{"vulnerability": "CVE-2025-2403", "sightings": [{"uuid": "afb85ec6-f6ae-4740-af55-e434a72e1166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24030", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgeziculvc2e", "content": "", "creation_timestamp": "2025-01-23T04:15:35.247315Z"}, {"uuid": "2d909e1a-32c0-4bdc-83b2-f95f697068a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24030", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgf2sywgkb2y", "content": "", "creation_timestamp": "2025-01-23T04:39:27.602736Z"}, {"uuid": "f97b8dc2-092d-466e-a6ff-27c5ec1d58f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24033", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878900944416033", "content": "", "creation_timestamp": "2025-01-23T17:42:08.604914Z"}, {"uuid": "e063b289-12ea-4702-91b3-62bdd51ac7cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24034", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878900958899354", "content": "", "creation_timestamp": "2025-01-23T17:42:08.956699Z"}, {"uuid": "fbd8591e-01bc-4d1c-9f9c-0271f760f031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24033", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggihgsq742e", "content": "", "creation_timestamp": "2025-01-23T18:16:11.734592Z"}, {"uuid": "d8e31824-62c3-4860-9743-2f030ceab5b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24034", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggihj3hqm2j", "content": "", "creation_timestamp": "2025-01-23T18:16:13.914670Z"}, {"uuid": "2cc36b59-8bd3-40c0-8c15-a17bd292daf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24033", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lggjsai45g2k", "content": "", "creation_timestamp": "2025-01-23T18:40:07.689133Z"}, {"uuid": "3ef38f02-1ea7-40b6-b547-ac2d8c23f838", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24034", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lggjsb66sz2q", "content": "", "creation_timestamp": "2025-01-23T18:40:10.327157Z"}, {"uuid": "97a0bc48-96b3-4a9c-8236-06cf18ed8830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24031", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113980358279860347", "content": "", "creation_timestamp": "2025-02-10T15:44:05.076219Z"}, {"uuid": "448afd09-6f46-4bf8-9bf5-da54db21b638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24032", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113980382711327196", "content": "", "creation_timestamp": "2025-02-10T15:50:17.597951Z"}, {"uuid": "758e237c-7e93-44be-ba9e-33daaafa0279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24031", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtk6gilph2v", "content": "", "creation_timestamp": "2025-02-10T16:16:44.960867Z"}, {"uuid": "e4df6b59-5bc9-4967-ba35-62c0a58a35a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24032", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtk6j6lx42c", "content": "", "creation_timestamp": "2025-02-10T16:16:47.682320Z"}, {"uuid": "5ad737e9-63c3-4aec-95e1-7687590a358a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24032", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113980543498444388", "content": "", "creation_timestamp": "2025-02-10T16:31:11.275779Z"}, {"uuid": "c66f9b43-e071-431d-97de-cf3613819e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24039", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbhleiq72h", "content": "", "creation_timestamp": "2025-02-11T18:18:47.465445Z"}, {"uuid": "74eec11a-f0d0-4018-b842-624ce88eb6a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24031", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhtx7nntan2e", "content": "", "creation_timestamp": "2025-02-10T20:10:05.507651Z"}, {"uuid": "fa80c450-93a8-4b47-a231-04ba9357a117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24032", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhtx7ofiha2a", "content": "", "creation_timestamp": "2025-02-10T20:10:09.219782Z"}, {"uuid": "f3afacc3-9566-47fa-8577-c97ee64f8546", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24036", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbhj2sd62a", "content": "", "creation_timestamp": "2025-02-11T18:18:45.046190Z"}, {"uuid": "20352d24-ea8f-46d5-bf1b-7671e735dde3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-240367", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0050", "content": "", "creation_timestamp": "2025-02-11T18:19:24.000000Z"}, {"uuid": "3da5040c-6c3f-44d0-b815-839060ea494e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24032", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lhxbja7oi225", "content": "", "creation_timestamp": "2025-02-12T03:52:25.593144Z"}, {"uuid": "a80f0b26-2d7a-4191-87ac-70689a574df9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24032", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lhy5yqd6p527", "content": "", "creation_timestamp": "2025-02-12T12:22:08.391375Z"}, {"uuid": "44b14f6f-3cb6-47a5-9c23-f92f73b1d9eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24036", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113987339329408917", "content": "", "creation_timestamp": "2025-02-11T21:19:27.069814Z"}, {"uuid": "6a6ec111-78c7-4aeb-bc78-93490223c000", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24039", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113987339343170066", "content": "", "creation_timestamp": "2025-02-11T21:19:27.319936Z"}, {"uuid": "c2a7aef4-821d-4172-a826-1e4ab4e90570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24036", "type": "seen", "source": "https://www.thezdi.com/blog/2025/2/11/the-february-2025-security-update-review", "content": "", "creation_timestamp": "2025-02-11T18:08:38.000000Z"}, {"uuid": "eadae9ad-f568-4ee1-9139-08d99d027e40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24039", "type": "seen", "source": "https://www.thezdi.com/blog/2025/2/11/the-february-2025-security-update-review", "content": "", "creation_timestamp": "2025-02-11T18:08:38.000000Z"}, {"uuid": "db43ded7-3622-422a-9c19-d6a74490f87f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "seen", "source": "https://www.thezdi.com/blog/2025/3/11/the-march-2025-security-update-review", "content": "", "creation_timestamp": "2025-03-11T16:39:36.000000Z"}, {"uuid": "c9749452-10c5-408f-9b90-052fa6ac6dc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "seen", "source": "https://infosec.exchange/users/cert_eu/statuses/114161624097802216", "content": "", "creation_timestamp": "2025-03-14T16:02:22.185229Z"}, {"uuid": "682a8767-b545-4d1b-b28f-53b9ea6de9ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-a8b1f1f7-7544db6064fedc76", "content": "", "creation_timestamp": "2025-03-12T09:39:02.792211Z"}, {"uuid": "e4bb96f8-01e7-4bbd-aa7f-3ef99d51ff61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24036", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114144846239347518", "content": "", "creation_timestamp": "2025-03-11T16:55:32.283765Z"}, {"uuid": "b23f3514-6ef8-4d6b-ad30-8806b2aac759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114145054751687775", "content": "", "creation_timestamp": "2025-03-11T17:48:34.035759Z"}, {"uuid": "6080ce9e-0372-4159-ade0-7dca544c02c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24032", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3llywykafub2u", "content": "", "creation_timestamp": "2025-04-04T17:30:12.659542Z"}, {"uuid": "1f77373a-122f-4c0e-9363-46c44819e292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114145022545782390", "content": "", "creation_timestamp": "2025-03-11T17:40:22.802626Z"}, {"uuid": "e9209fa0-305e-4eb9-b7fa-07a226983985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "published-proof-of-concept", "source": "Telegram/yVMcZPZMDfKYFPLppDuGykYC2pbGQXHcC6J2fYmq5T3iHfM", "content": "", "creation_timestamp": "2025-06-12T15:00:06.000000Z"}, {"uuid": "6da8a390-7ef5-47fd-87fb-065fbd258842", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2403", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lsw3ac4q7v2h", "content": "", "creation_timestamp": "2025-07-01T16:04:28.468150Z"}, {"uuid": "7c18f320-8e5a-41ec-b564-922407bd3f6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2403", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-182-06", "content": "", "creation_timestamp": "2025-07-01T