timestamp": "2025-04-11T22:51:28.000000Z"}, {"uuid": "2b83fb57-78ed-4e31-a899-7d063ac0b0f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22865", "type": "seen", "source": "https://t.me/cvedetector/16560", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22865 - Go parse private key vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22865 \nPublished : Jan. 28, 2025, 2:15 a.m. | 53\u00a0minutes ago \nDescription : Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T04:34:36.000000Z"}]}