{"vulnerability": "CVE-2025-2519", "sightings": [{"uuid": "bf391b38-0096-4384-aeff-fb18b22d5a72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25193", "type": "seen", "source": "https://bsky.app/profile/knaepp.bsky.social/post/3ll7jf2emfq2w", "content": "", "creation_timestamp": "2025-03-25T14:50:05.131923Z"}, {"uuid": "8076b2e8-bc96-47f6-87ae-20e907f198a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25193", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981856193211167", "content": "", "creation_timestamp": "2025-02-10T22:05:01.096585Z"}, {"uuid": "4228972f-4554-4677-ac6c-8ad88beb5ba3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25190", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981896109702786", "content": "", "creation_timestamp": "2025-02-10T22:15:10.279047Z"}, {"uuid": "1079f65c-e492-4a2a-bca3-f6e95e832731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25190", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhu6b2x24b27", "content": "", "creation_timestamp": "2025-02-10T22:16:08.143025Z"}, {"uuid": "17f0527e-7a19-4b36-8c58-4b2ea796cc37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25193", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhu6b5ecvd2x", "content": "", "creation_timestamp": "2025-02-10T22:16:10.784346Z"}, {"uuid": "1e0bee74-e017-4c76-82d8-7363444141ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25194", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhublkatf42q", "content": "", "creation_timestamp": "2025-02-10T23:15:40.973811Z"}, {"uuid": "025c5d11-c2b4-471d-a4ae-13ea4006fd2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25190", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhueue5wng2t", "content": "", "creation_timestamp": "2025-02-11T00:14:18.005388Z"}, {"uuid": "c1ca3e9b-ff28-4d97-8b73-38516459d1df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25193", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhueufbheg2t", "content": "", "creation_timestamp": "2025-02-11T00:14:22.140751Z"}, {"uuid": "139ce866-30b0-425a-be2a-37f0bb91cda9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25194", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhueufj3lm2p", "content": "", "creation_timestamp": "2025-02-11T00:14:22.929487Z"}, {"uuid": "fd32660c-5d36-4941-9a78-8d31b7c9bde1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25198", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113992187494675681", "content": "", "creation_timestamp": "2025-02-12T17:52:24.209054Z"}, {"uuid": "851c3bf1-33b7-4c17-b413-f43606751e84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25199", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113992187510032617", "content": "", "creation_timestamp": "2025-02-12T17:52:24.404695Z"}, {"uuid": "f599da62-90d5-4f56-b6bd-fb307282dfa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25198", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyrr7c7jn2s", "content": "", "creation_timestamp": "2025-02-12T18:15:49.640184Z"}, {"uuid": "1b4a8412-f940-400f-9536-44379f134138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25199", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyrrbreq52s", "content": "", "creation_timestamp": "2025-02-12T18:15:52.445741Z"}, {"uuid": "b20b73c5-618a-4336-b1d9-157770be6a00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25195", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113998796668998455", "content": "", "creation_timestamp": "2025-02-13T21:53:12.358681Z"}, {"uuid": "328e7145-4642-4107-b2b5-1a0ebbf6f8e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25195", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li3pny7kot2p", "content": "", "creation_timestamp": "2025-02-13T22:16:13.511593Z"}, {"uuid": "5d04c0bd-f729-4e81-a5ba-21ebc56c92d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25193", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lzzeuwgnak2r", "content": "", "creation_timestamp": "2025-09-30T01:31:25.718128Z"}, {"uuid": "7f9dcc75-2de9-4d7e-90f4-94dd5aeb81aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25193", "type": "seen", "source": "https://bsky.app/profile/knaepp.bsky.social/post/3ll7sd5r3b72s", "content": "", "creation_timestamp": "2025-03-25T17:30:05.258089Z"}, {"uuid": "561719c2-5fcc-4d2e-8b71-df4083cfd73b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25198", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3liec6nuzqc2y", "content": "", "creation_timestamp": "2025-02-17T08:09:00.771235Z"}, {"uuid": "32837a26-804c-47fe-a44b-b161448a55a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25193", "type": "seen", "source": "https://bsky.app/profile/knaepp.bsky.social/post/3llbfqbd4ju2w", "content": "", "creation_timestamp": "2025-03-26T08:50:06.140999Z"}, {"uuid": "dab4a77c-4400-4a95-a2e6-849d9700b301", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25198", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m3dnrmmehl2j", "content": "", "creation_timestamp": "2025-10-16T21