{"vulnerability": "CVE-2025-2486", "sightings": [{"uuid": "0b2a463a-c5ba-4fd2-9855-f9b0a014919e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24860", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113956596686755931", "content": "", "creation_timestamp": "2025-02-06T11:01:13.203830Z"}, {"uuid": "5d72d017-053d-457f-878f-5b579a3a8264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24860", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lhdtaj5dbn25", "content": "", "creation_timestamp": "2025-02-04T10:16:22.609895Z"}, {"uuid": "cac19680-6482-48e8-98c7-db7e1b375f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24860", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113945143893165462", "content": "", "creation_timestamp": "2025-02-04T10:28:35.988268Z"}, {"uuid": "fd807354-b4fb-4e46-b103-0325bc6bedf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24860", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdwkoi5bk2f", "content": "", "creation_timestamp": "2025-02-04T11:15:44.889816Z"}, {"uuid": "078c6cd1-9509-4d2f-89f9-ea2a315fdb20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24860", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lhcq7pjmfe2t", "content": "", "creation_timestamp": "2025-02-03T23:49:34.995569Z"}, {"uuid": "0293ded8-6d56-4161-bc92-1e089c1d288b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24860", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113946004774033626", "content": "", "creation_timestamp": "2025-02-04T14:07:31.903402Z"}, {"uuid": "c3ff690c-d386-4701-a23b-f2d393bf6ac2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24860", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lheaqwi72x24", "content": "", "creation_timestamp": "2025-02-04T14:18:14.663175Z"}, {"uuid": "5006d696-d66d-4874-abbe-b68a765e6b47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24867", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982588694186995", "content": "", "creation_timestamp": "2025-02-11T01:11:18.299721Z"}, {"uuid": "f439ee3d-4ce4-4a1a-89b0-721c05901565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24867", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuicsxtvi23", "content": "", "creation_timestamp": "2025-02-11T01:16:04.392720Z"}, {"uuid": "e5bd0fa5-5f8f-4e4a-928e-e5f384959b9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24868", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuicv755i23", "content": "", "creation_timestamp": "2025-02-11T01:16:06.757319Z"}, {"uuid": "3379fae4-83bf-4139-9ad0-e5784e95fa5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24869", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuicykv642i", "content": "", "creation_timestamp": "2025-02-11T01:16:10.288745Z"}, {"uuid": "785ff4f5-c2d5-41dd-bb06-e6d3e87537bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lj4blb57iq2v", "content": "", "creation_timestamp": "2025-02-26T21:02:05.644650Z"}, {"uuid": "effa915b-40d7-4baf-947c-4028d173ab4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24868", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982647697373406", "content": "", "creation_timestamp": "2025-02-11T01:26:18.565823Z"}, {"uuid": "2cdb2ad7-6661-49f9-a368-441f9e5bd1ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24869", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982647712980414", "content": "", "creation_timestamp": "2025-02-11T01:26:18.834032Z"}, {"uuid": "2efe051e-ec40-4c3b-be26-4e1c78cc8f18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24868", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhusbvytvm2c", "content": "", "creation_timestamp": "2025-02-11T04:14:39.455172Z"}, {"uuid": "1df4227e-0266-4912-afb4-82b02d9ccb8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24861", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113998670930815144", "content": "", "creation_timestamp": "2025-02-13T21:21:14.002896Z"}, {"uuid": "f66d490b-7717-40d2-8f82-dd674847107b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24861", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li3pnpklsg2a", "content": "", "creation_timestamp": "2025-02-13T22:16:04.192815Z"}, {"uuid": "4b25a021-5160-4606-8b0e-c43b4f7d2b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li3pnsbrnn2g", "content": "", "creation_timestamp": "2025-02-13T22:16:07.013990Z"}, {"uuid": "36c66b18-6459-408e-9663-e8bd9747fd29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113