{"vulnerability": "CVE-2025-2759", "sightings": [{"uuid": "36b0a38d-66e1-49fb-9542-84c0bb0a34f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27590", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljhvmtwx2s2f", "content": "", "creation_timestamp": "2025-03-03T12:00:06.495359Z"}, {"uuid": "aaac2f09-a1f4-4192-8d6f-e97a1a13c228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27593", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkepn6ejjr24", "content": "", "creation_timestamp": "2025-03-14T23:00:10.302671Z"}, {"uuid": "0614ebe0-c4e6-44bd-94f7-354016b0b26d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkepn6l4f423", "content": "", "creation_timestamp": "2025-03-14T23:00:10.880862Z"}, {"uuid": "61436616-f02b-478c-8387-ebc0135b74b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lkdqedxhph2g", "content": "", "creation_timestamp": "2025-03-14T13:40:25.474512Z"}, {"uuid": "0228e47d-50e4-412b-b0ec-f7df09a2dceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27590", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljj5uemne42w", "content": "", "creation_timestamp": "2025-03-04T00:00:08.950429Z"}, {"uuid": "399fe8e2-989f-4f4a-a756-b0e00c266ac9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27593", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkfxumrbx424", "content": "", "creation_timestamp": "2025-03-15T11:00:08.537211Z"}, {"uuid": "195ce426-8b88-44bb-abfe-1904843226f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkfxumxi2l23", "content": "", "creation_timestamp": "2025-03-15T11:00:09.260272Z"}, {"uuid": "2ab0e04b-4d0f-4755-a3a2-b6f1b5431eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27598", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljqvovokqr2q", "content": "", "creation_timestamp": "2025-03-07T01:55:12.889271Z"}, {"uuid": "7bbd18c1-bd61-4e93-bed2-8a0f1faa13ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27593", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114161097329932334", "content": "", "creation_timestamp": "2025-03-14T13:48:24.040305Z"}, {"uuid": "5a7e5f97-808a-46ba-8230-7779f91710ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27593", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lkdqed7b472v", "content": "", "creation_timestamp": "2025-03-14T13:40:24.556816Z"}, {"uuid": "b41174e6-88ee-4d04-a751-09378b9caf9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27594", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114161097329932334", "content": "", "creation_timestamp": "2025-03-14T13:48:24.123120Z"}, {"uuid": "fb03ad9f-8046-4ae4-abb8-5bac6c7b0d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114161097329932334", "content": "", "creation_timestamp": "2025-03-14T13:48:24.187902Z"}, {"uuid": "401bcff5-b431-4e14-93a2-0a064f2a21f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkdra63u2r2h", "content": "", "creation_timestamp": "2025-03-14T13:55:59.986148Z"}, {"uuid": "4dbc6d16-fe85-45be-8851-471629b2c927", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27593", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114161097376491720", "content": "", "creation_timestamp": "2025-03-14T13:48:24.970203Z"}, {"uuid": "10cadd90-04c8-44be-a68d-8dff582d4f5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27590", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114096924924188445", "content": "", "creation_timestamp": "2025-03-03T05:48:30.706930Z"}, {"uuid": "29675109-a469-49ae-9b53-5bbe6b3381e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114161097415646897", "content": "", "creation_timestamp": "2025-03-14T13:48:25.229237Z"}, {"uuid": "168556dd-3fec-4aea-a397-d9f090872aa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lk6ju6fw642e", "content": "", "creation_timestamp": "2025-03-12T12:00:41.259547Z"}, {"uuid": "2babc8c4-2b31-456b-9a05-03d9a946452d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lk6kdxpl5i2b", "content": "", "creation_timestamp": "2025-03-12T12:09:31.009447Z"}, {"uuid": "70c1446b-b5dc-4030-a918-ed0898bfacc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27599", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114359909527505857", "content": "", "creation_timestamp": "2025-04-18T16:28:57.464220Z"}, {"uuid": "3113dc81-3710-4139-be56-9020673fac83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27593", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkdra5ee2q2m", "content": "", "creation_timestamp": "2025-03-14T13:55:57.815378Z"}, {"uuid": "9fa2f149-f361-4732-9cbf-370e18d99269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27590", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lmgq72wkjz2q", "content": "", "creation_timestamp": "2025-04-10T05:05:50.664082Z"}, {"uuid": "86a8aa8d-4533-4f1e-b2b9-3140411f1076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27590", "type": "seen", "source": "https://bsky.app/profile/netspi.bsky.social/post/3lmhpd22tpk2j", "content": "", "creation_timestamp": "2025-04-10T14:22:52.380496Z"}, {"uuid": "fae3d016-1b86-482f-afa9-2d70af1bc4f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27599", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln42fr6wn724", "content": "", "creation_timestamp": "2025-04-18T16:34:35.502574Z"}, {"uuid": "f7a7211e-612f-4790-a17d-1f3e1a2d8295", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27599", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:56.000000Z"