{"vulnerability": "CVE-2025-2441", "sightings": [{"uuid": "ed37db8b-a4ac-46eb-8d6a-3e36ffb4986b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2441", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11038", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2441\n\ud83d\udd25 CVSS Score: 4.1 (cvssV4_0, Vector: CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could lead to loss of\nconfidentiality when a malicious user, having physical access, sets the radio in factory default mode where the\nproduct does not correctly initialize all data.\n\ud83d\udccf Published: 2025-04-09T10:23:45.536Z\n\ud83d\udccf Modified: 2025-04-09T10:23:45.536Z\n\ud83d\udd17 References:\n1. https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-098-02&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2025-098-02.pdf", "creation_timestamp": "2025-04-09T10:47:55.000000Z"}, {"uuid": "0a183ba5-358e-4959-8c16-c63f11ef9f6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24417", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbim6t362a", "content": "", "creation_timestamp": "2025-02-11T18:19:21.858663Z"}, {"uuid": "67fb0897-d032-4d92-a498-d04bf90c3817", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24419", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbisd77j2a", "content": "", "creation_timestamp": "2025-02-11T18:19:28.410806Z"}, {"uuid": "d10adc11-77eb-4d8a-807e-0cce51d5ad05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24410", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986746142557535", "content": "", "creation_timestamp": "2025-02-11T18:48:42.673043Z"}, {"uuid": "c78054d0-5bf9-4a1f-ba93-b250c6c3ef64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24411", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986746178739743", "content": "", "creation_timestamp": "2025-02-11T18:48:43.148639Z"}, {"uuid": "9b5b1836-edaf-44cb-ab2f-4558c250c99b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24412", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986746219140459", "content": "", "creation_timestamp": "2025-02-11T18:48:45.426874Z"}, {"uuid": "438bba7b-0deb-4792-9cdf-76d90733765c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24413", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986746253009937", "content": "", "creation_timestamp": "2025-02-11T18:48:45.631864Z"}, {"uuid": "de49086d-9ce7-4503-b9cf-3c1681905954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24414", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986746302908138", "content": "", "creation_timestamp": "2025-02-11T18:48:46.256575Z"}, {"uuid": "9500aeba-4c0d-4313-a282-38e27ed00b13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24415", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986746350199409", "content": "", "creation_timestamp": "2025-02-11T18:48:46.573192Z"}, {"uuid": "5868cb3e-71ab-485e-a51e-c99e005a125b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24416", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986746382987918", "content": "", "creation_timestamp": "2025-02-11T18:48:46.646021Z"}, {"uuid": "daf5b601-f916-4fc5-89ee-d962326c6aa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24417", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986746445691306", "content": "", "creation_timestamp": "2025-02-11T18:48:48.262382Z"}, {"uuid": "613039e9-6f7e-4f46-81f4-825fc1bb00b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24418", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986746529285315", "content": "", "creation_timestamp": "2025-02-11T18:48:50.924114Z"}, {"uuid": "64adae51-0834-44a9-bee0-ebf08418f385", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24412", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhwkgsvewi2v", "content": "", "creation_timestamp": "2025-02-11T20:59:26.007515Z"}, {"uuid": "0ea78ce3-9e77-4814-a737-188b66ccf60f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2441", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-107-01", "content": "", "creation_timestamp": "2025-04-17T10:00:00.000000Z"}, {"uuid": "3dc74f26-a127-4fcc-bd03-d663f2cd710a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24411", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5409", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24411\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.\n\ud83d\udccf Published: 2025-02-11T17:37:51.772Z\n\ud83d\udccf Modified: 2025-02-25T21:39:47.952Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-02-25T22:23:53.000000Z"}, {"uuid": "7d2804b8-bdeb-48cf-a0dc-0cefe11ab66d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24410", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5411", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24410\n\ud83d\udd25 CVSS Score: 8.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.\n\ud83d\udccf Published: 2025-02-11T17:37:33.017Z\n\ud83d\udccf Modified: 2025-02-25T21:39:47.185Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-02-25T22:23:54.000000Z"}, {"uuid": "a59cc9f7-6b99-4081-b8f6-3952cc08b9b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24412", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5414", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24412\n\ud83d\udd25 CVSS Score: 8.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.\n\ud83d\udccf Published: 2025-02-11T17:37:36.216Z\n\ud83d\udccf Modified: 2025-02-25T21:39:45.984Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-02-25T22:24:00.000000Z"}, {"uuid": "04cfa844-67df-4b45-bbf4-01cae1e3b1c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24412", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbi7ua6b2z", "content": "", "creation_timestamp": "2025-02-11T18:19:08.886347Z"}, {"uuid": "070ec6fc-e25c-4629-873d-e490c7311e78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24416", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbijoydw2a", "content": "", "creation_timestamp": "2025-02-11T18:19:19.455474Z"}, {"uuid": "bdc1375b-1ce6-4332-abbe-721d07b6b7e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24414", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbieqbe52p", "content": "", "creation_timestamp": "2025-02-11T18:19:14.035897Z"}, {"uuid": "b75ecca3-423f-458a-bb89-74fecb69eba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24410", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbhzzvba2x", "content": "", "creation_timestamp": "2025-02-11T18:19:02.900064Z"}, {"uuid": "ce36d86f-a520-4565-a707-3d53f573c748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24411", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbi4hfqa2x", "content": "", "creation_timestamp": "2025-02-11T18:19:05.490271Z"}, {"uuid": "09ea7848-e880-48af-b92c-3726fa27e5d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24413", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbic7bji2x", "content": "", "creation_timestamp": "2025-02-11T18:19:11.386433Z"}, {"uuid": "c20d08f8-fcc5-44e3-8f98-d134c8d3dda5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24415", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbih6zta2x", "content": "", "creation_timestamp": "2025-02-11T18:19:16.669181Z"}, {"uuid": "3f8a0117-540c-4fc4-996c-1091fec6c76c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24418", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbiowlp52d", "content": "", "creation_timestamp": "2025-02-11T18:19:24.710281Z"}, {"uuid": "06c9f861-778b-4954-8590-f58eff411b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24417", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5407", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24417\n\ud83d\udd25 CVSS Score: 8.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.\n\ud83d\udccf Published: 2025-02-11T17:37:39.575Z\n\ud83d\udccf Modified: 2025-02-25T21:39:48.715Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-02-25T22:23:51.000000Z"}, {"uuid": "68c8a91c-cdce-4155-90fd-2440c1795995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24419", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11865", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24419\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could exploit this vulnerability to modify select data. Exploitation of this issue does not require user interaction.\n\ud83d\udccf Published: 2025-02-11T17:37:48.559Z\n\ud83d\udccf Modified: 2025-04-15T16:47:11.921Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-04-15T16:55:32.000000Z"}, {"uuid": "a8a78cab-92ab-4a4f-a8cd-ebf9aae7facb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2441", "type": "seen", "source": "https://t.me/cvedetector/22555", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2441 - Cisco Radio Confidentiality Loss\", \n  \"Content\": \"CVE ID : CVE-2025-2441 \nPublished : April 9, 2025, 11:15 a.m. | 50\u00a0minutes ago \nDescription : CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could lead to loss of  \nconfidentiality when a malicious user, having physical access, sets the radio in factory default mode where the  \nproduct does not correctly initialize all data. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T14:15:55.000000Z"}]}