999014869785559", "content": "", "creation_timestamp": "2025-02-13T22:48:41.911013Z"}, {"uuid": "8dbffea5-bb66-4fb4-8230-6137bd36e2e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li427rmvlc2v", "content": "", "creation_timestamp": "2025-02-14T01:25:07.978453Z"}, {"uuid": "f6886964-0988-4363-96ac-01370775d086", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24861", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-17", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "a0c82bc2-852b-4387-8a7d-6af687482dd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li6fwv35mz2l", "content": "", "creation_timestamp": "2025-02-15T00:00:15.696574Z"}, {"uuid": "6df90151-e4b4-495f-847e-0c3e024c52f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "9cfa4b47-67e2-44e9-8885-3a218d11d984", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li55phmtw624", "content": "", "creation_timestamp": "2025-02-14T12:00:17.268007Z"}, {"uuid": "49423989-8894-4bc4-b927-cd7b0c031dd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://bsky.app/profile/rajsamani.bsky.social/post/3ljhibmmnms2v", "content": "", "creation_timestamp": "2025-03-03T08:01:12.032245Z"}, {"uuid": "e475a755-b872-4152-919c-d1926c8adb29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3ligeddlq3s2t", "content": "", "creation_timestamp": "2025-02-18T03:52:45.386970Z"}, {"uuid": "7103fa8d-f6c0-4197-9ab8-321e567e2ab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "b95d8bd8-6262-4cce-9b80-d8ecbbe054e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-26T02:35:25.000000Z"}, {"uuid": "71fcab14-3d56-48f0-a5a8-38ab211bbc83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24866", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmianlqajr2r", "content": "", "creation_timestamp": "2025-04-10T19:32:57.551969Z"}, {"uuid": "8113e3ef-e36f-4e2e-b337-c840a4d7b34d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/scada/mypro_mgr_creds.rb", "content": "", "creation_timestamp": "2025-02-25T10:42:49.000000Z"}, {"uuid": "32915b04-908d-49cc-a33e-0a3ddab3c0ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2486", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3mbpsta6drg2p", "content": "", "creation_timestamp": "2026-01-06T01:35:56.590742Z"}, {"uuid": "3014d2c5-5259-41ed-b58b-2766b877d86b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "05e5c26c-545e-46f2-bac4-67b088753b66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2486", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115617256049609173", "content": "", "creation_timestamp": "2025-11-26T17:48:42.549715Z"}, {"uuid": "cd1235f4-167f-4830-8b60-96bb0383bd17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2486", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3mbpstdtffjx2", "content": "", "creation_timestamp": "2026-01-06T01:36:08.232408Z"}, {"uuid": "b3909ae4-1d32-4b3d-a704-8b250f918e4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24868", "type": "seen", "source": "https://t.me/cvedetector/17629", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24868 - SAP HANA XS Advanced Model Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24868 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : The User Account and Authentication service (UAA) for SAP HANA extended application services, advanced model (SAP HANA XS advanced model) allows an unauthenticated attacker to craft a malicious link, that, when clicked by a victim, redirects the browser to a malicious site due to insufficient redirect URL validation. On successful exploitation attacker can cause limited impact on confidentiality, integrity, and availability of the system. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:07:56.000000Z"}, {"uuid": "4d5b6a95-b850-42af-b252-94aa8d0aefe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24867", "type": "seen", "source": "https://t.me/cvedetector/17628", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24867 - SAP BusinessObjects Platform BI Launchpad Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-24867 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : SAP BusinessObjects Platform (BI Launchpad) does not sufficiently handle user input, resulting in Cross-Site Scripting (XSS) vulnerability. The application allows an unauthenticated attacker to craft a URL that embeds a malicious script within an unprotected parameter. When a victim clicks the link, the script will be executed in the browser, giving the attacker the ability to access and/or modify information related to the web client with no effect on availability. