{"vulnerability": "CVE-2025-2518", "sightings": [{"uuid": "138cb8b0-d689-4f07-ac0f-26e024c391ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/seifreed.bsky.social/post/3lhhhm4fdyy2y", "content": "", "creation_timestamp": "2025-02-05T20:58:46.755665Z"}, {"uuid": "63dc4e6e-6cc3-4c1f-8f68-5949f3af6183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lhhhxtgbhw22", "content": "", "creation_timestamp": "2025-02-05T21:05:19.396372Z"}, {"uuid": "155a5a15-0b29-4595-84a5-768b1d57e6f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113941668057878633", "content": "", "creation_timestamp": "2025-02-03T19:44:38.865927Z"}, {"uuid": "dc415ad2-9742-438d-bd31-278838ef8b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhcedi5u672h", "content": "", "creation_timestamp": "2025-02-03T20:16:56.845476Z"}, {"uuid": "eb75a97d-863b-4db7-b115-4ec566ea97fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/nicolefishbein.bsky.social/post/3lhcfixgiu22q", "content": "", "creation_timestamp": "2025-02-03T20:37:54.570710Z"}, {"uuid": "d7904cb6-92f3-41ca-9843-a6cc99155e2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhckksyjdl2u", "content": "", "creation_timestamp": "2025-02-03T22:08:33.145187Z"}, {"uuid": "8dc9ad0d-c1a3-496b-b5cd-a9b2f2f2e239", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3lhgzfzmfjc27", "content": "", "creation_timestamp": "2025-02-05T16:44:52.274943Z"}, {"uuid": "6a3ac2e9-ff0c-4b4d-8c4b-eb8d65c3e746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lhi5s7xhpk2e", "content": "", "creation_timestamp": "2025-02-06T03:35:56.809186Z"}, {"uuid": "5889e8b8-1733-48a2-9f3b-c60a54a281a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhjybz6f4s2a", "content": "", "creation_timestamp": "2025-02-06T21:02:43.026934Z"}, {"uuid": "7464a8f9-659b-49fe-90a1-539d9b574fed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lhjqetiesk2n", "content": "", "creation_timestamp": "2025-02-06T18:41:05.837074Z"}, {"uuid": "2ece9c80-4d47-43fc-b446-1a971bce4209", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25187", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113965018530943298", "content": "", "creation_timestamp": "2025-02-07T22:42:58.768867Z"}, {"uuid": "dbf3c832-1a24-461f-889f-dd16c9646f30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/anontroyano.bsky.social/post/3lhil3xuhls2a", "content": "", "creation_timestamp": "2025-02-06T07:35:26.365311Z"}, {"uuid": "d4d878d3-7099-43d8-b481-4ed7f8958d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/anontroyano.bsky.social/post/3lhil3z7ofs2a", "content": "", "creation_timestamp": "2025-02-06T07:35:26.916535Z"}, {"uuid": "903a2692-d2f3-4535-a2d9-cc28804c4838", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25187", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhmq6ux3gc2h", "content": "", "creation_timestamp": "2025-02-07T23:15:44.257126Z"}, {"uuid": "2040916b-4006-4253-938c-d85741b3bd8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25183", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhmrjawaz62t", "content": "", "creation_timestamp": "2025-02-07T23:39:28.258492Z"}, {"uuid": "bed56f49-8a0f-425b-9aaa-dc01361ddce1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3533541", "content": "", "creation_timestamp": "2025-03-10T20:37:14.559415Z"}, {"uuid": "488b2088-0e2f-473e-a289-05714038989e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lhsgllfpta2z", "content": "", "creation_timestamp": "2025-02-10T05:39:52.252657Z"}, {"uuid": "00f28b58-a5ef-4f6d-a4a9-94942f3ce337", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lhshriip3v2e", "content": "", "creation_timestamp": "2025-02-10T06:01:03.818305Z"}, {"uuid": "eff0a893-6f06-4b09-a70c-66261535112e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25186", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtk6r3fgx2x", "content": "", "creation_timestamp": "2025-02-10T16:16:55.934742Z"}, {"uuid": "da2d773e-4b94-4145-a5b7-d0ca5a9d8ca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25189", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981896093771933", "content": "", "creation_timestamp": "2025-02-10T22:15:09.926984Z"}, {"uuid": "e703483a-f767-41b5-828f-f489bbfc69cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25189", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhu6ayiqzt2z", "content": "", "creation_timestamp": "2025-02-10T22:16:05.849135Z"}, {"uuid": "86fa5d11-2651-4ea2-afed-a72426cd916c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25189", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhueuf54rm2p", "content": "", "creation_timestamp": "2025-02-11T00:14:21.434085Z"}, {"uuid": "74b8f210-e4c0-43a1-9363-f96b801a0718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25188", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113980818586300320", "content": "", "creation_timestamp": "2025-02-10T17:41:08.465093Z"}, {"uuid": "ea558028-1ac7-4ead-9c0f-668e6f3e8ebb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25188", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtqtx3wyr2c", "content": "", "creation_timestamp": "2025-02-10T18:16:09.251578Z"}, {"uuid": "476a80f2-6472-4fa7-8837-61c37b1ceb5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ljx242rpn32l", "content": "", "creation_timestamp": "2025-03-09T12:30:08.401484Z"}, {"uuid": "12adc7a2-8e9b-4cd7-902e-62bbcd6ff83b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/socprime.com/post/3lhw2usicv72v", "content": "", "creation_timestamp": "2025-02-11T16:20:56.097401Z"}, {"uuid": "0690c01c-371e-4550-9d1c-3aef6cf09a42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lk4xnhrq6b2x", "content": "", "creation_timestamp": "2025-03-11T21:02:11.299740Z"}, {"uuid": "a4b00ad0-9c7b-4062-bc23-bca3ae8d8d18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25182", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113992407417127043", "content": "", "creation_timestamp": "2025-02-12T18:48:20.163699Z"}, {"uuid": "055fcc4d-f790-4ab6-bacb-dfedb4d41a4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25182", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhzlt6ugqk2t", "content": "", "creation_timestamp": "2025-02-13T02:02:20.277262Z"}, {"uuid": "0328aa17-383a-4c86-a207-3f1eb57fbe9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25182", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113991847214655450", "content": "", "creation_timestamp": "2025-02-12T16:25:51.964456Z"}, {"uuid": "58bb7332-1ca5-4a90-85bc-524633437f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-03-11T05:26:42.000000Z"}, {"uuid": "b7b69997-fd03-4093-87d9-79d91e80a3a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25184", "type": "seen", "source": "https://bsky.app/profile/clayton256.bsky.social/post/3ll6z6vj7ft2m", "content": "", "creation_timestamp": "2025-03-25T10:00:18.857297Z"}, {"uuid": "4c4cc8d8-6e8d-409d-8dcf-f91b4e64b7d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25182", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li2yp7spci24", "content": "", "creation_timestamp": "2025-02-13T15:25:24.419916Z"}, {"uuid": "40f6d712-65e7-4ff0-a99f-1c1696b2d307", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25184", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113991847229088447", "content": "", "creation_timestamp": "2025-02-12T16:25:52.300475Z"}, {"uuid": "6f84d2ee-92ae-47bc-9c63-d4e4b6ff8b4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25182", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyog2r6be2h", "content": "", "creation_timestamp": "2025-02-12T17:15:54.542513Z"}, {"uuid": "be56a82a-c39d-443e-a7cf-3185c29d4e71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25184", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyog6avlh2x", "content": "", "creation_timestamp": "2025-02-12T17:15:58.351112Z"}, {"uuid": "669b192a-f38f-42ab-913f-3594c69e954a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25184", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhyry4hvgs2w", "content": "", "creation_timestamp": "2025-02-12T18:19:52.457952Z"}, {"uuid": "8250a7a8-27dc-4f8b-bcfc-0b47eb7c0e14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25185", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljim7i2vin2a", "content": "", "creation_timestamp": "2025-03-03T18:44:16.320777Z"}, {"uuid": "90905b3c-1c33-42a2-a39f-623ef42c37ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25182", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:45.000000Z"}, {"uuid": "cafbe37d-d55a-4ac4-8c09-3c71faeee8e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-03-10T18:10:04.000000Z"}, {"uuid": "6feb774c-41b7-4472-bafb-f9abb5c7f40c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lk2ayuynhs2g", "content": "", "creation_timestamp": "2025-03-10T19:11:43.273498Z"}, {"uuid": "67a30ce8-087a-412c-9876-1fbb72ec7e92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lk2ayuz6322g", "content": "", "creation_timestamp": "2025-03-10T19:11:44.471503Z"}, {"uuid": "ee2ef411-b815-44e3-b4c0-daea6ae4647e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25184", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lnnq2hje5s2y", "content": "", "creation_timestamp": "2025-04-25T17:17:07.034855Z"}, {"uuid": "10b3b5a6-597c-40b4-adad-6fee681bdcc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-25184", "type": "seen", "source": "https://bsky.app/profile/Sempf.infosec.exchange.ap.brid.gy/post/3lnou335z54t2", "content": "", "creation_timestamp": "2025-04-26T04:39:27.904035Z"}, {"uuid": "95359f2f-927f-45e7-840d-7cd5f82596b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lk2e6kjbxk24", "content": "", "creation_timestamp": "2025-03-10T20:08:29.916108Z"}, {"uuid": "8053ec2d-9f8d-4b80-a940-e3c351e44eb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2518", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqdjbon62ow2", "content": "", "creation_timestamp": "2025-05-29T20:04:58.935395Z"}, {"uuid": "da94cd74-9779-4afa-8364-d6bf642a524c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25182", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:23.000000Z"}, {"uuid": "f28da3e8-a601-4c45-b3e6-8c5fe8996b94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25189", "type": "seen", "source": "https://t.me/cvedetector/17612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25189 - ZOO-Project Web Processing Service (WPS) Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25189 \nPublished : Feb. 10, 2025, 10:15 p.