:02:46.105308Z"}, {"uuid": "05eaa3ec-20df-4e62-a9eb-32180b6196fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25191", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljqit6peqp2s", "content": "", "creation_timestamp": "2025-03-06T22:04:58.710547Z"}, {"uuid": "9decbd90-a9b5-4c94-b149-fc34dd009413", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25197", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmhta57qbq2r", "content": "", "creation_timestamp": "2025-04-10T15:32:54.685316Z"}, {"uuid": "2c77e1e9-1a9f-4f01-9437-f39152c7b04c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25195", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "9fc02cec-bfc7-435c-8118-62bfe5382070", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25196", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "7ed4e990-9208-49eb-9e5f-b0a1f964692f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25191", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:23.000000Z"}, {"uuid": "c2611559-6b69-4468-821e-8e53d6547632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25191", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:43.000000Z"}, {"uuid": "460fba22-3622-46d3-8d40-59a174afac7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25198", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mgb6lqcoai2q", "content": "", "creation_timestamp": "2026-03-04T21:02:34.717788Z"}, {"uuid": "df9d38a6-c168-43c4-b6e0-204f5f14ef95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-25193", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1729", "content": "", "creation_timestamp": "2026-01-21T04:00:00.000000Z"}, {"uuid": "586d1f46-a8bb-4107-a9e7-61def984794f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25198", "type": "seen", "source": "https://bsky.app/profile/exploitdb-bot.bsky.social/post/3mg5n53vzog2j", "content": "", "creation_timestamp": "2026-03-03T11:12:08.150105Z"}, {"uuid": "4b15f9b3-a529-4f08-910b-11e79bde5f7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25196", "type": "seen", "source": "https://t.me/cvedetector/18481", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25196 - OpenFGA Authorization Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25196 \nPublished : Feb. 19, 2025, 9:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA &lt; v1.8.4 (Helm chart &lt; openfga-0.2.22, docker &lt; v.1.8.4) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users on OpenFGA v1.8.4 or previous, specifically under the following conditions are affected by this authorization bypass vulnerability: 1. Calling Check API or ListObjects with a model that has a relation directly assignable to both public access AND userset with the same type. 2. A type bound public access tuple is assigned to an object. 3. userset tuple is not assigned to the same object. and 4. Check request's user field is a userset that has the same type as the type bound public access tuple's user type. Users are advised to upgrade to v1.8.5 which is backwards compatible. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T23:46:03.000000Z"}, {"uuid": "85e65915-a7e5-4d95-8e03-566ebc654d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-25193", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "ef48fa6a-23dd-44d8-9f8e-f9a968a97bd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25193", "type": "seen", "source": "https://t.me/cvedetector/17614", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25193 - Netty Windows Environment File Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2025-25193 \nPublished : Feb. 10, 2025, 10:15 p.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : Netty, an asynchronous, event-driven network application framework, has a vulnerability in versions up to and including 4.1.118.Final. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. A similar issue was previously reported as CVE-2024-47535. This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. Commit d1fbda62d3a47835d3fb35db8bd42ecc205a5386 contains an updated fix. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T01:27:23.000000Z"}, {"uuid": "2b120dd3-fda0-4830-a08a-06ee527b24bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25198", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/55920", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener, automatic cookie/CSRF handling, captures first reset link.\nURL\uff1ahttps://github.com/Groppoxx/CVE-2025-25198-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-10-18T02:20:27.000000Z"}, {"uuid": "214b81be-cbd9-40a7-adfc-0bdd0afddfeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25192", "type": "seen", "source": "https://t.me/cvedetector/18906", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25192 - \"GLPI Debug Mode Information Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2025-25192 \nPublished : Feb. 25, 2025, 6:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 contains a patch. As a workaround, one may delete the `install/update.php` file. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-25T21:33:59.000000Z"}, {"uuid": "4249cf32-dd50-467c-8bbe-567ab490da4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25190", "type": "seen", "source": "https://t.me/cvedetector/17613", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25190 - \"ZOO-Project WPS Server XSS EchoProcess Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-25190 \nPublished : Feb. 10, 2025, 10:15 p.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : The ZOO-Project is an open source processing platform. The ZOO-Project Web Processing Service (WPS) Server contains a Cross-Site Scripting (XSS) vulnerability in its EchoProcess service prior to commit 7a5ae1a. The vulnerability exists because the EchoProcess service directly reflects user input in its output without proper sanitization when handling complex inputs.The service accepts various input formats including XML, JSON, and SVG, and returns the content based on the requested MIME type. When processing SVG content and returning it with the image/svg+xml MIME type, the server fails to sanitize potentially malicious JavaScript in attributes like onload, allowing arbitrary JavaScript execution in the victim's browser context. This vulnerability is particularly dangerous because it exists in a service specifically designed to echo back user input, and the lack of proper sanitization in combination with SVG handling creates a reliable XSS vector. Commit 7a5ae1a contains a fix for the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T01:27:22.000000Z"}, {"uuid": "dd83e037-8e52-4a67-aae5-2b050685578e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25194", "type": "seen", "source": "https://t.me/cvedetector/17608", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25194 - Lemmy ActivityPub Federation SSRF\", \n  \"Content\": \"CVE ID : CVE-2025-25194 \nPublished : Feb. 10, 2025, 11:15 p.m. | 29\u00a0minutes ago \nDescription : Lemmy, a link aggregator and forum for the fediverse, is vulnerable to server-side request forgery via a dependency on activitypub_federation, a framework for ActivityPub federation in Rust. This vulnerability, which is present in versions 0.6.2 and prior of activitypub_federation and versions 0.19.8 and prior of Lemmy, allows a user to bypass any predefined hardcoded URL path or security anti-Localhost mechanism and perform an arbitrary GET request to any Host, Port and URL using a Webfinger Request. As of time of publication, a fix has not been made available. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T01:27:16.000000Z"}, {"uuid": "a70e17f4-309f-4320-b5d5-769d51e9a4fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25192", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5341", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25192\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 contains a patch. As a workaround, one may delete the `install/update.php` file.\n\ud83d\udccf Published: 2025-02-25T17:58:20.388Z\n\ud83d\udccf Modified: 2025-02-25T17:58:20.388Z\n\ud83d\udd17 References:\n1. https://github.com/glpi-project/glpi/security/advisories/GHSA-86cx-hcfc-8mm8\n2. https://github.com/glpi-project/glpi/releases/tag/10.0.18", "creation_timestamp": "2025-02-25T18:22:35.000000Z"}, {"uuid": "43834e94-6eec-4716-8393-fe75f7382a88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25191", "type": "seen", "source": "Telegram/t03x6pNx24-eTJshAV_FsHfWCrtfXMGO-U-1q-EL3BMUSY_n", "content": "", "creation_timestamp": "2025-03-08T04:34:11.000000Z"}, {"uuid": "184042c7-c183-46db-8e0f-8ffd818b8128", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25193", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4455", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25193\n\ud83d\udd25 CVSS Score: 5.4 (CVSS_V3)\n\ud83d\udd39 Description: ### Summary\nAn unsafe reading of environment file could potentially cause a denial of service in Netty.\nWhen loaded on an Windows application, Netty attemps to load a file that does not exist. If an attacker creates such a large file, the Netty application crash.\n\n### Details\nA similar issue was previously reported in https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv\nThis issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit.\n\n\n### PoC\nThe PoC is the same as for https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv with the detail that the file should only contain null-bytes; 0x00.\nWhen the null-bytes are encountered by the `InputStreamReader`, it will issue replacement characters in its charset decoding, which will fill up the line-buffer in the `BufferedReader.readLine()`, because the replacement character is not a line-break character.