{"vulnerability": "CVE-2025-2538", "sightings": [{"uuid": "d88a7a16-7f01-439f-a03e-62c095eed14a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2538", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114197194526636726", "content": "", "creation_timestamp": "2025-03-20T22:48:23.539815Z"}, {"uuid": "3bd9b2a8-617b-4861-8846-b951c23f241d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2538", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lktozltwmp2e", "content": "", "creation_timestamp": "2025-03-20T21:59:06.893319Z"}, {"uuid": "92497fec-7acf-42bf-8a51-f2dcd68720b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25382", "type": "seen", "source": "https://t.me/cvedetector/19963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25382 - \"Information Kerala Mission SANCHAYA Payment Amount Manipulation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-25382 \nPublished : March 10, 2025, 4:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : An issue in the Property Tax Payment Portal in Information Kerala Mission SANCHAYA v3.0.4 allows attackers to arbitrarily modify payment amounts via a crafted request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T19:02:29.000000Z"}, {"uuid": "efef2212-4891-4de4-8d4b-cf2b2491ddb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25388", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li55ph2hn52c", "content": "", "creation_timestamp": "2025-02-14T12:00:15.519244Z"}, {"uuid": "40bb3935-2c8f-4800-b4ee-cc1895e85337", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25382", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2cvze45e26", "content": "", "creation_timestamp": "2025-03-10T19:45:47.947635Z"}, {"uuid": "c58222b0-bf06-4a7f-98ec-026826e2f527", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2538", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114196847021806320", "content": "", "creation_timestamp": "2025-03-20T21:20:00.806820Z"}, {"uuid": "8d2c4b17-4599-4893-9822-7f169ab1e9e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2538", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lktny4lwwd2s", "content": "", "creation_timestamp": "2025-03-20T21:40:23.072778Z"}, {"uuid": "28653eed-9014-41f2-bb93-fe5332a669d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25389", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113997667839106491", "content": "", "creation_timestamp": "2025-02-13T17:06:07.725351Z"}, {"uuid": "3fc19430-8b07-46f6-89ac-fba8d4dc3460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25387", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113997690740314430", "content": "", "creation_timestamp": "2025-02-13T17:11:57.164405Z"}, {"uuid": "a003d66f-f014-4d31-b7eb-3876370e036b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25387", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li36xv4jcz2a", "content": "", "creation_timestamp": "2025-02-13T17:17:32.311351Z"}, {"uuid": "099d42f8-765c-44a6-aabf-28613f909260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25388", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li36xxj6mv2a", "content": "", "creation_timestamp": "2025-02-13T17:17:34.536366Z"}, {"uuid": "d87f34f6-8ed5-4bd8-a3ef-b07352691e2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25389", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li36xzrstv2a", "content": "", "creation_timestamp": "2025-02-13T17:17:36.916938Z"}, {"uuid": "c9ab5824-6d0f-47d0-809c-a803cac7c7f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25387", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li3jyt5gzb2z", "content": "", "creation_timestamp": "2025-02-13T20:34:55.553395Z"}, {"uuid": "5fad7c59-e7c7-4f4a-9cf7-48295d885264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25389", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li3jyttx2324", "content": "", "creation_timestamp": "2025-02-13T20:34:59.496649Z"}, {"uuid": "4db3e293-99de-4d0e-a2ee-0f74d2c4f126", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25388", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li3jyuhh5726", "content": "", "creation_timestamp": "2025-02-13T20:35:02.991886Z"}, {"uuid": "d8f3ac88-7878-4dc8-8422-02b07911a553", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25388", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113998541921341098", "content": "", "creation_timestamp": "2025-02-13T20:48:31.150049Z"}, {"uuid": "a6236cd6-1768-422e-b820-f267857d4848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25388", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li3viffc2h2k", "content": "", "creation_timestamp": "2025-02-14T00:00:31.284996Z"}, {"uuid": "4b415325-ec18-4c77-9afe-0fbb5ff28a05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25389", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114003734070083765", "content": "", "creation_timestamp": "2025-02-14T18:48:51.417762Z"}, {"uuid": "3b884cdb-a6df-4dea-8c2b-57b56e079d30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2538", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkv2o6352u2z", "content": "", "creation_timestamp": "2025-03-21T11:00:10.001477Z"}, {"uuid": "0878b4c6-429c-44fa-b8df-db3bce1cd2dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2538", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}, {"uuid": "f8a58222-e145-4b56-bbdb-673fff596d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25389", "type": "seen", "source": "https://t.me/cvedetector/18020", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25389 - PhpGurukul Land Record System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-25389 \nPublished : Feb. 13, 2025, 5:17 p.m. | 24\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /admin/forgot-password.php in Phpgurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the contactno POST request parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T18:50:23.000000Z"}, {"uuid": "6a7f161e-d9cf-46f8-a58d-2dc312a747fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25381", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6884", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25381\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Incorrect access control in the KSRTC AWATAR app of Karnataka State Road Transport Corporation v1.3.0 allows to view sensitive information such as usernames and passwords.\n\ud83d\udccf Published: 2025-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-07T19:47:26.887Z\n\ud83d\udd17 References:\n1. https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25381/README.md", "creation_timestamp": "2025-03-07T20:40:31.000000Z"}, {"uuid": "1fdb43cb-aa63-4038-bbaf-1e2be6b8f50f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2538", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8348", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2538\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A specific type of ArcGIS Enterprise deployment, is vulnerable to a Password Recovery Exploitation vulnerability in Portal, that could allow an attacker to reset the password on the built in admin account.\n\ud83d\udccf Published: 2025-03-20T20:50:02.928Z\n\ud83d\udccf Modified: 2025-03-21T15:14:57.145Z\n\ud83d\udd17 References:\n1. https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2025-update-1-patch/", "creation_timestamp": "2025-03-21T15:19:26.000000Z"}, {"uuid": "2fd556cb-6dbc-49e5-ad47-8c887a6749d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25388", "type": "seen", "source": "https://t.me/cvedetector/18019", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25388 - PHPGurukul Land Record System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-25388 \nPublished : Feb. 13, 2025, 5:17 p.m. | 24\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /admin/edit-propertytype.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the editid GET request parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T18:50:22.000000Z"}, {"uuid": "6ebaa78e-7920-455b-b826-b8ed9d92b495", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25387", "type": "seen", "source": "https://t.me/cvedetector/18018", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25387 - PHPGurukul Land Record System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25387 \nPublished : Feb. 13, 2025, 5:17 p.m. | 24\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /admin/manage-propertytype.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the propertytype POST request parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T18:50:22.000000Z"}, {"uuid": "73c46567-d279-4c2f-9cce-671656745571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2538", "type": "seen", "source": "https://t.me/cvedetector/20773", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2538 - Esri ArcGIS Enterprise Portal Password Recovery Exploitation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2538 \nPublished : March 20, 2025, 9:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : A specific type of ArcGIS Enterprise deployment, is vulnerable to a Password Recovery Exploitation vulnerability in Portal, that could allow an attacker to reset the password on the built in admin account. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T00:05:38.000000Z"}, {"uuid": "c41c30ed-6f31-4ac9-929b-8244beeb8c3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25381", "type": "seen", "source": "https://t.me/cvedetector/19741", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25381 - KSRTC AWATAR Password Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-25381 \nPublished : March 6, 2025, 7:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Incorrect access control in the KSRTC AWATAR app of Karnataka State Road Transport Corporation v1.3.0 allows to view sensitive information such as usernames and passwords. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T22:12:28.000000Z"}, {"uuid": "620ba4a3-9619-4aba-822a-f409e88ea66a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25388", "type": "seen", "source": "Telegram/w_YEG2D8XLRTlq0S5ArDhruAxjAalRu-GajTsbBWlL5Sctq6", "content": "", "creation_timestamp": "2025-02-14T10:09:23.000000Z"}, {"uuid": "b4da0cff-15a4-49bb-95df-13a60f504836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25381", "type": "seen", "source": "Telegram/mdEZ2BU2JO91Awb8yI56jdsbO6C_X1VePMSgHVILnJ6RWMBD", "content": "", "creation_timestamp": "2025-03-08T04:35:53.000000Z"}, {"uuid": "3e82f93a-b55d-4f75-83c9-cc57a265e0dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2538", "type": "seen", "source": "Telegram/ovgSwv4DzH1i4cBEpy04O7HypJ1JWUd5CIOMvicaoyVyycE", "content": "", "creation_timestamp": "2025-03-20T22:30:49.000000Z"}, {"uuid": "4fa8e8ff-bcaf-4d3d-96bf-1b8dad72091f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2538", "type": "seen", "source": "https://t.me/true_secator/6889", "content": "\u041f\u043e\u0441\u043b\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0435\u0439 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 ForumTroll \u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0432\u0448\u0438\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Google 0-day \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Chrome, \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Mozilla \u0442\u0430\u043a\u0436\u0435\u00a0\u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u00a0\u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0437\u0430\u043c\u0435\u0442\u0438\u0432 \u0441\u0445\u043e\u0436\u0438\u0435 \u0437\u0430\u043a\u043e\u043d\u043e\u043c\u0435\u0440\u043d\u043e\u0441\u0442\u0438 \u0432 \u043a\u043e\u0434\u0435 \u0441\u0432\u043e\u0435\u0433\u043e \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 \u0434\u043b\u044f Windows.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u043f\u043e\u043c\u0438\u043c\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u043a\u043e\u0434\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0442\u0440\u0443\u0434\u0438\u0442\u044c\u0441\u044f \u043d\u0430\u0434 \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u043e \u0447\u0430\u0441\u0442\u0438 \u0431\u044e\u0434\u0436\u0435\u0442\u0430.\n\n\u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u043a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 Consumer Affairs, Mozilla \u043e\u0431\u0440\u0430\u0442\u0438\u043b\u0430\u0441\u044c \u043a \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0441 \u043f\u0440\u043e\u0441\u044c\u0431\u043e\u0439 \u043f\u043e\u0436\u0435\u0440\u0442\u0432\u043e\u0432\u0430\u0442\u044c \u043d\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0443 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Firefox \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u0443\u0442\u0440\u0430\u0442\u0438\u043b\u0430 \u0444\u0438\u043d\u0430\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0432 \u0440\u0430\u0437\u043c\u0435\u0440\u0435 2,5 \u043c\u043b\u043d. \u0434\u043e\u043b\u043b. \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u0421\u0428\u0410 \u043f\u043e \u043b\u0438\u043d\u0438\u0438 USAID.\n\n\u0418 \u0434\u0435\u043b\u043e \u0434\u0430\u0436\u0435 \u043d\u0435 \u0442\u043e\u043c, \u0447\u0442\u043e 2,5 \u043c\u043b\u043d. \u0432 \u043e\u0431\u0449\u0435\u043c \u043c\u043d\u043e\u0433\u043e\u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043d\u043e\u043c \u0431\u044e\u0434\u0436\u0435\u0442\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 (653 \u043c\u043b\u043d. \u0434\u043e\u043b\u043b. \u0434\u043e\u0445\u043e\u0434\u0430 \u0432 2023 \u0433\u043e\u0434\u0443) - \u044d\u0442\u043e \u043a\u0430\u043a \u043a\u0430\u043f\u043b\u044f \u0432 \u043c\u043e\u0440\u0435, \u0431\u043e\u043b\u044c\u0448\u0435 \u0432\u043e\u043f\u0440\u043e\u0441\u043e\u0432 \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u0432\u0435\u0437\u0434\u0435\u0441\u0443\u0449\u0435\u0435 \u0443\u0447\u0430\u0441\u0442\u0438\u0435 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0445 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431 \u0432 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0442\u0435\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043a\u043e\u043d\u0446\u0435\u043f\u0442\u0443\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u043f\u043e\u0434 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0438 \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u043e\u0441\u0442\u044c.\n\n\u0412\u043e\u0437\u0432\u0440\u0430\u0449\u0430\u044f\u0441\u044c \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c, \u043e\u0442\u043c\u0435\u0442\u0438\u043c \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0435:\n\n1. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Forescout \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 46 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0443 \u0442\u0440\u0435\u0445 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u0441\u043e\u043b\u043d\u0435\u0447\u043d\u044b\u0445 \u0438\u043d\u0432\u0435\u0440\u0442\u043e\u0440\u043e\u0432, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u0443\u0433\u0440\u043e\u0437\u0443 \u0434\u043b\u044f \u044d\u043b\u0435\u043a\u0442\u0440\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u0435\u0442\u0435\u0439.