}, {"uuid": "1d651d3b-fc6a-4b0e-849b-30dcb00bb904", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2759", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-268/", "content": "", "creation_timestamp": "2025-04-30T03:00:00.000000Z"}, {"uuid": "7f33a173-633f-4f12-8bb7-73d2b24706bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27599", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:39.000000Z"}, {"uuid": "f1ff042f-1e01-4aae-971c-1cc4c3d0ebe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "seen", "source": "https://gist.github.com/strikoder/49a945eeff34362d58ae0eea2caa2fa5", "content": "", "creation_timestamp": "2025-11-17T07:26:08.000000Z"}, {"uuid": "1e8d696c-45b9-4068-bfad-4f7218a80f93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "eaf4f843-2f89-4ee9-b3aa-f3d036a28c14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27598", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:23.000000Z"}, {"uuid": "c40818d2-e2c6-4ed1-93d2-837ad7a3a070", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:29.000000Z"}, {"uuid": "abdffc69-a2e2-45cf-82b5-12821db9e75b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27598", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:44.000000Z"}, {"uuid": "52159de9-490c-4a09-a44b-310a0cf9886f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27590", "type": "seen", "source": "https://t.me/cvedetector/19305", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27590 - Oxidized Web Unauthenticated Remote Command Execution\", \n  \"Content\": \"CVE ID : CVE-2025-27590 \nPublished : March 3, 2025, 4:15 a.m. | 1\u00a0hour, 44\u00a0minutes ago \nDescription : In oxidized-web (aka Oxidized Web) before 0.15.0, the RANCID migration page allows an unauthenticated user to gain control over the Linux user account that is running oxidized-web. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T07:10:33.000000Z"}, {"uuid": "e4775edf-9eb4-458c-a336-b15db535c189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-27591", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3m7pxxuttzgs2", "content": "", "creation_timestamp": "2025-12-11T16:18:48.521206Z"}, {"uuid": "cc200026-8a49-49a7-b18b-a2c4ca610570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27598", "type": "seen", "source": "https://t.me/cvedetector/19760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27598 - ImageSharp Gif Decoder Out-of-bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27598 \nPublished : March 6, 2025, 11:15 p.m. | 55\u00a0minutes ago \nDescription : ImageSharp is a 2D graphics API. An Out-of-bounds Write vulnerability has been found in the ImageSharp gif decoder, allowing attackers to cause a crash using a specially crafted gif. This can potentially lead to denial of service. The problem has been patched. All users are advised to upgrade to v3.1.7 or v2.1.10. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T01:33:18.000000Z"}, {"uuid": "5e09feb4-7e73-4eb9-82e6-38ecae6de564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/43832", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-27591\nURL\uff1ahttps://github.com/rvizx/CVE-2025-27591\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-12T22:52:20.000000Z"}, {"uuid": "446f9389-c451-4ff8-b622-3642e04ce89f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/43824", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-27591\nURL\uff1ahttps://github.com/obamalaolu/CVE-2025-27591\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-12T21:21:10.000000Z"}, {"uuid": "abb701d7-e55f-42e6-b01d-832ae5178d32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "seen", "source": "https://t.me/cvedetector/20126", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27591 - Below Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27591 \nPublished : March 11, 2025, 7:15 p.m. | 1\u00a0hour, 11\u00a0minutes ago \nDescription : A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T21:48:55.000000Z"}, {"uuid": "da45e997-b763-4aa0-85d2-72f1a2cd5668", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27597", "type": "seen", "source": "https://t.me/cvedetector/19832", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27597 - Vue I18n Prototype Pollution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27597 \nPublished : March 7, 2025, 4:15 p.m. | 58\u00a0minutes ago \nDescription : Vue I18n is the internationalization plugin for Vue.js. @intlify/message-resolver and @intlify/vue-i18n-core are vulnerable to Prototype Pollution through the entry function: handleFlatJson. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence. Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T18:17:19.000000Z"}, {"uuid": "be5922e3-9ed3-4fd1-8523-7499f898ac3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/WmTbZAwJq4oeu1oQbw_9scJeNK9TlkQDYUtF5SwroIlUcq4", "content": "", "creation_timestamp": "2025-09-01T15:00:07.000000Z"}, {"uuid": "68c28682-497e-4bb7-87b4-532cb1c74122", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/7VaWiDiZCdClD5jKnwGdCFY3BMT4SvcYbJTGW3v_R4In6yE", "content": "", "creation_timestamp": "2025-09-03T21:00:04.000000Z"}, {"uuid": "b91edf8d-362f-43d1-98d0-5355699ceee1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/44420", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA Proof of Concept for CVE-2025-27591, a local privilege escalation in Below \u2264 v0.8.1\nURL\uff1ahttps://github.com/incommatose/CVE-2025-27591-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-18T03:31:52.000000Z"}, {"uuid": "4be309de-1ce5-4160-9010-9e06b9a97170", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "seen", "source": "https://t.me/GithubRedTeam/59600", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPath traversal tool based on CVE-2025-8088\nURL\uff1ahttps://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-13T17:48:19.000000Z"}, {"uuid": "fa924cba-8721-44bc-b956-bd1f0c41a8a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/46055", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aa C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root.