\n\n### Impact\nImpact is the same as https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv\n\ud83d\udccf Published: 2025-02-10T18:14:47Z\n\ud83d\udccf Modified: 2025-02-14T15:02:31Z\n\ud83d\udd17 References:\n1. https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx\n2. https://nvd.nist.gov/vuln/detail/CVE-2025-25193\n3. https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386\n4. https://github.com/netty/netty", "creation_timestamp": "2025-02-14T15:15:16.000000Z"}, {"uuid": "97ad64ff-6a90-478a-9d0d-a7e885b209e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25199", "type": "seen", "source": "https://t.me/cvedetector/17907", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25199 - Microsoft Go-crypto Winnative: Unreleased Key Handle Memory Leak\", \n  \"Content\": \"CVE ID : CVE-2025-25199 \nPublished : Feb. 12, 2025, 6:15 p.m. | 46\u00a0minutes ago \nDescription : go-crypto-winnative Go crypto backend for Windows using Cryptography API: Next Generation (CNG). Prior to commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41, calls to `cng.TLS1PRF` don't release the key handle, producing a small memory leak every time. Commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41 contains a fix for the issue. The fix is included in versions 1.23.6-2 and 1.22.12-2 of the Microsoft build of go, as well as in the pseudoversion 0.0.0-20250211154640-f49c8e1379ea of the `github.com/microsoft/go-crypto-winnative` Go package. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T20:14:01.000000Z"}, {"uuid": "968abbf0-9387-4e05-8c58-2b86379c781d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25195", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4356", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25195\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-13T22:15:13.100\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/zulip/zulip/commit/50256f48314250978f521ef439cafa704e056539\n2. https://github.com/zulip/zulip/commit/75be449d456d29fef27e9d1828bafa30174284b4\n3. https://github.com/zulip/zulip/commit/a2a1a7f8d152296c8966f1380872c0ac69e5c87e\n4. https://github.com/zulip/zulip/security/advisories/GHSA-x8cx-3hq5-4wj9", "creation_timestamp": "2025-02-13T23:11:16.000000Z"}, {"uuid": "d79f2033-03af-4210-b997-b39d1e6784fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25193", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25193\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Netty, an asynchronous, event-driven network application framework, has a vulnerability in versions up to and including 4.1.118.Final. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. A similar issue was previously reported as CVE-2024-47535. This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. Commit d1fbda62d3a47835d3fb35db8bd42ecc205a5386 contains an updated fix.\n\ud83d\udccf Published: 2025-02-10T22:02:17.197Z\n\ud83d\udccf Modified: 2025-02-21T18:03:38.211Z\n\ud83d\udd17 References:\n1. https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx\n2. https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386", "creation_timestamp": "2025-02-21T18:18:54.000000Z"}, {"uuid": "90cad3dc-0ab0-45e9-951e-310f94d485e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2519", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10821", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2519\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: The Sreamit theme for WordPress is vulnerable to arbitrary file downloads in all versions up to, and including, 4.0.1. This is due to insufficient file validation in the 'st_send_download_file' function. This makes it possible for authenticated attackers, with subscriber-level access and above, to download arbitrary files.\n\ud83d\udccf Published: 2025-04-08T01:44:21.955Z\n\ud83d\udccf Modified: 2025-04-08T01:44:21.955Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/fd28c405-ed2f-435a-806c-1fc43cac0f80?source=cve\n2. https://themeforest.net/item/streamit-video-streaming-wordpress-theme/29772881\n3. https://documentation.iqonic.design/streamit/change-log/streamit-v4-0/", "creation_timestamp": "2025-04-08T02:45:43.000000Z"}, {"uuid": "60657d14-1272-40ce-b358-27a6a8449580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25198", "type": "published-proof-of-concept", "source": "Telegram/sHgA-eh7Ixai0xpiEbF_fK8-0YyKLTE6GOn4mKGdY4CpWPE", "content": "", "creation_timestamp": "2025-10-14T09:00:05.000000Z"}, {"uuid": "2f19fc98-485b-4a3a-b107-19cfb943dc91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25191", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6765", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25191\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: Group-Office is an enterprise CRM and groupware tool. This Stored XSS vulnerability exists where user input in the Name field is not properly sanitized before being stored. This vulnerability is fixed in 6.8.100.