{"vulnerability": "CVE-2025-2324", "sightings": [{"uuid": "a65749bf-22de-4277-8d48-2c183d783264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23243", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lkmz3uldyq2j", "content": "", "creation_timestamp": "2025-03-18T06:10:41.881843Z"}, {"uuid": "c06eedfb-74c8-4b24-88e9-5c2d82b36dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23242", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-145/", "content": "", "creation_timestamp": "2025-03-13T04:00:00.000000Z"}, {"uuid": "aca66df5-0dca-4665-88b6-0188b861e2ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23243", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-144/", "content": "", "creation_timestamp": "2025-03-13T04:00:00.000000Z"}, {"uuid": "f1d331a8-ee82-4652-a25f-b30f66c31227", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23244", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114433137660446340", "content": "", "creation_timestamp": "2025-05-01T14:51:49.872310Z"}, {"uuid": "33ee3b91-8066-4748-9f09-0bf733be0817", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2324", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkqtnc5zj62m", "content": "", "creation_timestamp": "2025-03-19T18:43:47.684549Z"}, {"uuid": "94486092-e96a-41fa-aeac-00418192f69a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23249", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnibs6r66c2q", "content": "", "creation_timestamp": "2025-04-23T13:18:38.510253Z"}, {"uuid": "c8534efb-1999-40b8-a5cd-ab2672910db2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq6ao4uatyn2", "content": "", "creation_timestamp": "2025-05-27T17:47:32.948140Z"}, {"uuid": "ed1fdec0-fc04-4fe0-89c9-c0a802a76fe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23244", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnmbhiqp2k22", "content": "", "creation_timestamp": "2025-04-25T03:23:17.607176Z"}, {"uuid": "ae238686-e590-4a27-956b-5c03d5f2b4c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23245", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnmbhiqp2k22", "content": "", "creation_timestamp": "2025-04-25T03:23:17.693160Z"}, {"uuid": "e6228927-609a-49eb-ae7d-053c09ff3b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23246", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnmbhiqp2k22", "content": "", "creation_timestamp": "2025-04-25T03:23:17.775959Z"}, {"uuid": "6c3f9792-f0cb-4380-acc2-9dfcde5c584e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23242", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lkmz3uldyq2j", "content": "", "creation_timestamp": "2025-03-18T06:10:41.807447Z"}, {"uuid": "f33e0617-10dc-4eaf-8c40-ddd30dfc3273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "seen", "source": "https://infosec.place/objects/02bb63af-de7a-4815-9f9b-43f6f04d73f9", "content": "", "creation_timestamp": "2025-06-02T15:00:05.796175Z"}, {"uuid": "3ad6e7ab-f5a3-4482-b64f-38070d6fbc66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23249", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngewdfpyi24", "content": "", "creation_timestamp": "2025-04-22T19:09:19.695898Z"}, {"uuid": "ea950b44-5ea7-425a-832c-8864b618bc3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lq6nmt2fpx2w", "content": "", "creation_timestamp": "2025-05-27T21:39:19.172326Z"}, {"uuid": "bf75428f-e3a1-426b-9704-f99114092afa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23245", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114433137660446340", "content": "", "creation_timestamp": "2025-05-01T14:51:49.957883Z"}, {"uuid": "78048ba3-3a1d-4941-bee6-938abade092f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23240", "type": "seen", "source": "https://t.me/cvedetector/19446", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23240 - OpenHarmony OOB Write Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-23240 \nPublished : March 4, 2025, 4:15 a.m. | 22\u00a0minutes ago \nDescription : in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T05:47:53.000000Z"}, {"uuid": "d3d57c29-2c1b-4844-a45e-b029d8eadef2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/60308", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1awip for CVE-2025-23247 . ATM just crash PoC which shows we control buffer and offset, so we got aaw \nURL\uff1ahttps://github.com/SpiralBL0CK/CVE-2025-23247\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-20T15:54:56.000000Z"}, {"uuid": "7273d926-ac6b-4b34-9df2-de54aff88dc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "published-proof-of-concept", "source": "Telegram/nY5-0lCVx8RKsRPrkDgSL_kXo8AbHt3usOoKy9LAJ3yK8Xw", "content": "", "creation_timestamp": "2025-11-20T21:00:05.000000Z"}, {"uuid": "35738227-f4b4-429c-9847-1dd18571f9ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23244", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14283", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23244\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an unprivileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.