{"vulnerability": "CVE-2025-2337", "sightings": [{"uuid": "76778452-0959-4a8f-9f46-50a6fc1fea58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23374", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113915381075401930", "content": "", "creation_timestamp": "2025-01-30T04:19:31.291969Z"}, {"uuid": "cae9a57b-d5f8-4c3b-9050-5acfe1acbf02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23374", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgwq4bhl5p2n", "content": "", "creation_timestamp": "2025-01-30T05:15:42.642390Z"}, {"uuid": "ae1e21fd-af71-4332-abbd-cc71f3ca8d9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23374", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113915967155586637", "content": "", "creation_timestamp": "2025-01-30T06:48:36.107018Z"}, {"uuid": "019d62f5-a4cc-4b2b-9e51-7d3ec3254a22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23378", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114314020757340212", "content": "", "creation_timestamp": "2025-04-10T13:58:50.844652Z"}, {"uuid": "b1d5cfe5-9afc-4092-a249-8f35226bcd24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2337", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkijshklcg26", "content": "", "creation_timestamp": "2025-03-16T11:26:21.115793Z"}, {"uuid": "942a6d2b-b024-4931-85d0-68f40970eb39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23374", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgxeq2nsz72q", "content": "", "creation_timestamp": "2025-01-30T11:24:43.230475Z"}, {"uuid": "63c1d58f-1733-4b23-9610-42a77700a93f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23374", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgxert6gso2g", "content": "", "creation_timestamp": "2025-01-30T11:25:41.505718Z"}, {"uuid": "848d2129-7e1f-4c59-8386-48a292d46bd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23375", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114416340448253016", "content": "", "creation_timestamp": "2025-04-28T15:40:04.594868Z"}, {"uuid": "469b2074-d90b-4875-86bc-90e3fb1f0c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23376", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnvczmiz3f2r", "content": "", "creation_timestamp": "2025-04-28T17:45:16.985534Z"}, {"uuid": "233b5733-8f7f-4054-ad68-f400e7902c06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23375", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnvczmoxls2d", "content": "", "creation_timestamp": "2025-04-28T17:45:18.175765Z"}, {"uuid": "4c54d450-fc23-46b2-b300-f894e2a828c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23377", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnvczmw2s42a", "content": "", "creation_timestamp": "2025-04-28T17:45:19.426734Z"}, {"uuid": "b8d69014-dcd7-4911-8166-c6c6ae147d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23374", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3450", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23374\n\ud83d\udd25 CVSS Score: 8.2 (CVSS_V3)\n\ud83d\udd39 Description: Dell Networking Switches running Enterprise SONiC OS, version(s) prior to 4.4.1 and 4.2.3, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.\n\ud83d\udccf Published: 2025-01-30T06:30:49Z\n\ud83d\udccf Modified: 2025-01-30T06:30:49Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-23374\n2. https://www.dell.com/support/kbdoc/en-us/000278568/dsa-2025-057-security-update-for-dell-enterprise-sonic-distribution-vulnerability", "creation_timestamp": "2025-01-30T07:11:25.000000Z"}, {"uuid": "5cb9212b-9ee0-459d-8e00-6e18fb776cb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23377", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13685", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23377\n\ud83d\udd25 CVSS Score: 4.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Dell PowerProtect Data Manager Reporting, version(s) 19.17, 19.18 contain(s) an Improper Encoding or Escaping of Output vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to inject arbitrary web script or html in reporting outputs.\n\ud83d\udccf Published: 2025-04-28T14:38:01.852Z\n\ud83d\udccf Modified: 2025-04-28T14:50:15.238Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities", "creation_timestamp": "2025-04-28T15:10:48.000000Z"}, {"uuid": "63f1fd83-1ba3-4dab-91be-a8ca7de5bb92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23375", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13691", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23375\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell PowerProtect Data Manager Reporting, version(s) 19.17, contain(s) an Incorrect Use of Privileged APIs vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-04-28T14:28:03.669Z\n\ud83d\udccf Modified: 2025-04-28T14:28:03.669Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities", "creation_timestamp": "2025-04-28T15:10:57.000000Z"}, {"uuid": "c1103a07-3f2a-4a8e-ad4e-5f3604f9e2d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23379", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lojis5kdgz2h", "content": "", "creation_timestamp": "2025-05-06T18:21:43.194692Z"}, {"uuid": "59532749-066f-433b-82d9-16ddb05adb79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23374", "type": "seen", "source": "MISP/ca7dfd4e-d0b5-4d10-8982-36d9f6e53c8e", "content": "", "creation_timestamp": "2025-09-01T13:53:38.000000Z"}, {"uuid": "e771c846-b36f-49b8-99c8-86293501c063", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2337", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116006091141976374", "content": "", "creation_timestamp": "2026-02-03T09:54:35.720965Z"}, {"uuid": "b010bbba-fde1-4853-bb13-7bd4c5ff54d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2337", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115959699471020022", "content": "", "creation_timestamp": "2026-01-26T05:16:34.439790Z"}, {"uuid": "644946ef-4252-41ca-80ec-965bea445e31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23378", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11189", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23378\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an exposure of information through directory listing vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure.