{"vulnerability": "CVE-2025-2572", "sightings": [{"uuid": "fdc00ab7-f195-40f6-8995-9d9cff04382e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25728", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lj7ccupfih2p", "content": "", "creation_timestamp": "2025-02-28T01:53:17.095213Z"}, {"uuid": "e7e2bf01-8f2f-465e-9e8d-1ecfcaaffc09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25727", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lj7ccut5un26", "content": "", "creation_timestamp": "2025-02-28T01:53:17.637610Z"}, {"uuid": "2b02837a-b619-4dbd-846f-f3db50783a30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25729", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lj7ccuwm772w", "content": "", "creation_timestamp": "2025-02-28T01:53:18.241105Z"}, {"uuid": "298b6947-f519-4ce0-ae7e-efb940dbd190", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2572", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lmunx6edds2y", "content": "", "creation_timestamp": "2025-04-15T18:02:56.909126Z"}, {"uuid": "db46320a-2cfa-4831-8ebd-8994ec435069", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25726", "type": "seen", "source": "https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92", "content": "", "creation_timestamp": "2025-02-28T02:45:47.000000Z"}, {"uuid": "56d11f25-8a91-4d1c-9987-ac23f535556d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25724", "type": "seen", "source": "https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92", "content": "", "creation_timestamp": "2025-02-28T02:45:47.000000Z"}, {"uuid": "4b9a7a5a-0e72-40c5-a65e-22f27d0d9e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25725", "type": "seen", "source": "https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92", "content": "", "creation_timestamp": "2025-02-28T02:45:47.000000Z"}, {"uuid": "6504168c-9db3-4851-a6c3-16d0f5c561b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25724", "type": "seen", "source": "https://t.me/cvedetector/19246", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25724 - Apache Libarchive strftime Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-25724 \nPublished : March 2, 2025, 2:15 a.m. | 46\u00a0minutes ago \nDescription : list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-02T04:23:52.000000Z"}, {"uuid": "ef2536d0-e381-4c4e-b619-2f62c9a11f7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2572", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnc7lnbmec2p", "content": "", "creation_timestamp": "2025-04-21T03:23:11.763713Z"}, {"uuid": "fcb395bd-c0e8-46e6-9e3c-e60bd5f1e96f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25726", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:28.000000Z"}, {"uuid": "3daf8bd4-93ff-488a-a73a-97509f76865a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25724", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:29.000000Z"}, {"uuid": "5389db59-6d2e-46e6-9cd5-dbba54a8d055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25723", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:29.000000Z"}, {"uuid": "70a8383b-ff37-4fb9-879e-a550bea46173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2572", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114337304886684246", "content": "", "creation_timestamp": "2025-04-14T16:40:17.890164Z"}, {"uuid": "2124ce4c-73dd-41c8-8f2f-9d1761ef6e33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25724", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ln4gbfhjbx2q", "content": "", "creation_timestamp": "2025-04-18T20:06:45.589954Z"}, {"uuid": "c07600b2-119e-4a2e-abfa-720b7bb49137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25724", "type": "seen", "source": "https://gist.github.com/EbonJaeger/99dd58f015b229c6f25edb5dae784966", "content": "", "creation_timestamp": "2025-10-17T17:52:23.000000Z"}, {"uuid": "06efb307-b8d2-476a-b8ee-bd8a869607df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25727", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5813", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25729\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An information disclosure vulnerability in Bosscomm IF740 Firmware versions:11001.7078 &amp; v11001.0000 and System versions: 6.25 &amp; 6.00 allows attackers to obtain hardcoded cleartext credentials via the update or boot process.