\nURL\uff1ahttps://github.com/Cythonic1/CVE-2025-27591\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-31T12:25:27.000000Z"}, {"uuid": "68787e54-30af-465e-8d84-dac2eee1ae9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/8nM03Hy1pf_JWfEIa0g2-4Thr39zfhDpEe0Vm6CK6uASuGo", "content": "", "creation_timestamp": "2025-10-19T03:00:05.000000Z"}, {"uuid": "614f472b-0ada-4650-8f8b-0b6525622989", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/Qu1cbmejEeKAGFL3IdDZp2oTdnW34dPtOka-zLQLfx2beHc", "content": "", "creation_timestamp": "2025-07-18T09:00:04.000000Z"}, {"uuid": "a0da1f5b-0951-4809-aff8-d5b27d08f9fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/Si59L7B2mOOUAr8_144HFqGZOWLjbuFEGSaFRpGyejiLY0E", "content": "", "creation_timestamp": "2025-07-20T03:00:05.000000Z"}, {"uuid": "6851ce9d-596f-48a7-b585-7170cec4e554", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/Q-s80O6b5uVlmhryR8-ZciI2tLabDBtdKOXSX3QDtGfzYSw", "content": "", "creation_timestamp": "2025-11-13T21:00:05.000000Z"}, {"uuid": "49791d67-9a82-46ec-b764-8eac28b6dd3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/56022", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-27591\nURL\uff1ahttps://github.com/krn966/CVE-2025-27591\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-10-18T21:27:30.000000Z"}, {"uuid": "8d03eb2c-e954-4341-b17b-3e115584784b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/60220", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aself cleaning CVE-2025-27591 Poc that grants a root reverse shell instead of modifying passwd files\nURL\uff1ahttps://github.com/0x00Jeff/CVE-2025-27591\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-19T20:01:14.000000Z"}, {"uuid": "55fd2b6e-05de-4020-b1c6-c4178c346c3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/uEOlrUu1_l--1w6IndjXIiiKl78HQvEFFzlmBtSlWW7XloE", "content": "", "creation_timestamp": "2025-11-20T03:00:06.000000Z"}, {"uuid": "cbde60f7-9d88-48d1-868c-f655fffd12c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "seen", "source": "Telegram/yG0q3IpDztUHkWGWcBfSkFN1RblCcRFZP5pQldEwVfp_P8g", "content": "", "creation_timestamp": "2026-04-16T09:00:04.000000Z"}, {"uuid": "a22a0f5b-f7be-4202-92a1-9959ceaeaa02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/Ph5XVLoVKPKzeNd3zHbruXHl3wn31oqUjoUVrNk6if5Q2TM", "content": "", "creation_timestamp": "2026-01-02T21:00:05.000000Z"}, {"uuid": "51ec3d48-c8dc-4fa9-8aa7-b00687d9a08b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27598", "type": "seen", "source": "Telegram/W1c6rhM3x5JoMp7pyxjQtTZLuZUXjCImewW8QRUo9NcuEYrw", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}, {"uuid": "8fd6367d-b868-4828-b7a5-058d05e11907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27590", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6146", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27590\n\ud83d\udd25 CVSS Score: 9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: In oxidized-web (aka Oxidized Web) before 0.15.0, the RANCID migration page allows an unauthenticated user to gain control over the Linux user account that is running oxidized-web.\n\ud83d\udccf Published: 2025-03-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-03T03:28:18.346Z\n\ud83d\udd17 References:\n1. https://github.com/ytti/oxidized-web/releases/tag/0.15.0\n2. https://github.com/ytti/oxidized-web/commit/a5220a0ddc57b85cd122bffee228d3ed4901668e", "creation_timestamp": "2025-03-03T04:29:48.000000Z"}, {"uuid": "f363a08b-0c26-45e5-87e3-a5dfe7aa5d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27593", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7549", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27593\n\ud83d\udd25 CVSS Score: 9.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: The product can be used to distribute malicious code using SDD Device Drivers due to missing download verification checks, leading to code execution on target systems.\n\ud83d\udccf Published: 2025-03-14T12:46:58.946Z\n\ud83d\udccf Modified: 2025-03-14T13:36:49.059Z\n\ud83d\udd17 References:\n1. https://sick.com/psirt\n2. https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF\n3. https://www.cisa.gov/resources-tools/resources/ics-recommended-practices\n4. https://www.first.org/cvss/calculator/3.1\n5. https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf\n6. https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json\n7. https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html", "creation_timestamp": "2025-03-14T13:47:13.000000Z"}, {"uuid": "fb362e10-0895-42d2-87cd-1c1be14740c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7552", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27595\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.