{"vulnerability": "CVE-2025-2288", "sightings": [{"uuid": "ee444542-45d3-4f93-bdfa-cd53aba2ef65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22880", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113961429154590452", "content": "", "creation_timestamp": "2025-02-07T07:30:09.531521Z"}, {"uuid": "f280f055-9bc9-42dd-ac9d-1a4b66580eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22880", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhl5vol2iw2t", "content": "", "creation_timestamp": "2025-02-07T08:15:48.905941Z"}, {"uuid": "e7e2370c-dda8-4115-8d3a-370b464e6896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22880", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhl7zetuz42o", "content": "", "creation_timestamp": "2025-02-07T08:53:40.754569Z"}, {"uuid": "798e5658-48f2-45c8-8ece-b671f3f1eaad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22881", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-06", "content": "", "creation_timestamp": "2025-03-04T11:00:00.000000Z"}, {"uuid": "1a28d26f-93e5-430a-bed3-30ed5982582e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22881", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114070430747766302", "content": "", "creation_timestamp": "2025-02-26T13:30:41.621970Z"}, {"uuid": "6034b75a-a401-4e6b-a1dc-2083c816285c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22880", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-098/", "content": "", "creation_timestamp": "2025-02-25T05:00:00.000000Z"}, {"uuid": "e263fec2-dedf-489d-919f-22946eeeb54c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22882", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-119-02", "content": "", "creation_timestamp": "2025-04-29T10:00:00.000000Z"}, {"uuid": "883bd77e-943b-4697-b3e2-e09fbd0372f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22888", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lij4sshhe62y", "content": "", "creation_timestamp": "2025-02-19T06:16:10.375991Z"}, {"uuid": "3b734611-a982-4fd9-9977-30157a9eb444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22888", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lijcz4sclg2v", "content": "", "creation_timestamp": "2025-02-19T08:07:05.581994Z"}, {"uuid": "a09c0b54-10ad-4651-9cc1-8e76f95cb682", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2288", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308189037550499", "content": "", "creation_timestamp": "2025-04-09T13:15:45.728877Z"}, {"uuid": "44319ebc-c463-40e9-8b14-86b1cd4483c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2288", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-07", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "06233a0a-dcd8-45e9-b2a3-deb816009599", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2288", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmd7553pag2i", "content": "", "creation_timestamp": "2025-04-08T19:22:32.930224Z"}, {"uuid": "4d291af6-200c-42b5-8aed-9328b258585c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22883", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-119-02", "content": "", "creation_timestamp": "2025-04-29T10:00:00.000000Z"}, {"uuid": "5c9e89de-0e27-4b90-9fac-3ed540d7840f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22884", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-119-02", "content": "", "creation_timestamp": "2025-04-29T10:00:00.000000Z"}, {"uuid": "cbf81f61-8ef0-41fb-bbe3-4a1de10b9e46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22882", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnzjxxmqoc2t", "content": "", "creation_timestamp": "2025-04-30T10:00:17.727426Z"}, {"uuid": "4efa187a-079f-40a1-8345-dcd2e119d557", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22884", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnzjxxq5xy2n", "content": "", "creation_timestamp": "2025-04-30T10:00:18.280853Z"}, {"uuid": "2725ea99-c808-40f4-b772-f5f00167b564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22883", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnzjxxtiu524", "content": "", "creation_timestamp": "2025-04-30T10:00:18.796653Z"}, {"uuid": "a785166c-f261-4dc1-b9bd-92cfcfb89da6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22882", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lnzkgo6lyh2x", "content": "", "creation_timestamp": "2025-04-30T10:08:29.984322Z"}, {"uuid": "dacad6a7-73fc-4fd7-a89a-eceaa788b3ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22886", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loinx5ziqd24", "content": "