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T23:12:46.563Z\n\ud83d\udd17 References:\n1. https://gainsec.com/2025/02/27/cve-2025-25727cve-2025-25728cve-2025-25729-multiple-vulnerabilities-found-in-bosscomm-obd2-tablet/", "creation_timestamp": "2025-02-27T23:25:34.000000Z"}, {"uuid": "38d3499d-5c91-4ad3-a1ac-e113b215bbd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25723", "type": "seen", "source": "https://t.me/cvedetector/19196", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25723 - GPAC Buffer Overflow RCE\", \n  \"Content\": \"CVE ID : CVE-2025-25723 \nPublished : Feb. 28, 2025, 11:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : Buffer Overflow vulnerability in GPAC version 2.5 allows a local attacker to execute arbitrary code. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-01T02:13:46.000000Z"}, {"uuid": "16878fcb-7d5d-4764-beae-26333a7ea99a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25729", "type": "seen", "source": "https://t.me/cvedetector/19110", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25729 - Bosscomm IF740 Firmware Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-25729 \nPublished : Feb. 28, 2025, 12:15 a.m. | 1\u00a0hour, 42\u00a0minutes ago \nDescription : An information disclosure vulnerability in Bosscomm IF740 Firmware versions:11001.7078 &amp; v11001.0000 and System versions: 6.25 &amp; 6.00 allows attackers to obtain hardcoded cleartext credentials via the update or boot process. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T03:38:53.000000Z"}, {"uuid": "0d3d16ee-d256-4216-b184-d61eea38331a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25728", "type": "seen", "source": "https://t.me/cvedetector/19109", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25728 - Bosscomm IF740 PlainText Communication Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-25728 \nPublished : Feb. 28, 2025, 12:15 a.m. | 1\u00a0hour, 42\u00a0minutes ago \nDescription : Bosscomm IF740 Firmware versions:11001.7078 &amp; v11001.0000 and System versions: 6.25 &amp; 6.00 were discovered to send communications to the update API in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T03:38:49.000000Z"}, {"uuid": "94af822d-69ab-4f4d-8883-14feec338203", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25727", "type": "seen", "source": "https://t.me/cvedetector/19108", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25727 - Bosscomm IF740 Password Storage Weakness\", \n  \"Content\": \"CVE ID : CVE-2025-25727 \nPublished : Feb. 28, 2025, 12:15 a.m. | 1\u00a0hour, 42\u00a0minutes ago \nDescription : Bosscomm IF740 Firmware versions:11001.7078 &amp; v11001.0000 and System versions: 6.25 &amp; 6.00 were discovered to store passwords in cleartext. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T03:38:48.000000Z"}, {"uuid": "247e9f85-4f85-4697-a58e-a12bf5d115d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25723", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6021", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25723\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Buffer Overflow vulnerability in GPAC version 2.5 allows a local attacker to execute arbitrary code.\n\ud83d\udccf Published: 2025-02-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T22:27:56.266Z\n\ud83d\udd17 References:\n1. https://github.com/gpac/gpac/issues/3089", "creation_timestamp": "2025-02-28T23:27:48.000000Z"}, {"uuid": "bf112c0d-5531-44c6-a404-1e840bf2348c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2572", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11655", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2572\n\ud83d\udd25 CVSS Score: 5.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: In WhatsUp Gold versions released before 2024.0.3, a \n\ndatabase manipulation \n\nvulnerability allows an unauthenticated attacker to modify the contents of\u00a0WhatsUp.dbo.WrlsMacAddressGroup.\n\ud83d\udccf Published: 2025-04-14T16:06:45.424Z\n\ud83d\udccf Modified: 2025-04-14T16:06:45.424Z\n\ud83d\udd17 References:\n1. https://www.progress.com/network-monitoring\n2. https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html", "creation_timestamp": "2025-04-14T16:53:53.000000Z"}, {"uuid": "77a5470a-94fe-4d7b-9f85-ee3614a9ce02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25729", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5813", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25729\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An information disclosure vulnerability in Bosscomm IF740 Firmware versions:11001.7078 &amp; v11001.0000 and System versions: 6.25 &amp; 6.00 allows attackers to obtain hardcoded cleartext credentials via the update or boot process.