10:00:00.000000Z"}, {"uuid": "f1d4aae4-9078-4fac-b484-5c11bd6b36ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "seen", "source": "https://bsky.app/profile/technofeed.bsky.social/post/3lo3nsfuoqp2x", "content": "", "creation_timestamp": "2025-05-01T06:14:04.655228Z"}, {"uuid": "7672460c-792a-4772-bc56-887a5a217219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "published-proof-of-concept", "source": "Telegram/-AO2ncBEn2Sf_XctW68FAZrvZBAU7Cs6S6qsyaRZ06gRRxw", "content": "", "creation_timestamp": "2025-06-12T19:00:06.000000Z"}, {"uuid": "998bd1fa-c833-444c-af4b-e95612631fec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24032", "type": "seen", "source": "https://t.me/cvedetector/17563", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24032 - Linux-PAM PAM-PKCS#11 Public Key Certificate Token Hijacking\", \n  \"Content\": \"CVE ID : CVE-2025-24032 \nPublished : Feb. 10, 2025, 4:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T18:45:34.000000Z"}, {"uuid": "d3d25626-938d-4de2-bd10-33d25c9fdf2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24031", "type": "seen", "source": "https://t.me/cvedetector/17573", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24031 - Apache PAM-PKCS#11 X509 Certificate PIN Input Vulnerability (Segmentation Fault)\", \n  \"Content\": \"CVE ID : CVE-2025-24031 \nPublished : Feb. 10, 2025, 4:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. In versions 0.6.12 and prior, the pam_pkcs11 module segfaults when a user presses ctrl-c/ctrl-d when they are asked for a PIN. When a user enters no PIN at all, `pam_get_pwd` will never initialize the password buffer pointer and as such `cleanse` will try to dereference an uninitialized pointer. On my system this pointer happens to have the value 3 most of the time when running sudo and as such it will segfault. The most likely impact to a system affected by this issue is an availability impact due to a daemon that uses PAM crashing. As of time of publication, a patch for the issue is unavailable. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T18:45:48.000000Z"}, {"uuid": "f300c24d-e8ed-46c3-8b2c-c16872b5a1bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "published-proof-of-concept", "source": "Telegram/b83YqEoSamzTvIv2g9YPtkdIt3N3ryx9DhLHym4P7gSMoa8", "content": "", "creation_timestamp": "2025-06-12T21:00:05.000000Z"}, {"uuid": "da67d337-0b01-405a-9430-0e27cca1c979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24030", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2711", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24030\n\ud83d\udd39 Description: Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by any version of Envoy Gateway prior to 1.2.6. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). Version 1.2.6 fixes the issue. As a workaround, the `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch.\n\ud83d\udccf Published: 2025-01-23T03:20:27.802Z\n\ud83d\udccf Modified: 2025-01-23T03:20:27.802Z\n\ud83d\udd17 References:\n1. https://github.com/envoyproxy/gateway/security/advisories/GHSA-j777-63hf-hx76\n2. https://github.com/envoyproxy/gateway/commit/3eb3301ab3dbf12b201b47bdb6074d1233be07bd\n3. https://www.envoyproxy.io/docs/envoy/latest/configuration/best_practices/edge\n4. https://www.envoyproxy.io/docs/envoy/latest/operations/admin", "creation_timestamp": "2025-01-23T04:02:49.000000Z"}, {"uuid": "421cb086-a04d-4937-888f-239de29cf0ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24033", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2780", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24033\n\ud83d\udd39 Description: @fastify/multipart is a Fastify plugin for parsing the multipart content-type. Prior to versions 8.3.1 and 9.0.3, the `saveRequestFiles` function does not delete the uploaded temporary files when user cancels the request. The issue is fixed in versions 8.3.1 and 9.0.3. As a workaround, do not use `saveRequestFiles`.