{"vulnerability": "CVE-2025-2574", "sightings": [{"uuid": "73a38f24-e607-4c0e-be3d-86ca84738c9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25740", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5indbpjn2e", "content": "", "creation_timestamp": "2025-02-14T15:15:54.667587Z"}, {"uuid": "2e64b917-62bc-4ced-9ef6-c1df0aa62fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25742", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113991952099305051", "content": "", "creation_timestamp": "2025-02-12T16:52:33.555664Z"}, {"uuid": "ad80b051-bfdb-4ffa-b3c2-8428717cfbea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25746", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113991952114597008", "content": "", "creation_timestamp": "2025-02-12T16:52:33.628769Z"}, {"uuid": "a5c20d11-c90e-4eef-8564-9b1b047e2f8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25743", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113992006650977422", "content": "", "creation_timestamp": "2025-02-12T17:06:24.659746Z"}, {"uuid": "9cac8b95-c7e2-4b90-b24f-01cd948100e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25744", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113992006664890401", "content": "", "creation_timestamp": "2025-02-12T17:06:25.003724Z"}, {"uuid": "95b8d95f-40e9-4816-9b6d-100509c3a86c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25742", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyogajtis2d", "content": "", "creation_timestamp": "2025-02-12T17:16:00.641750Z"}, {"uuid": "ccb29d9b-0483-4f37-95ff-3d851ae30e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25743", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyogcrhn32s", "content": "", "creation_timestamp": "2025-02-12T17:16:03.064222Z"}, {"uuid": "1beac114-0b09-4155-8e5c-f3f9bf89dac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25744", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyogfeqia2z", "content": "", "creation_timestamp": "2025-02-12T17:16:05.900008Z"}, {"uuid": "d4f80d70-099a-4c5f-a32b-dd41024ab4ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25746", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyoghukec2a", "content": "", "creation_timestamp": "2025-02-12T17:16:08.400021Z"}, {"uuid": "82ab5f0a-4884-4c7b-8f80-80c1901e890e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25741", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113992114751128585", "content": "", "creation_timestamp": "2025-02-12T17:33:54.209731Z"}, {"uuid": "b2f04b03-4864-44da-aa30-a43643125132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25741", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyrrho52e2z", "content": "", "creation_timestamp": "2025-02-12T18:15:58.510321Z"}, {"uuid": "bf7bedc6-3884-42de-97b5-bd7bfd0da224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25743", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhyry37t7k2x", "content": "", "creation_timestamp": "2025-02-12T18:19:48.392461Z"}, {"uuid": "8983f6b3-00cb-46de-9e20-d8ca039b45cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25742", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhyry3lbgc27", "content": "", "creation_timestamp": "2025-02-12T18:19:48.853313Z"}, {"uuid": "275aff65-87cb-442c-a3fc-bd6424bcc37d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25744", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhyry3x5ck27", "content": "", "creation_timestamp": "2025-02-12T18:19:50.290755Z"}, {"uuid": "fcac7e32-9f59-4262-81a7-1657d1ee2027", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25746", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhyry46kmc27", "content": "", "creation_timestamp": "2025-02-12T18:19:51.415031Z"}, {"uuid": "98ec4ca7-3159-419f-918f-324c7af50c96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2574", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lktznm4tl72s", "content": "", "creation_timestamp": "2025-03-21T01:09:15.533215Z"}, {"uuid": "79882e0b-ac27-44c0-a58b-57ba4efc7dac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25744", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113992683541173396", "content": "", "creation_timestamp": "2025-02-12T19:58:33.256109Z"}, {"uuid": "daae1132-ed8a-4672-8ad3-d2ad544d630d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25745", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5lyyhvgd2e", "content": "", "creation_timestamp": "2025-02-14T16:16:07.206487Z"}, {"uuid": "deb18eb5-b26a-4bd3-a6a9-e53e81355f79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25745", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114003261336817886", "content": "", "creation_timestamp": "2025-02-14T16:48:40.023243Z"}, {"uuid": "5ef5d4c0-84c9-48f8-9582-eacf67bb75d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25745", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5x4nbidm2p", "content": "", "creation_timestamp": "2025-02-14T19:35:00.830233Z"}, {"uuid": "ae57d471-2edd-4d57-a4c9-91e604ade71f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25742", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-09-10T07:48:01.000000Z"}, {"uuid": "0d74cb71-acef-4619-94e1-1b241b671a74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25742", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-08-10T18:27:45.000000Z"}, {"uuid": "176362c1-d032-4404-a5bb-15bbcac10ac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25740", "type": "seen", "source": "Telegram/T1EgymRIEjxTuWeN4JNTg085mscMcEhck-iS2ysAWmZLXM5t", "content": "", "creation_timestamp": "2025-02-14T21:08:30.000000Z"}, {"uuid": "428587f5-833b-46a5-9618-79b9ba197151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25747", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}, {"uuid": "9e689b07-3fdb-4c2d-8d9c-4c9eabef801b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25745", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "ba026a28-2a0c-4ba8-828f-911061b6fb1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25740", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7819", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25740\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the PSK parameter in the SetQuickVPNSettings module.