{"vulnerability": "CVE-2025-2305", "sightings": [{"uuid": "cacc0536-f624-4031-bca2-c9ece5d397ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23051", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfsqa57deo2n", "content": "", "creation_timestamp": "2025-01-15T21:42:01.677891Z"}, {"uuid": "4d48b429-ec80-4a6f-bddf-40c808abcbe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23052", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfsqa57deo2n", "content": "", "creation_timestamp": "2025-01-15T21:42:01.717133Z"}, {"uuid": "5f95e43e-7f60-4608-8573-37e5f298e6fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23052", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpupa7qgc2n", "content": "", "creation_timestamp": "2025-01-14T18:24:03.849576Z"}, {"uuid": "a64115e9-c7b3-408e-8ba4-4fa074a2d093", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23051", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpup3vcli2j", "content": "", "creation_timestamp": "2025-01-14T18:23:59.349293Z"}, {"uuid": "aeaf680f-27e0-4b3e-b114-aa8c62f4b0f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23051", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lfxsjyjnk22q", "content": "", "creation_timestamp": "2025-01-17T22:06:46.967000Z"}, {"uuid": "dfe79f04-af55-4db3-899c-d122de01d2e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23059", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113946972007533404", "content": "", "creation_timestamp": "2025-02-04T18:13:30.760678Z"}, {"uuid": "5bfe5c36-bb02-43c4-81e3-cd1b40af55f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23053", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgt2rt5qku2t", "content": "", "creation_timestamp": "2025-01-28T18:16:04.432248Z"}, {"uuid": "63b46742-2bfa-405b-9a51-baed9b00b530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23054", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgt2rxgvag2i", "content": "", "creation_timestamp": "2025-01-28T18:16:08.649180Z"}, {"uuid": "acd33a2f-8f2e-43af-8c22-a621c4f9fe11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23058", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lheo22ncqw2p", "content": "", "creation_timestamp": "2025-02-04T18:15:57.010076Z"}, {"uuid": "255f77fd-268f-4542-90cc-855a50e28d33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23055", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgt2s25lv22f", "content": "", "creation_timestamp": "2025-01-28T18:16:11.739690Z"}, {"uuid": "265a35e9-a45b-4d98-a3d8-5bec2d205791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23059", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lheo253c5e2f", "content": "", "creation_timestamp": "2025-02-04T18:16:00.047539Z"}, {"uuid": "dd13b095-0fb5-4f96-9732-d870f79a6e83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23056", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgt2s4ioz32t", "content": "", "creation_timestamp": "2025-01-28T18:16:13.875779Z"}, {"uuid": "e4041f71-7f71-4dd3-a7db-310259cf8f59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23057", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgt2s7n2ai2j", "content": "", "creation_timestamp": "2025-01-28T18:16:17.389516Z"}, {"uuid": "3b9c4bb8-c8a9-48b3-afcd-3051802d6e3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23053", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgt5rjqsvf25", "content": "", "creation_timestamp": "2025-01-28T19:09:37.968477Z"}, {"uuid": "65072351-1346-4a8e-97a6-35534f0a27cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23058", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113947109508838804", "content": "", "creation_timestamp": "2025-02-04T18:48:31.422753Z"}, {"uuid": "74c41727-3c6b-4297-90d4-df0e5ba9e898", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23054", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgt5rjya7525", "content": "", "creation_timestamp": "2025-01-28T19:09:39.202796Z"}, {"uuid": "d664136f-baf2-42a1-93e2-2ab39690f91b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23058", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhf2r3xsct2f", "content": "", "creation_timestamp": "2025-02-04T22:03:35.298716Z"}, {"uuid": "17a82480-4843-4440-a16f-8e63d072a2b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23057", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907118853381345", "content": "", "creation_timestamp": "2025-01-28T17:18:19.891318Z"}, {"uuid": "671bf91a-a306-4be1-ae11-6c9625e20a1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23055", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907118821078070", "content": "", "creation_timestamp": "2025-01-28T17:18:19.391554Z"}, {"uuid": "d5883e62-1598-409f-be2d-9c5a674034f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23054", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907118805634233", "content": "", "creation_timestamp": "2025-01-28T17:18:19.134279Z"}, {"uuid": "33678b2a-3202-4ee7-81bb-3858f102e0c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2305", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114517641793408821", "content": "", "creation_timestamp": "2025-05-16T13:02:22.156190Z"}, {"uuid": "59f31409-895c-440e-b99c-c142f51d6e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23056", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907118839166374", "content": "", "creation_timestamp": "2025-01-28T17:18:19.506338Z"}, {"uuid": "966531b4-17ca-4b09-949d-5eaa7b26175f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23058", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113946971990830169", "content": "", "creation_timestamp": "2025-02-04T18:13:30.487861Z"}, {"uuid": "a9d2c94b-6dd0-45da-b4c6-1760924f3764", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-2305", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lpc3x6jg2h27", "content": "", "creation_timestamp": "2025-05-16T13:08:27.010194Z"}, {"uuid": "433bf419-0834-4740-a34b-3b3e7cba2a01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23051", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1556", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23051\n\ud83d\udd39 