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : The ZOO-Project is an open source processing platform. A reflected Cross-Site Scripting vulnerability exists in the ZOO-Project Web Processing Service (WPS) publish.py CGI script prior to commit 7a5ae1a. The script reflects user input from the `jobid` parameter in its HTTP response without proper HTML encoding or sanitization. When a victim visits a specially crafted URL pointing to this endpoint, arbitrary JavaScript code can be executed in their browser context. The vulnerability occurs because the CGI script directly outputs the query string parameters into the HTML response without escaping HTML special characters. An attacker can inject malicious JavaScript code through the `jobid` parameter which will be executed when rendered by the victim's browser. Commit 7a5ae1a contains a fix for the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T01:27:19.000000Z"}, {"uuid": "a1f0d23e-8d48-40c4-af7a-02bb9cc6757e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-25181", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/945ed962-2e0b-46af-a43e-cc92e2d2a8d6", "content": "", "creation_timestamp": "2026-02-02T12:26:08.709738Z"}, {"uuid": "8a0f9298-bf5c-4587-8f7d-f5defdfda1d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25182", "type": "seen", "source": "https://gist.github.com/alon710/63fa2f1b8363f1b0421ae7bb4a3d42bc", "content": "", "creation_timestamp": "2026-01-24T22:43:32.000000Z"}, {"uuid": "6499962c-20d1-4de8-af61-a3fc40a91ba0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25183", "type": "seen", "source": "https://t.me/cvedetector/17515", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25183 - LLM vLLM Hash Collision Cache Manipulation\", \n  \"Content\": \"CVE ID : CVE-2025-25183 \nPublished : Feb. 7, 2025, 8:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Maliciously constructed statements can lead to hash collisions, resulting in cache reuse, which can interfere with subsequent responses and cause unintended behavior. Prefix caching makes use of Python's built-in hash() function. As of Python 3.12, the behavior of hash(None) has changed to be a predictable constant value. This makes it more feasible that someone could try exploit hash collisions. The impact of a collision would be using cache that was generated using different content. Given knowledge of prompts in use and predictable hashing behavior, someone could intentionally populate the cache using a prompt known to collide with another prompt in use. This issue has been addressed in version 0.7.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T23:01:23.000000Z"}, {"uuid": "584a6ad4-401a-4182-98c7-34390ba66387", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25187", "type": "seen", "source": "https://t.me/cvedetector/17531", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25187 - \"Joplin Cross-Site Scripting (XSS) and Remote Code Execution\"\", \n  \"Content\": \"CVE ID : CVE-2025-25187 \nPublished : Feb. 7, 2025, 11:15 p.m. | 2\u00a0hours, 19\u00a0minutes ago \nDescription : Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. This vulnerability is caused by adding note titles to the document using React's `dangerouslySetInnerHTML`, without first escaping HTML entities. Joplin lacks a Content-Security-Policy with a restrictive `script-src`. This allows arbitrary JavaScript execution via inline `onclick`/`onload` event handlers in unsanitized HTML. Additionally, Joplin's main window is created with `nodeIntegration` set to `true`, allowing arbitrary JavaScript execution to result in arbitrary code execution. Anyone who 1) receives notes from unknown sources and 2) uses ctrl-p to search is impacted. This issue has been addressed in version 3.1.24 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-08T03:12:10.000000Z"}, {"uuid": "413629c3-29b7-47a8-b0d6-2bbf1796791b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25186", "type": "published-proof-of-concept", "source": "https://t.me/cvedetector/17565", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25186 - Apache Net::IMAP Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25186 \nPublished : Feb. 10, 2025, 4:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser.  At any time while the client is connected, a malicious server can send  can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T18:45:35.000000Z"}, {"uuid": "b658d2db-8a97-4567-931c-1c5c22b90f5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25184", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4508", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25184\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ## Summary\n\n`Rack::CommonLogger` can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs.\n\n## Details\n\nWhen a user provides the authorization credentials via `Rack::Auth::Basic`, if success, the username will be put in `env['REMOTE_USER']` and later be used by `Rack::CommonLogger` for logging purposes.