\n\n\u0412\u0441\u0435 \u043e\u043d\u0438 \u043d\u0430\u0437\u0432\u0430\u043d\u044b\u00a0SUN:DOWN \u0438 \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u0437\u0430\u0445\u0432\u0430\u0442\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0438\u043b\u0438 \u0438\u0445 \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b.\n\n\u0421\u0440\u0435\u0434\u0438 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 - Growatt, SMA \u0438 Sungrown.\n\nSMA\u00a0\u0438\u00a0Sungrow\u00a0\u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u0432\u0441\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u044f \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432. Growatt \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043e\u0434\u043d\u0430\u043a\u043e \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043d\u0438\u0445 \u043f\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e \u043d\u0430 \u043a\u043e\u043d\u0435\u0446 \u0444\u0435\u0432\u0440\u0430\u043b\u044f \u043e\u0441\u0442\u0430\u0432\u0430\u043b\u0438\u0441\u044c \u043d\u0435\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c\u0438.\n\n2. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 Esri \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u00a0\u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 \u0441\u0432\u043e\u0435\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 ArcGIS.\n\nCVE-2025-2538 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 \u0438 \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 9,8/10.\n\n\u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 ArcGIS - \u044d\u0442\u043e \u0433\u0435\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u0432\u0438\u0437\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0442\u043e\u043f\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f, \u043f\u0440\u0435\u0436\u0434\u0435 \u0432\u0441\u0435\u0433\u043e \u0432 \u0433\u043e\u0441\u0441\u0435\u043a\u0442\u043e\u0440\u0435. \u0412 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0432 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u043e \u0431\u043e\u043b\u0435\u0435 1100 \u0441\u0438\u0441\u0442\u0435\u043c ArcGIS.\n\n3. \u041d\u0435\u0434\u0430\u0432\u043d\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0431\u044b\u043b\u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0435\u043d\u044b \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u043c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 CrushFTP, \u043a\u043e\u0442\u043e\u0440\u044b\u0439, \u043a\u0430\u043a \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0432 \u0441\u0444\u0435\u0440\u0435 \u043f\u0440\u0438\u0441\u0442\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u043e\u0432.\n\n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 CrushFTP \u0437\u0430\u044f\u0432\u0438\u043b\u0438, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0443, \u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043c\u044f\u0433\u0447\u0430\u0435\u0442\u0441\u044f, \u0435\u0441\u043b\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u044f DMZ.\n\nCrushFTP 11.3.1+ \u0438 10.8.4+ \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b.\n\n\u0417\u0430\u043c\u0435\u0442\u0438\u0432, \u0447\u0442\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 CrushFTP \u0442\u0443\u043f\u044f\u0442 \u0438 \u043d\u0435 \u043d\u0430\u0437\u043d\u0430\u0447\u0430\u044e\u0442 CVE, VulnCheck \u0440\u0435\u0448\u0438\u043b\u0430 \u0432\u0437\u044f\u0442\u044c \u043d\u0430 \u0441\u0435\u0431\u044f \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0438\u00a0\u043f\u0440\u0438\u0441\u0432\u043e\u0438\u043b\u0430 \u0435\u0439 CVE-2025-2825.\n\n\u041d\u043e \u0433\u0435\u043d\u0434\u0438\u0440 CrushFTP \u043f\u043e\u0441\u0442\u0443\u043f\u043e\u043a \u043d\u0435 \u043e\u0446\u0435\u043d\u0438\u043b \u0438 \u043f\u0440\u0438\u0433\u0440\u043e\u0437\u0438\u043b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438, \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u0434\u043e\u0431\u0440\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043d\u0435 \u043e\u0442\u043a\u0430\u0442\u044f\u0442 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440.\u00a0\n\n4. \u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043d\u043e\u0432\u043e\u043c\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044e Sonatype,\u00a0\u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 90 \u0434\u043d\u0435\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Apache Tomcat \u0432 \u0442\u0440\u0438 \u0440\u0430\u0437\u0430 \u0447\u0430\u0449\u0435, \u0447\u0435\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435.\n\n5. PoC\u00a0\u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u043b\u0430\u043a\u0430 IngressNightmare \u0442\u0435\u043f\u0435\u0440\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0434\u043b\u044f \u0448\u0438\u0440\u043e\u043a\u043e\u0439 \u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u0438. \u0412\u0441\u0435\u043c \u043f\u0440\u0438\u0433\u043e\u0442\u043e\u0432\u0438\u0442\u044c\u0441\u044f.", "creation_timestamp": "2025-03-28T18:30:05.000000Z"}]}