Description: An authenticated parameter injection vulnerability exists\u00a0in the web-based management interface of the AOS-8 and AOS-10\u00a0Operating Systems. Successful exploitation could allow an\u00a0authenticated user to leverage parameter injection to overwrite\u00a0arbitrary system files.\n\ud83d\udccf Published: 2025-01-14T17:35:25.108Z\n\ud83d\udccf Modified: 2025-01-14T17:37:04.074Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04723en_us&amp;docLocale=en_US", "creation_timestamp": "2025-01-14T18:10:01.000000Z"}, {"uuid": "87c66d2c-1d7a-4f36-a480-f6cef991ca56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2305", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpcaw5kab62l", "content": "", "creation_timestamp": "2025-05-16T14:37:20.987821Z"}, {"uuid": "567bd3e8-55ab-4fdf-aefa-9ec39cc7f20f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23050", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4hkmi3pqk2q", "content": "", "creation_timestamp": "2025-10-31T03:41:43.658899Z"}, {"uuid": "77a98976-5c35-403a-bdc2-59d4f5f6a4ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23052", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1552", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23052\n\ud83d\udd39 Description: Authenticated command injection vulnerability in the command\u00a0line interface of a network management service. Successful\u00a0exploitation of this vulnerability could allow an attacker to execute\u00a0arbitrary commands as a privileged user on the underlying\u00a0operating system.\n\ud83d\udccf Published: 2025-01-14T17:38:43.844Z\n\ud83d\udccf Modified: 2025-01-14T17:38:43.844Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04723en_us&amp;docLocale=en_US", "creation_timestamp": "2025-01-14T18:09:43.000000Z"}, {"uuid": "a9ac5838-35bc-41ce-88ab-5c6bbf39ee26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23055", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7407", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23055\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.\n\ud83d\udccf Published: 2025-01-28T17:11:38.749Z\n\ud83d\udccf Modified: 2025-03-13T13:39:21.174Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04775en_us&amp;docLocale=en_US", "creation_timestamp": "2025-03-13T13:44:48.000000Z"}, {"uuid": "1cae37ab-9eae-43b5-aa8c-71b293de8219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23057", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3265", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23057\n\ud83d\udd25 CVSS Score: 4.5 (CVSS_V3)\n\ud83d\udd39 Description: A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.\n\ud83d\udccf Published: 2025-01-28T18:31:29Z\n\ud83d\udccf Modified: 2025-01-28T18:31:29Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-23057\n2. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04775en_us&amp;docLocale=en_US", "creation_timestamp": "2025-01-28T19:09:06.000000Z"}, {"uuid": "8e1a63db-e945-4c6b-a145-aebf6854f33a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23056", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3269", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23056\n\ud83d\udd25 CVSS Score: 4.5 (CVSS_V3)\n\ud83d\udd39 Description: A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.\n\ud83d\udccf Published: 2025-01-28T18:31:28Z\n\ud83d\udccf Modified: 2025-01-28T18:31:28Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-23056\n2. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04775en_us&amp;docLocale=en_US", "creation_timestamp": "2025-01-28T19:09:09.000000Z"}, {"uuid": "e14f142c-aefc-4586-bacb-6e91e397144d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2305", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16678", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2305\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: A Path traversal vulnerability in the file\ndownload functionality was identified. This vulnerability allows\nunauthenticated users to download arbitrary files, in the context of the\napplication server, from the Linux server.\n\ud83d\udccf Published: 2025-05-16T12:09:41.347Z\n\ud83d\udccf Modified: 2025-05-16T12:09:41.347Z\n\ud83d\udd17 References:\n1. https://www.cirosec.de/sa/sa-2025-003", "creation_timestamp": "2025-05-16T12:34:21.000000Z"}, {"uuid": "a5b69b2c-d1b8-4dba-ba37-0f7f9b27f17e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23056", "type": "seen", "source": "https://t.me/cvedetector/16623", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23056 - HPE Aruba Networking Fabric Composer Stored Cross-Site Scripting (XSS) Voyager\", \n  \"Content\": \"CVE ID : CVE-2025-23056 \nPublished : Jan. 28, 2025, 6:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T21:17:51.000000Z"}, {"uuid": "9eb56745-d511-4b6e-9027-2e5e09308acb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23054", "type": "seen", "source": "https://t.me/cvedetector/16621", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23054 - HPE Aruba Networking Fabric Composer Privilege Escalation vulnerability.