{"vulnerability": "CVE-2025-2476", "sightings": [{"uuid": "c301878c-2b6b-4dac-bda8-08a6a1f2f121", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3llf57jmksr2u", "content": "", "creation_timestamp": "2025-03-27T20:28:13.208787Z"}, {"uuid": "1ce52a6c-fe41-4a60-8474-f94363b22e50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkr2mynrnq2h", "content": "", "creation_timestamp": "2025-03-19T20:48:52.743633Z"}, {"uuid": "61eba16a-8e17-4fb4-a425-c1c8d81810be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkz3kmhlwk2c", "content": "", "creation_timestamp": "2025-03-23T01:26:41.345061Z"}, {"uuid": "21136d16-33e2-4598-9818-78792dd5fd6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114214660616678541", "content": "", "creation_timestamp": "2025-03-24T00:50:15.219877Z"}, {"uuid": "da188a2f-e1dd-45bc-878a-93c33f85eca9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://bsky.app/profile/yayafa.bsky.social/post/3llcng6z62n2w", "content": "", "creation_timestamp": "2025-03-26T20:40:17.571357Z"}, {"uuid": "103ef494-57ae-4366-be50-d25d32c4703c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ll3s3gh2ls2e", "content": "", "creation_timestamp": "2025-03-24T03:15:08.315902Z"}, {"uuid": "dfd7638f-7d1e-4fff-a027-650fb7cb61f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://bsky.app/profile/cocanews.bsky.social/post/3ll7tw6z5qd2l", "content": "", "creation_timestamp": "2025-03-25T17:58:38.539157Z"}, {"uuid": "08858076-46fc-40e8-9bab-b25998e27529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:27.000000Z"}, {"uuid": "6a3e2b2a-287f-4fd8-9ee9-5189812b9c7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114190846798466515", "content": "", "creation_timestamp": "2025-03-19T19:54:04.515581Z"}, {"uuid": "90d017ce-c1c6-4faf-a5f8-a407932059c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114190860531785289", "content": "", "creation_timestamp": "2025-03-19T19:57:35.554150Z"}, {"uuid": "7e83ba64-3757-442f-9263-cb3a211df5f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lq3ijpcqlz2u", "content": "", "creation_timestamp": "2025-05-26T15:30:08.136420Z"}, {"uuid": "80125025-262e-4972-8b29-aed357a7c1d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lnouaqgu2i2z", "content": "", "creation_timestamp": "2025-04-26T04:04:50.900994Z"}, {"uuid": "7de2e0f6-80db-4b8e-818a-982ed028f2f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8127", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2476\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Use after free in Lens in Google Chrome prior to 134.0.6998.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)\n\ud83d\udccf Published: 2025-03-19T18:59:42.832Z\n\ud83d\udccf Modified: 2025-03-19T18:59:42.832Z\n\ud83d\udd17 References:\n1. https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_19.html\n2. https://issues.chromium.org/issues/401029609", "creation_timestamp": "2025-03-19T19:18:21.000000Z"}, {"uuid": "b666444f-d0ce-426b-b292-b9bb0119bfe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:26.000000Z"}, {"uuid": "a192d947-2e6b-40a0-91b3-a04f3446981f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24765", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19717", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24765\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in RobMarsh Image Shadow allows Path Traversal. This issue affects Image Shadow: from n/a through 1.1.0.\n\ud83d\udccf Published: 2025-06-27T11:52:48.540Z\n\ud83d\udccf Modified: 2025-06-27T13:41:32.696Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/image-shadow/vulnerability/wordpress-image-shadow-1-1-0-arbitrary-file-deletion-vulnerability?_s_id=cve", "creation_timestamp": "2025-06-27T13:50:55.000000Z"}, {"uuid": "abf927b7-be88-4c43-a0ac-a2b8921cfe56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24768", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17720", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24768\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme Nitan allows PHP Local File Inclusion. This issue affects Nitan: from n/a through 2.9.\n\ud83d\udccf Published: 2025-06-09T15:56:55.812Z\n\ud83d\udccf Modified: 2025-06-09T15:56:55.812Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/theme/snsnitan/vulnerability/wordpress-nitan-2-9-local-file-inclusion-vulnerability?_s_id=cve", "creation_timestamp": "2025-06-09T16:56:28.000000Z"}, {"uuid": "8c80affe-f207-4682-b331-6fe7a8b19d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24767", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17719", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24767\n\ud83d\udd25 CVSS Score: 9.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in facturaone TicketBAI Facturas para WooCommerce allows Blind SQL Injection. This issue affects TicketBAI Facturas para WooCommerce: from n/a through 3.19.\n\ud83d\udccf Published: 2025-06-09T15:56:56.570Z\n\ud83d\udccf Modified: 2025-06-09T15:56:56.570Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wp-ticketbai/vulnerability/wordpress-ticketbai-facturas-para-woocommerce-3-19-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-06-09T16:56:27.000000Z"}, {"uuid": "68c83b65-c273-43a2-8478-7ec581cd664f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "seen", "source": "https://t.me/cvedetector/20688", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2476 - Google Chrome Lens Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2476 \nPublished : March 19, 2025, 7:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : Use after free in Lens in Google Chrome prior to 134.0.6998.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T23:00:42.000000Z"}, {"uuid": "f151979e-5632-4a32-a5fe-1bb246515d01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2476", "type": "published-proof-of-concept", "source": "Telegram/oG5bcDupILYTiSvLrLyuoT30w-kSnnX732ONKp3s5pU3PI0", "content": "", "creation_timestamp": "2025-03-20T22:00:05.000000Z"}]}