\n\ud83d\udccf Published: 2025-01-23T17:40:56.228Z\n\ud83d\udccf Modified: 2025-01-23T17:40:56.228Z\n\ud83d\udd17 References:\n1. https://github.com/fastify/fastify-multipart/security/advisories/GHSA-27c6-mcxv-x3fh\n2. https://github.com/fastify/fastify-multipart/issues/546\n3. https://github.com/fastify/fastify-multipart/pull/567", "creation_timestamp": "2025-01-23T18:03:12.000000Z"}, {"uuid": "e9e3e4f4-5d62-447f-8031-3b4ad2cb06bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24034", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2781", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24034\n\ud83d\udd39 Description: Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Starting in version 0.7.0 and prior to versions 0.7.15 and 0.8.3, Himmelblau is vulnerable to leaking credentials in debug logs. When debug logging is enabled, user access tokens are inadvertently logged, potentially exposing sensitive authentication data. Similarly, Kerberos Ticket-Granting Tickets (TGTs) are logged when debug logging is enabled. Both issues pose a risk of exposing sensitive credentials, particularly in environments where debug logging is enabled. Himmelblau versions 0.7.15 and 0.8.3 contain a patch that fixes both issues. Some workarounds are available for users who are unable to upgrade. For the **logon compliance script issue**, disable the `logon_script` option in `/etc/himmelblau/himmelblau.conf`, and avoid using the `-d` flag when starting the `himmelblaud` daemon. For the Kerberos CCache issue, one may disable debug logging globally by setting the `debug` option in `/etc/himmelblau/himmelblau.conf` to `false` and avoiding the `-d` parameter when starting `himmelblaud`.\n\ud83d\udccf Published: 2025-01-23T17:38:57.957Z\n\ud83d\udccf Modified: 2025-01-23T17:38:57.957Z\n\ud83d\udd17 References:\n1. https://github.com/himmelblau-idm/himmelblau/security/advisories/GHSA-p989-2f5w-9cf6\n2. https://github.com/himmelblau-idm/himmelblau/commit/1216804f15ce5dc74bb5da48b5508c41d2ece8fa\n3. https://github.com/himmelblau-idm/himmelblau/releases/tag/0.7.15\n4. https://github.com/himmelblau-idm/himmelblau/releases/tag/0.8.3\n5. https://manpages.opensuse.org/Tumbleweed/himmelblau/himmelblau.conf.5.en.html\n6. https://manpages.opensuse.org/Tumbleweed/himmelblau/himmelblaud.8.en.html", "creation_timestamp": "2025-01-23T18:03:13.000000Z"}, {"uuid": "3dd02c6b-bcf1-4d04-bb3c-4a2c28c090ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24036", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4856", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24036\n\ud83d\udd25 CVSS Score: 7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability\n\ud83d\udccf Published: 2025-02-11T17:58:19.653Z\n\ud83d\udccf Modified: 2025-02-21T04:56:18.703Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24036", "creation_timestamp": "2025-02-21T05:18:23.000000Z"}, {"uuid": "d0e1ade7-0705-4819-aa70-b8aacd66186c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7201", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24035\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-03-11T16:58:51.622Z\n\ud83d\udccf Modified: 2025-03-11T18:36:02.686Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24035", "creation_timestamp": "2025-03-11T18:42:13.000000Z"}, {"uuid": "e0426ea8-ddce-4cbb-b465-c48825947113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "seen", "source": "https://t.me/kasperskyb2b/1655", "content": "\u2757\ufe0f \u0412\u0435\u0441\u0435\u043d\u043d\u0438\u0439 \u0443\u0440\u043e\u0436\u0430\u0439 \u043f\u0430\u0442\u0447\u0435\u0439: 7 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432 \u043e\u0442 Microsoft \n\n\u041c\u0430\u0440\u0442\u043e\u0432\u0441\u043a\u0438\u0439 Patch Tuesday \u043d\u0435 \u043f\u043e\u0440\u0430\u0436\u0430\u0435\u0442 \u0447\u0438\u0441\u043b\u043e\u043c \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u2014 \u0438\u0445 57, \u043d\u043e \u0430\u0436 7 \u0431\u044b\u043b\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b \u0434\u043e \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0438 6 (!) \u0438\u0437 \u043d\u0438\u0445 \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u0438\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438. \u041d\u0438 \u043e\u0434\u0438\u043d \u0438\u0437 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432 \u043d\u0435 \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e, \u0437\u0430\u0442\u043e \u044d\u0442\u0443 \u043e\u0446\u0435\u043d\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u0448\u0435\u0441\u0442\u044c \u0434\u0440\u0443\u0433\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, \u0432\u0441\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE. \n\n\u0418\u0437 \u043e\u0431\u0449\u0435\u0433\u043e \u0447\u0438\u0441\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 23 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE, 23 \u2014 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u043f\u043e 4 \u2014 \u043a \u0441\u043f\u0443\u0444\u0438\u043d\u0433\u0443 \u0438 \u0443\u0442\u0435\u0447\u043a\u0435  \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 3 \u2014 \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0410\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\nCVE-2025-26633 (CVSS3 7.0) \u2014 \u0441\u0430\u043c\u044b\u0439 \u043f\u043e\u043d\u044f\u0442\u043d\u044b\u0439 \u0438\u0437 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432, \u043e\u0431\u0445\u043e\u0434 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 Microsoft Management Console. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u0435\u0437 \u00ab\u043b\u0438\u0448\u043d\u0438\u0445\u00bb \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u0439 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 .msc-\u0444\u0430\u0439\u043b. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c ZDI \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 ransomware-\u0430\u0442\u0430\u043a\u0430\u0445 EncryptHub.\n\nCVE-2025-24993 \u0438 -24985 (CVSS 7.8) \u2014 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u0435\u0441\u043b\u0438 \u043d\u0430 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0435 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043e\u0431\u0440\u0430\u0437 \u0434\u0438\u0441\u043a\u0430 (VHD). \u041f\u0435\u0440\u0432\u044b\u0439 \u0434\u0435\u0444\u0435\u043a\u0442 \u043a\u0440\u043e\u0435\u0442\u0441\u044f \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 NTFS, \u0432\u0442\u043e\u0440\u043e\u0439 \u2014 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Fast FAT FS.\nCVE-2025-24984 \u0438 -24991 (4.6 \u0438 5.5) \u0442\u043e\u0436\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0432 NTFS \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0413\u0434\u0435 \u0438 \u043a\u0430\u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u044d\u0442\u0438 4 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0443\u0432\u044b, \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e. \u0411\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u043d\u043e\u0441\u0442\u0438 \u0430\u0434\u0440\u0435\u0441\u043e\u0432\u0430\u043d\u044b \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u043c\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044e. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0432\u0441\u0435 \u043e\u043d\u0438 \u0431\u044b\u043b\u0438 \u0447\u0430\u0441\u0442\u044c\u044e \u043e\u0434\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438.\n\nCVE-2025-24983 (7.0) \u2014 \u0443\u0436\u0435 \u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439  \u0434\u043e system \u0447\u0435\u0440\u0435\u0437 Win32.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-26630 (7.8) \u2014 \u044d\u0442\u043e RCE \u0432 MS Access, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0430\u044f \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u0411\u0414. \u0418\u0437 \u043f\u0430\u043d\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430 \u043e\u043d\u0430 \u043d\u0435 \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442.  \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u0433\u0438\u0433\u0430\u043d\u0442\u0441\u043a\u0438\u043c\u0438 \u0431\u043e\u0435\u0432\u044b\u043c\u0438 \u0440\u043e\u0431\u043e\u0442\u0430\u043c\u0438 Unpatched.ai.