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:07:55.000000Z"}, {"uuid": "309014da-4e07-4b2f-924a-f3ae649a275a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24864", "type": "seen", "source": "Telegram/x-FFkVodL--tB3dmhrI4VgfmAMrW_CK3cmwokq3ROCNdn3zC", "content": "", "creation_timestamp": "2025-03-08T04:34:09.000000Z"}, {"uuid": "e0171865-736f-40f2-b215-cac31b298db9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24869", "type": "seen", "source": "https://t.me/cvedetector/17619", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24869 - SAP NetWeaver Application Server Java Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24869 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : SAP NetWeaver Application Server Java allows an attacker to access an endpoint that can disclose information about deployed server components, including their XML definitions. This information should ideally be restricted to customer administrators, even though they may not need it. These XML files are not entirely SAP-internal as they are deployed with the server. In such a scenario, sensitive information could be exposed without compromising its integrity or availability. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:07:43.000000Z"}, {"uuid": "25392ade-1d99-45eb-a5d9-dbbd33d0380b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24860", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3800", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24860\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: Incorrect Authorization vulnerability in Apache Cassandra allowing users to access a datacenter or IP/CIDR groups they should not be able to when using CassandraNetworkAuthorizer or CassandraCIDRAuthorizer. \n\nUsers with restricted data center access can update their own permissions via data control language (DCL) statements on affected versions.\n\nThis issue affects Apache Cassandra: from 4.0.0 through 4.0.15 and from 4.1.0 through 4.1.7 for CassandraNetworkAuthorizer, and from 5.0.0 through 5.0.2 for both CassandraNetworkAuthorizer and CassandraCIDRAuthorizer.\n\nOperators using\u00a0CassandraNetworkAuthorizer or\u00a0CassandraCIDRAuthorizer on affected versions should review data access rules for potential breaches. Users are recommended to upgrade to versions 4.0.16, 4.1.8, 5.0.3, which fixes the issue.\n\ud83d\udccf Published: 2025-02-04T12:30:59Z\n\ud83d\udccf Modified: 2025-02-07T17:37:38Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-24860\n2. https://github.com/apache/cassandra\n3. https://lists.apache.org/thread/yjo5on4tf7s1r9qklc4byrz30b8vkm2d\n4. http://www.openwall.com/lists/oss-security/2025/02/03/3", "creation_timestamp": "2025-02-07T18:02:57.000000Z"}, {"uuid": "167ee503-2821-4649-a306-454c15524222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24866", "type": "seen", "source": "https://t.me/cvedetector/22671", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24866 - Mattermost Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-24866 \nPublished : April 10, 2025, 4:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Mattermost versions 9.11.x &lt;=\nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T19:32:35.000000Z"}, {"uuid": "13e4493b-5d6b-4320-a3c6-a842588c5cfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24861", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4399", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24861\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: An attacker may inject commands via specially-crafted post requests.\n\ud83d\udccf Published: 2025-02-14T00:30:44Z\n\ud83d\udccf Modified: 2025-02-14T00:30:44Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-24861\n2. https://old.outbackpower.com/about-outback/contact/contact-us\n3. https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-17", "creation_timestamp": "2025-02-14T01:16:42.000000Z"}, {"uuid": "56ba3396-5481-4a34-a59e-e68502430919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24864", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6632", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24864\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Incorrect access permission of a specific folder issue exists in RemoteView Agent (for Windows) versions prior to v8.1.5.2. If this vulnerability is exploited, a non-administrative user on the remote PC may execute an arbitrary OS command with LocalSystem privilege.