\n\ud83d\udccf Published: 2025-03-06T18:41:00.761Z\n\ud83d\udccf Modified: 2025-03-06T20:35:12.106Z\n\ud83d\udd17 References:\n1. https://github.com/Intermesh/groupoffice/security/advisories/GHSA-j7p3-v652-p3gf\n2. https://github.com/Intermesh/groupoffice/commit/c5c83e19a5cdf93b0e758726c97597861f1d6eda", "creation_timestamp": "2025-03-06T21:34:36.000000Z"}, {"uuid": "4db17140-5b17-49a8-8ba6-bd5b58fb87bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25195", "type": "seen", "source": "https://t.me/cvedetector/18064", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25195 - Zulip Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25195 \nPublished : Feb. 13, 2025, 10:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : Zulip is an open source team chat application. A weekly cron job (added in 50256f48314250978f521ef439cafa704e056539) demotes channels to being \"inactive\" after they have not received traffic for 180 days.  However, upon doing so, an event was sent to all users in the organization, not just users in the channel.  This event contained the name of the private channel. Similarly, the same commit (50256f48314250978f521ef439cafa704e056539) added functionality to notify clients when channels stopped being \"inactive.\"  The first message sent to a private channel which had not previously had any messages for over 180 days (and were thus already marked \"inactive\") would leak an event to all users in the organization; this event also contained the name of the private channel. Commits 75be449d456d29fef27e9d1828bafa30174284b4 and a2a1a7f8d152296c8966f1380872c0ac69e5c87e fixed the issue. This vulnerability only existed in `main`, and was not part of any published versions. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T01:32:28.000000Z"}, {"uuid": "22ea509b-c635-440f-89e4-376ceeb2a1f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25198", "type": "seen", "source": "https://t.me/cvedetector/17906", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25198 - Mailcow: Dockerized Host Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25198 \nPublished : Feb. 12, 2025, 6:15 p.m. | 46\u00a0minutes ago \nDescription : mailcow: dockerized is an open source groupware/email suite based on docker. Prior to version 2025-01a, a vulnerability in mailcow's password reset functionality allows an attacker to manipulate the `Host HTTP` header to generate a password reset link pointing to an attacker-controlled domain. This can lead to account takeover if a user clicks the poisoned link. Version 2025-01a contains a patch. As a workaround, deactivate the password reset functionality by clearing `Notification email sender` and `Notification email subject` under System -&gt; Configuration -&gt; Options -&gt; Password Settings. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T20:14:00.000000Z"}, {"uuid": "f0304669-a42d-4795-99d9-9d566b992552", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2519", "type": "seen", "source": "https://t.me/cvedetector/22382", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2519 - Sreamit WordPress Arbitrary File Download Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2519 \nPublished : April 8, 2025, 2:15 a.m. | 52\u00a0minutes ago \nDescription : The Sreamit theme for WordPress is vulnerable to arbitrary file downloads in all versions up to, and including, 4.0.1. This is due to insufficient file validation in the 'st_send_download_file' function. This makes it possible for authenticated attackers, with subscriber-level access and above, to download arbitrary files. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T05:37:38.000000Z"}, {"uuid": "90841c33-5bd2-410b-806a-2b57aac952e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25197", "type": "seen", "source": "https://t.me/cvedetector/22667", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25197 - Silverstripe Elemental Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-25197 \nPublished : April 10, 2025, 1:15 p.m. | 2\u00a0hours, 3\u00a0minutes ago \nDescription : Silverstripe Elemental extends a page type to swap the content area for a list of manageable elements to compose a page out of rather than a single text field. An elemental block can include an XSS payload, which can be executed when viewing the \"Content blocks in use\" report. The vulnerability is specific to that report and is a result of failure to cast input prior to including it in the grid field. This vulnerability is fixed in 5.3.12. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T17:52:19.000000Z"}, {"uuid": "183e246c-6ce5-421e-93f5-f3a33312ec00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25191", "type": "seen", "source": "https://t.me/cvedetector/19738", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25191 - Group-Office Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25191 \nPublished : March 6, 2025, 7:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Group-Office is an enterprise CRM and groupware tool. This Stored XSS vulnerability exists where user input in the Name field is not properly sanitized before being stored. This vulnerability is fixed in 6.8.100. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T22:12:23.000000Z"}]}