\n\ud83d\udccf Published: 2025-05-01T14:04:45.789Z\n\ud83d\udccf Modified: 2025-05-01T14:04:45.789Z\n\ud83d\udd17 References:\n1. https://nvidia.custhelp.com/app/answers/detail/a_id/5630", "creation_timestamp": "2025-05-01T14:15:19.000000Z"}, {"uuid": "d2706407-c8a0-414b-a31d-a41f374f3db9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23240", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6323", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23240\n\ud83d\udd25 CVSS Score: 3.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.\n\ud83d\udccf Published: 2025-03-04T03:44:46.625Z\n\ud83d\udccf Modified: 2025-03-04T03:44:46.625Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", "creation_timestamp": "2025-03-04T04:34:26.000000Z"}, {"uuid": "c8e0fea0-2fc8-412a-8abd-b5840597d87c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23242", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7244", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23242\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: NVIDIA Riva contains a vulnerability where a user could cause an improper access control issue. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, denial of service, or information disclosure.\n\ud83d\udccf Published: 2025-03-11T19:42:04.385Z\n\ud83d\udccf Modified: 2025-03-11T19:57:44.693Z\n\ud83d\udd17 References:\n1. https://nvidia.custhelp.com/app/answers/detail/a_id/5625", "creation_timestamp": "2025-03-11T20:41:41.000000Z"}, {"uuid": "567719f4-1682-467b-aaf5-fc14c3dc0b1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23243", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7243", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23243\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: NVIDIA Riva contains a vulnerability where a user could cause an improper access control issue. A successful exploit of this vulnerability might lead to data tampering or denial of service.\n\ud83d\udccf Published: 2025-03-11T19:43:23.276Z\n\ud83d\udccf Modified: 2025-03-11T19:59:43.176Z\n\ud83d\udd17 References:\n1. https://nvidia.custhelp.com/app/answers/detail/a_id/5625", "creation_timestamp": "2025-03-11T20:41:40.000000Z"}, {"uuid": "3126880a-cf8a-4b85-a347-2965d743b5a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23246", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14309", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23246\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: NVIDIA vGPU software for Windows and Linux contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows a guest to consume uncontrolled resources. A successful exploit of this vulnerability might lead to denial of service.\n\ud83d\udccf Published: 2025-05-01T14:12:30.765Z\n\ud83d\udccf Modified: 2025-05-01T14:51:28.377Z\n\ud83d\udd17 References:\n1. https://nvidia.custhelp.com/app/answers/detail/a_id/5630", "creation_timestamp": "2025-05-01T15:15:31.000000Z"}, {"uuid": "460b25a7-b1fb-468e-8790-7c5914f1fbca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23249", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13001", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23249\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L)\n\ud83d\udd39 Description: NVIDIA NeMo Framework contains a vulnerability where a user could cause a deserialization of untrusted data by remote code execution. A successful exploit of this vulnerability might lead to code execution and data tampering.\n\ud83d\udccf Published: 2025-04-22T15:30:16.986Z\n\ud83d\udccf Modified: 2025-04-23T03:56:10.153Z\n\ud83d\udd17 References:\n1. https://nvidia.custhelp.com/app/answers/detail/a_id/5641", "creation_timestamp": "2025-04-23T04:03:52.000000Z"}, {"uuid": "6d396726-0b20-4a60-8c05-50f7ac7f8fd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23245", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14297", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23245\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: NVIDIA TensorRT-LLM for any platform contains a vulnerability in python executor where an attacker may cause a data validation issue by local access to the TRTLLM server. A successful exploit of this vulnerability may lead to code execution, information disclosure and data tampering.