", "creation_timestamp": "2025-05-06T10:21:24.299842Z"}, {"uuid": "7977dd74-8f1c-495b-9952-84de41eeaaee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22882", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3logzpwphss2d", "content": "", "creation_timestamp": "2025-05-05T18:46:43.314995Z"}, {"uuid": "63bbf333-a4e2-4641-bb0d-dfcfe68ef273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22883", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3logzpwphss2d", "content": "", "creation_timestamp": "2025-05-05T18:46:43.404185Z"}, {"uuid": "1bc25d5f-0bb4-4c47-a230-511d19e99e5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22884", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3logzpwphss2d", "content": "", "creation_timestamp": "2025-05-05T18:46:43.493652Z"}, {"uuid": "59824354-a7fc-41a2-9178-6e0dfecff5cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22888", "type": "seen", "source": "https://t.me/cvedetector/18411", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22888 - Movable Type Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22888 \nPublished : Feb. 19, 2025, 6:15 a.m. | 2\u00a0hours ago \nDescription : Movable Type contains a stored cross-site scripting vulnerability in the custom block edit page of MT Block Editor. If exploited, an arbitrary script may be executed on a logged-in user's web browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T09:32:42.000000Z"}, {"uuid": "27fd80ff-bb54-40a1-a1c0-d582c07c3bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22881", "type": "seen", "source": "MISP/24306fae-b16b-4478-9297-d2973cdb583c", "content": "", "creation_timestamp": "2025-08-22T14:52:23.000000Z"}, {"uuid": "5714c0ce-335b-4e41-9446-efafdb89b570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22886", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15076", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22886\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.\n\ud83d\udccf Published: 2025-05-06T09:03:16.384Z\n\ud83d\udccf Modified: 2025-05-06T09:03:16.384Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md", "creation_timestamp": "2025-05-06T09:21:17.000000Z"}, {"uuid": "edb3a2f8-0d47-43a7-9da6-1843ecf9c5fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22880", "type": "seen", "source": "https://t.me/cvedetector/17467", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22880 - Delta Electronics CNCSoft-G2 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-22880 \nPublished : Feb. 7, 2025, 8:15 a.m. | 50\u00a0minutes ago \nDescription : Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T10:28:18.000000Z"}, {"uuid": "2a6019e9-87aa-4340-b84f-b9a539748be1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22880", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3791", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22880\n\ud83d\udd25 CVSS Score: 7.7 (CVSS_V3)\n\ud83d\udd39 Description: Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.\n\ud83d\udccf Published: 2025-02-07T09:31:51Z\n\ud83d\udccf Modified: 2025-02-07T09:31:51Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-22880\n2. https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00002_CNCSoft-G2%20-%20Heap-based%20Buffer%20Overflow_v1.pdf", "creation_timestamp": "2025-02-07T10:02:38.000000Z"}, {"uuid": "d94677f1-0b38-4496-b4ef-8249185360e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22883", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13989", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22883\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Delta Electronics ISPSoft version 3.20 is vulnerable to an\u00a0Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file.\n\ud83d\udccf Published: 2025-04-30T07:36:13.595Z\n\ud83d\udccf Modified: 2025-04-30T07:36:13.595Z\n\ud83d\udd17 References:\n1. https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00004_ISPSoft%20-%20Multiple%20Vulnerabilities_v1.pdf", "creation_timestamp": "2025-04-30T08:13:33.000000Z"}, {"uuid": "e08097b1-055e-4494-9351-aee05e2263e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22884", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13988", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22884\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file.