\n\ud83d\udccf Published: 2025-02-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-17T18:42:31.026Z\n\ud83d\udd17 References:\n1. https://dear-sunshine-ba5.notion.site/D-Link-DIR-853-2-1812386a66448036a1cce259beb30b04", "creation_timestamp": "2025-03-17T19:34:11.000000Z"}, {"uuid": "49cd8b74-9563-4509-8933-e51ce537d09d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25748", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7194", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25748\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens.\n\ud83d\udccf Published: 2025-03-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-11T17:22:36.399Z\n\ud83d\udd17 References:\n1. https://www.huyvo.net/post/cve-2025-25748-cross-site-request-forgery-csrf-vulnerability-in-hoteldruid-3-0-7", "creation_timestamp": "2025-03-11T17:39:58.000000Z"}, {"uuid": "62933625-8186-481a-b7fa-3619f28ac338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25749", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7193", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25749\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in HotelDruid version 3.0.7 and earlier allows users to set weak passwords due to the lack of enforcement of password strength policies.\n\ud83d\udccf Published: 2025-03-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-11T17:24:53.621Z\n\ud83d\udd17 References:\n1. https://www.huyvo.net/post/cve-2025-25749-weak-password-policy-in-hoteldruid-3-0-7", "creation_timestamp": "2025-03-11T17:39:57.000000Z"}, {"uuid": "6133575b-3203-432c-b73b-35a0b9e0640e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25740", "type": "seen", "source": "https://t.me/cvedetector/18106", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25740 - D-Link DIR-853 Router Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25740 \nPublished : Feb. 14, 2025, 3:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the PSK parameter in the SetQuickVPNSettings module. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T17:26:12.000000Z"}, {"uuid": "0c820047-eca5-4852-bd8a-9ba7299e05a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2574", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8288", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2574\n\ud83d\udd25 CVSS Score: 2.1 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L)\n\ud83d\udd39 Description: Out-of-bounds array write in Xpdf 4.05 and earlier, due to incorrect integer overflow checking in the PostScript function interpreter code.\n\ud83d\udccf Published: 2025-03-20T21:07:46.499Z\n\ud83d\udccf Modified: 2025-03-20T21:07:46.499Z\n\ud83d\udd17 References:\n1. https://www.xpdfreader.com/security-bug/CVE-2025-2574.html", "creation_timestamp": "2025-03-20T21:18:35.000000Z"}, {"uuid": "4920063b-c70e-4879-99d4-89ad2d166404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25746", "type": "seen", "source": "https://t.me/cvedetector/17915", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25746 - D-Link DIR-853 Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25746 \nPublished : Feb. 12, 2025, 5:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetWanSettings module. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T20:14:13.000000Z"}, {"uuid": "99c5c6f3-5aca-4f97-8890-e1196c02702f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25744", "type": "seen", "source": "https://t.me/cvedetector/17914", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25744 - D-Link DIR-853 Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25744 \nPublished : Feb. 12, 2025, 5:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetDynamicDNSSettings module. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T20:14:12.000000Z"}, {"uuid": "c8499e3d-914f-4a17-9a67-221d76af44d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25743", "type": "seen", "source": "https://t.me/cvedetector/17913", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25743 - D-Link DIR-853 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25743 \nPublished : Feb. 12, 2025, 5:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : D-Link DIR-853 A1 FW1.20B07 was discovered to contain a command injection vulnerability in the SetVirtualServerSettings module. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T20:14:08.000000Z"}, {"uuid": "620c8c2b-3d86-45b9-bfa3-fd8c917dd10f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25742", "type": "seen", "source": "https://t.me/cvedetector/17912", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25742 - D-Link DIR-853 Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25742 \nPublished : Feb. 12, 2025, 5:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the AccountPassword parameter in the SetSysEmailSettings module. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T20:14:08.000000Z"}, {"uuid": "9bda9a22-ea4d-4464-8990-b3033fb57b7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25741", "type": "seen", "source": "https://t.me/cvedetector/17904", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25741 - D-Link DIR-853 IPv6 Pppoe Password Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25741 \nPublished : Feb. 12, 2025, 6:15 p.m. | 46\u00a0minutes ago \nDescription : D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the IPv6_PppoePassword parameter in the SetIPv6PppoeSettings module. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T20:13:58.000000Z"}, {"uuid": "569dce06-3239-4c6c-93b6-6298a5e723bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2574", "type": "seen", "source": "https://t.me/cvedetector/20774", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2574 - Xpdf Out-of-bounds Array Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2574 \nPublished : March 20, 2025, 9:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Out-of-bounds array write in Xpdf 4.05 and earlier, due to incorrect integer overflow checking in the PostScript function interpreter code. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T00:05:39.000000Z"}, {"uuid": "5d63e3a8-7be2-4a01-99fa-bc24fab977e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25748", "type": "seen", "source": "Telegram/3MBTytBz7FAWoUgV2aTVPXaX-kfAuOLht6JlK6Rx_m9ll3c", "content": "", "creation_timestamp": "2025-03-07T22:00:06.000000Z"}]}