\n\ud83d\udccf Published: 2025-04-10T02:26:43.448Z\n\ud83d\udccf Modified: 2025-04-10T02:26:43.448Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "creation_timestamp": "2025-04-10T02:49:23.000000Z"}, {"uuid": "29b50c1a-44ed-4aae-8ba7-99b49af2a966", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2337", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7708", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2337\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-16T09:31:21.364Z\n\ud83d\udccf Modified: 2025-03-16T09:31:21.364Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299801\n2. https://vuldb.com/?ctiid.299801\n3. https://vuldb.com/?submit.510779\n4. https://github.com/tbeu/matio/issues/267\n5. https://github.com/tbeu/matio/issues/267#issue-2883856488", "creation_timestamp": "2025-03-16T09:50:26.000000Z"}, {"uuid": "82fc5d6c-4645-414b-bee1-41aed89d9381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2337", "type": "seen", "source": "https://t.me/cvedetector/20408", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2337 - \"Thebeu Matio Heap-Based Buffer Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2337 \nPublished : March 16, 2025, 10:15 a.m. | 36\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-16T12:11:41.000000Z"}, {"uuid": "2db3bf33-418c-4416-9f23-40bad56a4241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23376", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13688", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23376\n\ud83d\udd25 CVSS Score: 2.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Dell PowerProtect Data Manager Reporting, version(s) 19.16, 19.17, 19.18, contain(s) an Improper Neutralization of Special Elements Used in a Template Engine vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure.\n\ud83d\udccf Published: 2025-04-28T14:34:13.504Z\n\ud83d\udccf Modified: 2025-04-28T14:34:13.504Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities", "creation_timestamp": "2025-04-28T15:10:51.000000Z"}, {"uuid": "43881950-ce92-40f8-8683-584006fdaaa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23374", "type": "seen", "source": "https://t.me/cvedetector/16743", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23374 - \"Dell Networking Switches Enterprise SONiC OS Log File Information Exfiltration\"\", \n  \"Content\": \"CVE ID : CVE-2025-23374 \nPublished : Jan. 30, 2025, 5:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Dell Networking Switches running Enterprise SONiC OS, version(s) prior to 4.4.1 and 4.2.3, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T08:24:45.000000Z"}, {"uuid": "9ddba3df-6dec-4fae-b963-9efe226191cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23378", "type": "seen", "source": "https://t.me/cvedetector/22618", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23378 - Dell PowerScale OneFS Directory Listing Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-23378 \nPublished : April 10, 2025, 3:15 a.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an exposure of information through directory listing vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T06:59:48.000000Z"}, {"uuid": "871d145f-2603-4180-acbf-f53e885083fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23377", "type": "seen", "source": "https://t.me/cvedetector/23933", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23377 - Dell PowerProtect Data Manager Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-23377 \nPublished : April 28, 2025, 3:15 p.m. | 2\u00a0hours, 14\u00a0minutes ago \nDescription : Dell PowerProtect Data Manager Reporting, version(s) 19.17, 19.18 contain(s) an Improper Encoding or Escaping of Output vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to inject arbitrary web script or html in reporting outputs. \nSeverity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-28T19:55:16.000000Z"}, {"uuid": "6a1221b2-20f5-472a-82c9-97b6d5aa99aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23376", "type": "seen", "source": "https://t.me/cvedetector/23932", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23376 - Dell PowerProtect Data Manager Template Engine Template Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23376 \nPublished : April 28, 2025, 3:15 p.m. | 2\u00a0hours, 14\u00a0minutes ago \nDescription : Dell PowerProtect Data Manager Reporting, version(s) 19.16, 19.17, 19.18, contain(s) an Improper Neutralization of Special Elements Used in a Template Engine vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure. \nSeverity: 2.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-28T19:55:16.000000Z"}, {"uuid": "a6febd13-81bf-4ae9-a4d5-369f2354a4aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23375", "type": "seen", "source": "https://t.me/cvedetector/23931", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23375 - Dell PowerProtect Data Manager Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23375 \nPublished : April 28, 2025, 3:15 p.m. | 2\u00a0hours, 14\u00a0minutes ago \nDescription : Dell PowerProtect Data Manager Reporting, version(s) 19.17, contain(s) an Incorrect Use of Privileged APIs vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-28T19:55:15.000000Z"}, {"uuid": "f1fcf1dd-dbcd-4f47-a2bf-7fb0180e382b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23374", "type": "seen", "source": "Telegram/vtCwAHiZCYaEc4-uHfUOx5kuNVDq7I8TQhvQTLwSiz4R8VA", "content": "", "creation_timestamp": "2025-01-30T05:30:13.000000Z"}, {"uuid": "d0f04e41-aff8-461e-bd5b-24be6807b123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2337", "type": "published-proof-of-concept", "source": "Telegram/QTbT-3NJOpKLUZh6L5GI7AcqhHilnWpke1mECe52igq_9aU", "content": "", "creation_timestamp": "2025-03-16T11:30:14.000000Z"}]}