\n\ud83d\udccf Published: 2025-03-06T03:55:58.186Z\n\ud83d\udccf Modified: 2025-03-06T03:55:58.186Z\n\ud83d\udd17 References:\n1. https://help.rview.com/hc/ja/articles/38287019277843-%E7%B7%8A%E6%80%A5%E3%83%91%E3%83%83%E3%83%81%E4%BD%9C%E6%A5%AD%E3%81%AE%E3%81%94%E6%A1%88%E5%86%85-2025-02-13-%E5%AE%8C%E4%BA%86\n2. https://jvn.jp/en/jp/JVN24992507/", "creation_timestamp": "2025-03-06T04:35:45.000000Z"}, {"uuid": "5bcd5b0a-48b9-424e-bfc2-83ba0ad46809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://t.me/ics_cert/1034", "content": "\u0631\u0627\u0628\u0637 \u0648\u0628 \u067e\u0644\u062a \u0641\u0631\u0645 \u0645\u062f\u06cc\u0631\u06cc\u062a mySCADA myPRO Manager \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u0639\u062f\u0645 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0628\u0631\u0627\u06cc \u06cc\u06a9 \u0639\u0645\u0644\u06a9\u0631\u062f \u0645\u0647\u0645 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u062f\u0633\u062a\u0631\u0633\u06cc \u063a\u06cc\u0631\u0645\u062c\u0627\u0632 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u062f.\n\nBDU: 2025-01636\nCVE-2025-24865\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u06a9\u0647 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0647\u0627\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u06cc \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u0644\u06cc\u0633\u062a \"\u0633\u0641\u06cc\u062f\" \u0627\u0632 \u0622\u062f\u0631\u0633 \u0647\u0627\u06cc IP \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0631\u0627\u0628\u0637 \u0648\u0628 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0627\u0631\u062c\u06cc (\u0627\u06cc\u0646\u062a\u0631\u0646\u062a).\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u06cc\u062f:\n\u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0628\u0647 \u0646\u0633\u062e\u0647 1.4 \u0648 \u0628\u0627\u0644\u0627\u062a\u0631\nhttps://www.myscada.org/downloads/mySCADAPROManager/\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-02-28T13:38:44.000000Z"}, {"uuid": "734ac885-9bc6-472e-9bd0-9c3f54652be1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24860", "type": "seen", "source": "https://t.me/cvedetector/17184", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24860 - Apache Cassandra Incorrect Authorization Vulnerability Allows Unauthorized Access\", \n  \"Content\": \"CVE ID : CVE-2025-24860 \nPublished : Feb. 4, 2025, 11:15 a.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : Incorrect Authorization vulnerability in Apache Cassandra allowing users to access a datacenter or IP/CIDR groups they should not be able to when using CassandraNetworkAuthorizer or CassandraCIDRAuthorizer.  \n  \nUsers with restricted data center access can update their own permissions via data control language (DCL) statements on affected versions.  \n  \n  \n  \n  \nThis issue affects Apache Cassandra: from 4.0.0 through 4.0.15 and from 4.1.0 through 4.1.7 for CassandraNetworkAuthorizer, and from 5.0.0 through 5.0.2 for both CassandraNetworkAuthorizer and CassandraCIDRAuthorizer.  \n  \n  \n  \n  \nOperators using\u00a0CassandraNetworkAuthorizer or\u00a0CassandraCIDRAuthorizer on affected versions should review data access rules for potential breaches. Users are recommended to upgrade to versions 4.0.16, 4.1.8, 5.0.3, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T14:43:19.000000Z"}, {"uuid": "bbec0d90-92ba-4e52-890a-d2623ba24bc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24865", "type": "seen", "source": "https://t.me/CyberBulletin/2482", "content": "\u26a1CVE-2025-24865 (CVSS 10): Critical mySCADA myPRO Flaw Allow Full System Takeover.\n\n#CyberBulletin", "creation_timestamp": "2025-03-05T02:38:05.000000Z"}, {"uuid": "fb9b31b8-6991-4372-8d27-1b0c98d87a32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24869", "type": "seen", "source": "Telegram/PPZnSeRfBjp5_vheGcqE-ZSasmIF5jpbZLz3O07AcqU7KmUM", "content": "", "creation_timestamp": "2025-02-14T10:01:38.000000Z"}, {"uuid": "e5ab87db-ff43-4b30-8fcf-6cc7e34c5a03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24868", "type": "seen", "source": "Telegram/fDpnFMDycR34vnlZyVn6O0P_sOi8Y8G1NOFj_RFl-QCg24A", "content": "", "creation_timestamp": "2025-02-11T03:01:32.000000Z"}]}