\n\n\u041f\u0435\u0440\u0435\u0445\u043e\u0434\u044f \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u0442\u043e\u0438\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c, \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 (\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435) \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u0432\u044b\u0434\u0435\u043b\u0438\u043c CVE-2025-24035 \u0438 -24045 (8.1). \u041e\u0431\u0430 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f RCE \u0432 Remote Desktop Services, \u043a\u043e\u043c\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u0438 \u0438\u0437\u043b\u0438\u0448\u043d\u0438.\n\n\u0412\u0438\u0448\u0435\u043d\u043a\u0430 \u043d\u0430 \u0442\u043e\u0440\u0442\u0435 \u2014 RCE \u0432 \u043a\u043b\u0438\u0435\u043d\u0442\u0435 Remote Desktop, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0430\u044f \u043f\u0440\u0438 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0438 \u043a \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u043c\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u0443 RDP (CVE-2025-26645, 8.8)\n\n\u041d\u0435 \u0434\u043e \u043a\u043e\u043d\u0446\u0430 \u043f\u043e\u043d\u044f\u0442\u0435\u043d \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0440\u0430\u0431\u043e\u0442\u044b CVE-2025-24084 (8.4) \u0432 WSL2. \u041d\u0430\u0436\u0430\u0442\u0438\u0435 \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u043d\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0441\u0441\u044b\u043b\u043a\u0443, \u0430 \u0432 \u0445\u0443\u0434\u0448\u0435\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u2014 \u043f\u0440\u043e\u0441\u0442\u043e \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e email \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u044f\u0434\u0440\u0430 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux. \u0414\u043e\u043b\u0436\u0435\u043d \u043b\u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u044b\u0439 \u043a\u043b\u0438\u0435\u043d\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0432 \u0441\u0440\u0435\u0434\u0435 Linux, \u0438\u043b\u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e, \u0447\u0442\u043e\u0431\u044b WSL2 \u0431\u044b\u043b\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u0430 \u0432 Windows, \u043d\u0435\u044f\u0441\u043d\u043e.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u043c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f RCE \u0432 Office, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0430\u044f \u0434\u0430\u0436\u0435 \u0447\u0435\u0440\u0435\u0437 \u043f\u0430\u043d\u0435\u043b\u044c \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430. \u041e\u0434\u043d\u0430\u043a\u043e Microsoft \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e CVE-2025-24057 \u043a\u0430\u043a \u043c\u0430\u043b\u043e\u0432\u0435\u0440\u043e\u044f\u0442\u043d\u0443\u044e.\n\n\u041f\u0440\u0438\u0437\u043e\u0432\u0430\u044f \u0438\u0433\u0440\u0430:\nAdobe \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c, \u0432 \u0447\u0438\u0441\u043b\u0435 \u043f\u0440\u043e\u0447\u0435\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0439 8 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0432 Reader, 6 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0438\u043c\u0435\u044e\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445, \u0432\u0441\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE).\n\n\u041d\u0443 \u0430 Apple \u0441\u0440\u043e\u0447\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0435\u0442 Safari \u043d\u0430 \u0432\u0441\u0435\u0445 \u0441\u0432\u043e\u0438\u0445 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u0445, \u0447\u0442\u043e\u0431\u044b \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c CVE-2025-24201 \u0432 WebKit, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0432 \u00ab\u043e\u0447\u0435\u043d\u044c \u0441\u043b\u043e\u0436\u043d\u044b\u0445 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445\u00bb.\n\n\u041d\u0435\u0441\u043a\u0443\u0447\u043d\u043e\u0439 \u0432\u0441\u0435\u043c \u043d\u0435\u0434\u0435\u043b\u0438!