\", \n  \"Content\": \"CVE ID : CVE-2025-23054 \nPublished : Jan. 28, 2025, 6:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an authenticated low privilege operator user to perform operations not allowed by their privilege level. Successful exploitation could allow an attacker to manipulate user generated files, potentially leading to unauthorized changes in critical system configurations. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T21:17:49.000000Z"}, {"uuid": "95596622-ecdc-43b4-a258-e781a017725f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23053", "type": "seen", "source": "https://t.me/cvedetector/16625", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23053 - HPE Aruba Networking Fabric Composer Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-23053 \nPublished : Jan. 28, 2025, 6:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : A privilege escalation vulnerability exists in the web-based management interface of HPE Aruba Networking Fabric Composer. Successful exploitation could allow an authenticated low privilege operator user to change the state of certain settings of a vulnerable system. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T21:17:55.000000Z"}, {"uuid": "7f89e3dd-3ec5-4444-bfdc-e957ed74e021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23055", "type": "seen", "source": "https://t.me/cvedetector/16622", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23055 - HPE Aruba Networking Fabric Composer Cross-Site Scripting Vuln\", \n  \"Content\": \"CVE ID : CVE-2025-23055 \nPublished : Jan. 28, 2025, 6:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T21:17:50.000000Z"}, {"uuid": "abce7026-cf20-4fe1-8a42-639fb6dec643", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23052", "type": "seen", "source": "https://t.me/cvedetector/15317", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23052 - Cisco Network Management Service Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23052 \nPublished : Jan. 14, 2025, 6:16 p.m. | 26\u00a0minutes ago \nDescription : Authenticated command injection vulnerability in the command\u00a0line interface of a network management service. Successful\u00a0exploitation of this vulnerability could allow an attacker to execute\u00a0arbitrary commands as a privileged user on the underlying\u00a0operating system. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T19:51:36.000000Z"}, {"uuid": "469fbe4d-2591-42b9-bd5f-ebf8d1eab036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23057", "type": "seen", "source": "https://t.me/cvedetector/16624", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23057 - HPE Aruba Networking Fabric Composer Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23057 \nPublished : Jan. 28, 2025, 6:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T21:17:52.000000Z"}, {"uuid": "b0bc2279-b581-4f50-b796-9d7bebd8c9a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23051", "type": "seen", "source": "https://t.me/cvedetector/15316", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23051 - Cisco AOS-8 and AOS-10 Parameter Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23051 \nPublished : Jan. 14, 2025, 6:16 p.m. | 26\u00a0minutes ago \nDescription : An authenticated parameter injection vulnerability exists\u00a0in the web-based management interface of the AOS-8 and AOS-10\u00a0Operating Systems. Successful exploitation could allow an\u00a0authenticated user to leverage parameter injection to overwrite\u00a0arbitrary system files. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T19:51:35.000000Z"}, {"uuid": "7c0299e8-0ba6-4176-99e0-f57bce93c46b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23058", "type": "seen", "source": "https://t.me/cvedetector/17224", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23058 - Aruba ClearPass Policy Manager Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23058 \nPublished : Feb. 4, 2025, 6:15 p.m. | 57\u00a0minutes ago \nDescription : A vulnerability in the ClearPass Policy Manager web-based management interface allows a low-privileged (read-only) authenticated remote attacker to gain unauthorized access to data and the ability to execute functions that should be restricted to administrators only with read/write privileges. Successful exploitation could enable a low-privileged user to execute administrative functions leading to an escalation of privileges. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T20:35:01.000000Z"}, {"uuid": "82789116-e702-4734-be6a-e649df52eee1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23059", "type": "seen", "source": "https://t.me/cvedetector/17223", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23059 - HPE Aruba Networking ClearPass Policy Manager Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23059 \nPublished : Feb. 4, 2025, 6:15 p.m. | 57\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of HPE Aruba Networking ClearPass Policy Manager exposes directories containing sensitive information. If exploited successfully, this vulnerability allows an authenticated remote attacker with high privileges to access and retrieve sensitive data, potentially compromising the integrity and security of the entire system. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T20:35:00.000000Z"}]}