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T23:12:46.563Z\n\ud83d\udd17 References:\n1. https://gainsec.com/2025/02/27/cve-2025-25727cve-2025-25728cve-2025-25729-multiple-vulnerabilities-found-in-bosscomm-obd2-tablet/", "creation_timestamp": "2025-02-27T23:25:34.000000Z"}, {"uuid": "9af649bf-89a6-484d-95df-f4e530a0725f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25728", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5813", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25729\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An information disclosure vulnerability in Bosscomm IF740 Firmware versions:11001.7078 &amp; v11001.0000 and System versions: 6.25 &amp; 6.00 allows attackers to obtain hardcoded cleartext credentials via the update or boot process.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T23:12:46.563Z\n\ud83d\udd17 References:\n1. https://gainsec.com/2025/02/27/cve-2025-25727cve-2025-25728cve-2025-25729-multiple-vulnerabilities-found-in-bosscomm-obd2-tablet/", "creation_timestamp": "2025-02-27T23:25:34.000000Z"}, {"uuid": "6915b829-aea7-4f04-956a-b5bcc2e68766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25724", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6087", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25724\n\ud83d\udd25 CVSS Score: 4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.\n\ud83d\udccf Published: 2025-03-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-02T01:22:26.132Z\n\ud83d\udd17 References:\n1. https://github.com/Ekkosun/pocs/blob/main/bsdtarbug\n2. https://github.com/libarchive/libarchive/blob/b439d586f53911c84be5e380445a8a259e19114c/tar/util.c#L751-L752\n3. https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92", "creation_timestamp": "2025-03-02T02:29:04.000000Z"}, {"uuid": "b547aee0-0d57-4caf-b286-7c427f67b7b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2572", "type": "exploited", "source": "https://t.me/jj_8tl/423", "content": "\u26a1\ufe0fThe vulnerability details are now available: https://t.co/MDgOUlaMPG\n\n\ud83d\udea8\ud83d\udea8CVE-2025-2572: WhatsUp Gold vuln exposes NmConfigurationManager.exe to unauthenticated database manipulation!  Attackers can tamper with WhatsUp.dbo.WrlsMacAddressGroup in versions &lt; 2024.0.3. \n\nZoomEye Dork\ud83d\udc49app=\"WhatsUp Gold\"\n106k+ results are found on ZoomEye.\nZoomEye Link: https://t.co/LE0HrxYtKC\n\nRefer: https://t.co/qiLVEerqL8\n\n#ZoomEye #NetSecMapping #cybersecurity #CyberSpaceInsights2025\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-16T20:05:34.000000Z"}, {"uuid": "1fd81c9f-3bb8-4c1b-8672-b63f51bf1047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2572", "type": "seen", "source": "https://t.me/cvedetector/22862", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2572 - WhatsUp Gold Database Manipulation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2572 \nPublished : April 14, 2025, 4:15 p.m. | 19\u00a0minutes ago \nDescription : In WhatsUp Gold versions released before 2024.0.3, a   \n  \ndatabase manipulation   \n  \nvulnerability allows an unauthenticated attacker to modify the contents of\u00a0WhatsUp.dbo.WrlsMacAddressGroup. \nSeverity: 5.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-14T18:51:18.000000Z"}, {"uuid": "f1771f0e-4d9f-428b-a5d4-781c97bf4f4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25723", "type": "seen", "source": "Telegram/BSty_Om8Ue6Grz_T-V9h-jX3EHbd4z0baUQvHUumRNn9Ik9J", "content": "", "creation_timestamp": "2025-03-02T11:46:30.000000Z"}, {"uuid": "9a80a53b-0170-48c2-93f7-f7d0f40cc9c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25729", "type": "seen", "source": "Telegram/HobLEJk55bUNzJCco6UaXswIhRphaFL9SuBcgOTyF7GSWXHe", "content": "", "creation_timestamp": "2025-03-02T11:45:37.000000Z"}, {"uuid": "3a36311c-8124-427f-a51b-08fa6be938f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25727", "type": "seen", "source": "Telegram/Y2NsbFmEtBekOkMnMS6Xj_vpntElvG_NKCOCue9JVm7Z6fxx", "content": "", "creation_timestamp": "2025-03-02T11:44:21.000000Z"}]}