\n\ud83d\udccf Published: 2025-04-30T07:37:08.747Z\n\ud83d\udccf Modified: 2025-04-30T07:37:08.747Z\n\ud83d\udd17 References:\n1. https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00004_ISPSoft%20-%20Multiple%20Vulnerabilities_v1.pdf", "creation_timestamp": "2025-04-30T08:13:32.000000Z"}, {"uuid": "6425d938-d9b1-4280-925f-7d78e39ba0a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22882", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13987", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22882\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to leverage debugging logic to execute arbitrary code when parsing CBDGL file.\n\ud83d\udccf Published: 2025-04-30T07:34:43.503Z\n\ud83d\udccf Modified: 2025-04-30T07:38:10.683Z\n\ud83d\udd17 References:\n1. https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00004_ISPSoft%20-%20Multiple%20Vulnerabilities_v1.pdf", "creation_timestamp": "2025-04-30T08:13:32.000000Z"}, {"uuid": "e3cdcaed-9718-42d5-b023-fc23dfc55c35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2288", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10999", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2288\n\ud83d\udd25 CVSS Score: 8.5 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.\n\ud83d\udccf Published: 2025-04-08T15:19:30.666Z\n\ud83d\udccf Modified: 2025-04-08T20:38:07.069Z\n\ud83d\udd17 References:\n1. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", "creation_timestamp": "2025-04-08T20:46:41.000000Z"}, {"uuid": "604026ed-10bb-4ad7-bba2-51f37ac07939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22886", "type": "seen", "source": "https://t.me/cvedetector/24577", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22886 - Apache OpenHarmony Memory Leak Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-22886 \nPublished : May 6, 2025, 9:15 a.m. | 44\u00a0minutes ago \nDescription : in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T12:48:29.000000Z"}, {"uuid": "0c03f4f0-203e-4c98-8d0c-f42d04151973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22884", "type": "seen", "source": "https://t.me/cvedetector/24078", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22884 - Delta Electronics ISPSoft Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22884 \nPublished : April 30, 2025, 8:15 a.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T12:03:39.000000Z"}, {"uuid": "4c2aba2e-bddd-462c-95c4-5507e14ad3dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22882", "type": "seen", "source": "https://t.me/cvedetector/24076", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22882 - Delta Electronics ISPSoft Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-22882 \nPublished : April 30, 2025, 8:15 a.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to leverage debugging logic to execute arbitrary code when parsing CBDGL file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T12:03:35.000000Z"}, {"uuid": "22c3cfde-e66b-469d-a93e-a05fc2b9c1c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22883", "type": "seen", "source": "https://t.me/cvedetector/24077", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22883 - Delta Electronics ISPSoft Out-Of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22883 \nPublished : April 30, 2025, 8:15 a.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : Delta Electronics ISPSoft version 3.20 is vulnerable to an\u00a0Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T12:03:36.000000Z"}, {"uuid": "7c34347c-e5b9-4d19-ae2b-d5a250e4d184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22880", "type": "published-proof-of-concept", "source": "Telegram/PMp4cXlzctbD3IUJupidsmMstHAB33KEUo1iL--F-w7GLnQ", "content": "", "creation_timestamp": "2025-02-07T09:30:28.000000Z"}, {"uuid": "31296e52-9672-4c90-a58b-15f4507bb355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22881", "type": "seen", "source": "Telegram/nyhJM3x0BF1MBViHSEL39x1x0zzmNU1906LzvU_77y6grbI", "content": "", "creation_timestamp": "2025-02-26T05:00:32.000000Z"}, {"uuid": "5ed3f67b-352c-4966-a627-8ebc4deae69e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22884", "type": "seen", "source": "Telegram/I8p__bHoD33L3m9WZX2rlXrmklKzEOZL06u02zqI4YW7P0M", "content": "", "creation_timestamp": "2025-04-30T10:31:04.000000Z"}, {"uuid": "a5a23ed6-334e-4cf0-8516-6c2d9b544975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22883", "type": "seen", "source": "Telegram/I8p__bHoD33L3m9WZX2rlXrmklKzEOZL06u02zqI4YW7P0M", "content": "", "creation_timestamp": "2025-04-30T10:31:04.000000Z"}, {"uuid": "5d72bcb4-d6c2-44b7-8e26-3c124e7bac05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22882", "type": "seen", "source": "Telegram/I8p__bHoD33L3m9WZX2rlXrmklKzEOZL06u02zqI4YW7P0M", "content": "", "creation_timestamp": "2025-04-30T10:31:04.000000Z"}]}