\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 #Adobe #Microsoft #Apple @\u041f2\u0422", "creation_timestamp": "2025-03-12T07:42:45.000000Z"}, {"uuid": "a3bce554-72ba-4787-90dd-f3c0a91113f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2403", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19326", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2403\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A denial-of-service vulnerability due to improper prioritization of network traffic over protection mechanism exists in Relion 670/650 and SAM600-IO series device that if exploited could potentially cause critical functions like LDCM (Line Distance Communication Module) to malfunction.\n\ud83d\udccf Published: 2025-06-24T11:33:10.236Z\n\ud83d\udccf Modified: 2025-06-24T11:33:10.236Z\n\ud83d\udd17 References:\n1. https://publisher.hitachienergy.com/preview?DocumentID=8DBD000216&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch", "creation_timestamp": "2025-06-24T11:50:52.000000Z"}, {"uuid": "c82b0a10-41b7-4af5-bd92-66d6b22a8d30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24035", "type": "seen", "source": "https://t.me/ViralCyber/13313", "content": "\ud83d\udd34 \u062a\u0647\u062f\u06cc\u062f \u062c\u062f\u06cc\u062f \u0628\u0631\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0648\u06cc\u0646\u062f\u0648\u0632\n\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u062f\u0631 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0627\u0631\u0633 \u06f2\u06f0\u06f2\u06f5 \u0627\u0632 \u06a9\u0634\u0641 \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc \u062f\u0631 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc \u0631\u06cc\u0645\u0648\u062a \u062f\u0633\u06a9\u062a\u0627\u067e \u0648\u06cc\u0646\u062f\u0648\u0632 (Windows Remote Desktop Services) \u062e\u0628\u0631 \u062f\u0627\u062f. \u0627\u06cc\u0646 \u0646\u0642\u0635\u200c\u0647\u0627\u060c \u0628\u0627 \u0634\u0646\u0627\u0633\u0647\u200c\u0647\u0627\u06cc CVE-2025-24035 \u0648 CVE-2025-24045\u060c \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u0646\u062f \u06a9\u062f \u0645\u062e\u0631\u0628 \u0631\u0627 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f \u0648 \u0628\u0647\u200c\u0637\u0648\u0631 \u0628\u0627\u0644\u0642\u0648\u0647 \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0627\u0645\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0631\u0627 \u0628\u0647 \u062f\u0633\u062a \u06af\u06cc\u0631\u0646\u062f. \u0627\u06cc\u0646 \u062a\u0647\u062f\u06cc\u062f \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627\u06cc\u06cc \u06a9\u0647 \u0627\u0632 \u0631\u06cc\u0645\u0648\u062a \u062f\u0633\u06a9\u062a\u0627\u067e \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f\u060c \u0628\u0633\u06cc\u0627\u0631 \u062c\u062f\u06cc \u0627\u0633\u062a.\n\n\u062c\u0632\u0626\u06cc\u0627\u062a \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0686\u06cc\u0633\u062a\u061f\n\u0634\u0646\u0627\u0633\u0647\u200c\u0647\u0627: CVE-2025-24035 \u0648 CVE-2025-24045\n\n\u0646\u0648\u0639 \u062a\u0647\u062f\u06cc\u062f: \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (Remote Code Execution - RCE)\n\n\u0634\u062f\u062a \u062e\u0637\u0631: \u0628\u062d\u0631\u0627\u0646\u06cc (\u0627\u0645\u062a\u06cc\u0627\u0632 CVSS: 8.1 \u0628\u0631\u0627\u06cc \u0647\u0631 \u062f\u0648)\n\n\u062a\u0623\u062b\u06cc\u0631: \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0627 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0646\u0642\u0635\u200c\u0647\u0627\u060c \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0631\u0648\u06cc \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f\u060c \u06a9\u0647 \u0645\u0646\u062c\u0631 \u0628\u0647 \u0646\u0642\u0636 \u0645\u062d\u0631\u0645\u0627\u0646\u06af\u06cc\u060c \u06cc\u06a9\u067e\u0627\u0631\u0686\u06af\u06cc \u0648 \u062f\u0633\u062a\u0631\u0633\u06cc\u200c\u067e\u0630\u06cc\u0631\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0645\u06cc\u200c\u0634\u0648\u062f.\n\n\u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631: \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0633\u0631\u0648\u0631 \u0648 \u0648\u06cc\u0646\u062f\u0648\u0632 \u062f\u0633\u06a9\u062a\u0627\u067e \u06a9\u0647 \u0627\u0632 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc \u0631\u06cc\u0645\u0648\u062a \u062f\u0633\u06a9\u062a\u0627\u067e \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f.