\n\ud83d\udccf Published: 2025-05-01T13:53:48.765Z\n\ud83d\udccf Modified: 2025-05-01T13:53:48.765Z\n\ud83d\udd17 References:\n1. https://nvidia.custhelp.com/app/answers/detail/a_id/5648", "creation_timestamp": "2025-05-01T14:15:38.000000Z"}, {"uuid": "9f536014-2a66-4429-b435-99592886dc74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23249", "type": "seen", "source": "https://t.me/cvedetector/23535", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23249 - NVIDIA NeMo Framework Remote Code Execution (RCE)\", \n  \"Content\": \"CVE ID : CVE-2025-23249 \nPublished : April 22, 2025, 4:15 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : NVIDIA NeMo Framework contains a vulnerability where a user could cause a deserialization of untrusted data by remote code execution. A successful exploit of this vulnerability might lead to code execution and data tampering. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T20:54:52.000000Z"}, {"uuid": "8fedf333-348a-4620-955c-96098e44f027", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23244", "type": "seen", "source": "Telegram/abtIrYps6YMc4YjHeyZnojw-J7liWtzA7dofBdE-MNPdoT0", "content": "", "creation_timestamp": "2025-04-25T01:19:57.000000Z"}, {"uuid": "ec0975a5-e8b0-4cfc-83ea-2cf8ccaa9e2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17662", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23247\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a failure to check the length of a buffer could allow a user to cause the tool to crash or execute arbitrary code by passing in a malformed ELF file. A successful exploit of this vulnerability might lead to arbitrary code execution.\n\ud83d\udccf Published: 2025-05-27T16:43:37.229Z\n\ud83d\udccf Modified: 2025-05-27T16:43:37.229Z\n\ud83d\udd17 References:\n1. https://nvidia.custhelp.com/app/answers/detail/a_id/5643", "creation_timestamp": "2025-05-27T16:52:48.000000Z"}, {"uuid": "fadc8ad9-b9e4-49ef-ab31-81c9eb1c5ff8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23246", "type": "seen", "source": "https://t.me/cvedetector/24236", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23246 - NVIDIA vGPU Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23246 \nPublished : May 1, 2025, 3:16 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : NVIDIA vGPU software for Windows and Linux contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows a guest to consume uncontrolled resources. A successful exploit of this vulnerability might lead to denial of service. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T19:01:23.000000Z"}, {"uuid": "a4a34420-f5f0-4ac3-b1f4-c98f5aadd707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23245", "type": "seen", "source": "Telegram/JGiVT9HglLOsy8jZw5Frp8KyOrdfS_vSdUkjYKsOCxXFq4Q", "content": "", "creation_timestamp": "2025-05-01T17:01:26.000000Z"}, {"uuid": "8aa07b05-e39c-403c-9faf-5592480bee3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2324", "type": "seen", "source": "https://t.me/cvedetector/20647", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2324 - Progress MOVEit Transfer SFTP Module Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2324 \nPublished : March 19, 2025, 4:15 p.m. | 1\u00a0hour, 11\u00a0minutes ago \nDescription : Improper Privilege Management vulnerability for users configured as Shared Accounts in Progress MOVEit Transfer (SFTP module) allows Privilege Escalation.This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.12, from 2024.0.0 before 2024.0.8, from 2024.1.0 before 2024.1.2. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T18:49:22.000000Z"}, {"uuid": "fbaf358b-c2ef-4008-ab51-61237afcd049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23244", "type": "seen", "source": "Telegram/JGiVT9HglLOsy8jZw5Frp8KyOrdfS_vSdUkjYKsOCxXFq4Q", "content": "", "creation_timestamp": "2025-05-01T17:01:26.000000Z"}, {"uuid": "9c10f76f-0e86-4180-91ec-a512a91c7c6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23240", "type": "seen", "source": "Telegram/ncF1gdy4WUeFN2zrjxPbmrb6-nTxYsVpwlgNGTLINsV5vZc", "content": "", "creation_timestamp": "2025-03-04T19:32:30.000000Z"}]}