\n\nThe issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile.\n\n## Impact\n\nAttackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files.\n\n## Mitigation\n\n- Update to the latest version of Rack.\n\ud83d\udccf Published: 2025-02-12T19:18:35Z\n\ud83d\udccf Modified: 2025-02-14T22:16:55Z\n\ud83d\udd17 References:\n1. https://github.com/rack/rack/security/advisories/GHSA-7g2v-jj9q-g3rg\n2. https://nvd.nist.gov/vuln/detail/CVE-2025-25184\n3. https://github.com/rack/rack/commit/074ae244430cda05c27ca91cda699709cfb3ad8e\n4. https://github.com/rack/rack\n5. https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-25184.yml", "creation_timestamp": "2025-02-14T23:10:45.000000Z"}, {"uuid": "170724f8-0ea8-43ba-a8e5-bafccfcf3356", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3880", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25181\n\ud83c\udfe2 Vendor: Advantive\n\ud83d\udda5\ufe0f Product: VeraCore\n\ud83d\udd39 Description: A SQL injection vulnerability in timeoutWarning.asp in Advantive VeraCore through 2025.1.0 allows remote attackers to execute arbitrary SQL commands via the PmSess1 parameter.\n\ud83d\udccf Published: 2025-02-03T00:00:00Z\n\ud83d\udd17 References:\n1. https://intezer.com/blog/research/xe-group-exploiting-zero-days/\n2. https://www.cybersecurity-help.cz/vdb/SB2025020546", "creation_timestamp": "2025-02-08T23:20:26.000000Z"}, {"uuid": "723b6360-6dc6-4c0d-bcd8-4143f57a368f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25182", "type": "seen", "source": "https://t.me/cvedetector/17920", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25182 - Stroom ALB Authentication Bypass and SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25182 \nPublished : Feb. 12, 2025, 5:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : Stroom is a data processing, storage and analysis platform. A vulnerability exists starting in version 7.2-beta.53 and prior to versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2 that allows authentication bypass to a Stroom system when configured with ALB and installed in a way that the application is accessible not through the ALB itself. This vulnerability may also allow for server-side request forgery which may lead to code execution or further privileges escalations when using the AWS metadata URL. This scenario assumes that Stroom must be configured to use ALB Authentication integration and the application is network accessible. The vulnerability has been fixed in versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2. \nSeverity: 9.4 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T20:14:20.000000Z"}, {"uuid": "02442aac-f9a5-4dd2-b1fc-c0b587c6d5cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7023", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25181\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: A SQL injection vulnerability in timeoutWarning.asp in Advantive VeraCore through 2025.1.0 allows remote attackers to execute arbitrary SQL commands via the PmSess1 parameter.\n\ud83d\udccf Published: 2025-02-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-10T17:17:34.093Z\n\ud83d\udd17 References:\n1. https://advantive.my.site.com/support/s/knowledge\n2. https://intezer.com/blog/research/xe-group-exploiting-zero-days/\n3. https://www.solissecurity.com/en-us/insights/xe-group-from-credit-card-skimming-to-exploiting-zero-days/", "creation_timestamp": "2025-03-10T17:38:20.000000Z"}, {"uuid": "23f0b7cb-99f3-421b-bb21-b4b477d544f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25184", "type": "published-proof-of-concept", "source": "https://t.me/cvedetector/17911", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25184 - Rack Common Logger CRLF Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25184 \nPublished : Feb. 12, 2025, 5:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.11, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will be put in env['REMOTE_USER'] and later be used by Rack::CommonLogger for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. Versions 2.2.11, 3.0.12, and 3.1.11 contain a fix. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T20:14:07.000000Z"}, {"uuid": "0fd6dc73-4914-4b6a-856f-28fac59186d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "https://t.me/cvedetector/17102", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25181 - Advantive VeraCore SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25181 \nPublished : Feb. 3, 2025, 8:15 p.m. | 22\u00a0minutes ago \nDescription : A SQL injection vulnerability in timeoutWarning.asp in Advantive VeraCore through 2025.1.0 allows remote attackers to execute arbitrary SQL commands via the PmSess1 parameter. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T21:59:58.000000Z"}, {"uuid": "4e353368-e734-4283-bbb7-f1e835b770bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25181", "type": "seen", "source": "Telegram/XAyayee7Pu1r8gHKKYylMIQcAg8pYjMrlwY3qnfKXdlFW4F6", "content": "", "creation_timestamp": "2025-03-11T04:41:14.000000Z"}]}