\n\n\u0645\u0637\u0627\u0644\u0639\u0647 \u06a9\u0627\u0645\u0644 \u062e\u0628\u0631 \ud83d\udc49\n\n\ud83c\udd94 @TakianCo\n\ud83c\uddee\ud83c\uddf7", "creation_timestamp": "2025-05-14T08:31:57.000000Z"}, {"uuid": "32318d64-6549-4061-9de2-5a99e383e8a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24034", "type": "seen", "source": "https://t.me/cvedetector/16219", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24034 - Microsoft Azure Entra ID and Intune Himmelblau Credential Leaking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24034 \nPublished : Jan. 23, 2025, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Starting in version 0.7.0 and prior to versions 0.7.15 and 0.8.3, Himmelblau is vulnerable to leaking credentials in debug logs. When debug logging is enabled, user access tokens are inadvertently logged, potentially exposing sensitive authentication data. Similarly, Kerberos Ticket-Granting Tickets (TGTs) are logged when debug logging is enabled. Both issues pose a risk of exposing sensitive credentials, particularly in environments where debug logging is enabled. Himmelblau versions 0.7.15 and 0.8.3 contain a patch that fixes both issues. Some workarounds are available for users who are unable to upgrade. For the **logon compliance script issue**, disable the `logon_script` option in `/etc/himmelblau/himmelblau.conf`, and avoid using the `-d` flag when starting the `himmelblaud` daemon. For the Kerberos CCache issue, one may disable debug logging globally by setting the `debug` option in `/etc/himmelblau/himmelblau.conf` to `false` and avoiding the `-d` parameter when starting `himmelblaud`. \nSeverity: 3.2 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T19:59:26.000000Z"}, {"uuid": "70240cce-dc2b-437c-bb95-c5c7639ede86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24033", "type": "seen", "source": "https://t.me/cvedetector/16218", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24033 - Fastify/multipart Temporary File Lease\", \n  \"Content\": \"CVE ID : CVE-2025-24033 \nPublished : Jan. 23, 2025, 6:15 p.m. | 42\u00a0minutes ago \nDescription : @fastify/multipart is a Fastify plugin for parsing the multipart content-type. Prior to versions 8.3.1 and 9.0.3, the `saveRequestFiles` function does not delete the uploaded temporary files when user cancels the request. The issue is fixed in versions 8.3.1 and 9.0.3. As a workaround, do not use `saveRequestFiles`. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T19:59:25.000000Z"}, {"uuid": "dbcbd7dc-a587-4214-8ef9-624b12a5b459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24030", "type": "published-proof-of-concept", "source": "https://t.me/cvedetector/16160", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24030 - Envoy Gateway Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24030 \nPublished : Jan. 23, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by any version of Envoy Gateway prior to 1.2.6. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). Version 1.2.6 fixes the issue. As a workaround, the `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T05:46:47.000000Z"}, {"uuid": "d898a57e-4f69-4b01-b930-be22847e6b21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24032", "type": "seen", "source": "Telegram/A7-5UCNKfEn7GNuXcYpaEmNvFzHdVaxAw6ttggaZRamuS6Le", "content": "", "creation_timestamp": "2025-02-18T21:11:31.000000Z"}, {"uuid": "e6f32adb-5996-4b6a-8545-155f4e374111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24030", "type": "published-proof-of-concept", "source": "Telegram/-0InU180zuFDOzfizBTPC_qSVbcEAafDlBazkR8IxJayLKc", "content": "", "creation_timestamp": "2025-01-23T04:30:41.000000Z"}, {"uuid": "7a38d18e-4b74-4b17-8db4-52ee4faf9abb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24032", "type": "published-proof-of-concept", "source": "Telegram/OeH9zkywoY5RVyH3R_smk_5t4405jKnk6ZNWTlGk6rqPQWQ", "content": "", "creation_timestamp": "2025-02-10T17:30:24.000000Z"}]}