\n\ud83d\udccf Published: 2025-03-14T12:53:13.682Z\n\ud83d\udccf Modified: 2025-03-14T13:35:00.490Z\n\ud83d\udd17 References:\n1. https://sick.com/psirt\n2. https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF\n3. https://www.cisa.gov/resources-tools/resources/ics-recommended-practices\n4. https://www.first.org/cvss/calculator/3.1\n5. https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf\n6. https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json\n7. https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html", "creation_timestamp": "2025-03-14T13:47:27.000000Z"}, {"uuid": "0ba06527-317c-4dfb-8a82-06e12f29885b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27594", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7551", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27594\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: The device uses an unencrypted, proprietary protocol for communication. Through this protocol, configuration data is transmitted and device authentication is performed. An attacker can thereby intercept the authentication hash and use it to log into the device using a pass-the-hash attack.\n\ud83d\udccf Published: 2025-03-14T12:50:15.198Z\n\ud83d\udccf Modified: 2025-03-14T13:35:28.200Z\n\ud83d\udd17 References:\n1. https://sick.com/psirt\n2. https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF\n3. https://www.cisa.gov/resources-tools/resources/ics-recommended-practices\n4. https://www.first.org/cvss/calculator/3.1\n5. https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf\n6. https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json\n7. https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html", "creation_timestamp": "2025-03-14T13:47:19.000000Z"}, {"uuid": "94c5923c-ecdd-449c-93d9-f22e7e8adee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/44128", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-27591\nURL\uff1ahttps://github.com/sanjay70023/AutoVAPT-AI-Based-Vulnerability-Scanner-Pentest-Tool\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-15T13:46:29.000000Z"}, {"uuid": "92eaeab5-09e1-451c-8fc5-74302bcc83d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7296", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27591\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.\n\ud83d\udccf Published: 2025-03-11T18:29:21.569Z\n\ud83d\udccf Modified: 2025-03-12T13:08:26.252Z\n\ud83d\udd17 References:\n1. https://www.facebook.com/security/advisories/cve-2025-27591\n2. https://github.com/facebookincubator/below/commit/da9382e6e3e332fd2c3195e22f34977f83f0f1f3", "creation_timestamp": "2025-03-12T13:41:39.000000Z"}, {"uuid": "34dbd245-cd8e-4f14-9de2-a56adea45a8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27598", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6771", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27598\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: ImageSharp is a 2D graphics API. An Out-of-bounds Write vulnerability has been found in the ImageSharp gif decoder, allowing attackers to cause a crash using a specially crafted gif. This can potentially lead to denial of service. The problem has been patched. All users are advised to upgrade to v3.1.7 or v2.1.10.\n\ud83d\udccf Published: 2025-03-06T22:23:39.486Z\n\ud83d\udccf Modified: 2025-03-06T22:23:39.486Z\n\ud83d\udd17 References:\n1. https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-2cmq-823j-5qj8\n2. https://github.com/SixLabors/ImageSharp/issues/2859\n3. https://github.com/SixLabors/ImageSharp/pull/2890", "creation_timestamp": "2025-03-06T22:33:42.000000Z"}, {"uuid": "131bf302-6e2e-4ca7-a2d2-ec00a44f79f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27599", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12471", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27599\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Element X Android is a Matrix Android Client provided by element.io. Prior to version 25.04.2, a crafted hyperlink on a webpage, or a locally installed malicious app, can force Element X up to version 25.04.1 to load a webpage with similar permissions to Element Call and automatically grant it temporary access to microphone and camera. This issue has been patched in version 25.04.2.\n\ud83d\udccf Published: 2025-04-18T15:49:11.899Z\n\ud83d\udccf Modified: 2025-04-18T15:49:11.899Z\n\ud83d\udd17 References:\n1. https://github.com/element-hq/element-x-android/security/advisories/GHSA-m5px-pwq3-4p5m\n2. https://github.com/element-hq/element-x-android/commit/dc058544d7e693c04298191c1aadd5b39c9be52e\n3. https://github.com/element-hq/element-x-android/releases/tag/v25.04.2", "creation_timestamp": "2025-04-18T15:58:53.000000Z"}, {"uuid": "5f890373-d591-45ff-aa11-74c2f8a506e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2759", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17215", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2759\n\ud83d\udd25 CVSS Score: 7 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: GStreamer Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of GStreamer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. The issue results from incorrect permissions on folders. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user. Was ZDI-CAN-25448.\n\ud83d\udccf Published: 2025-05-22T00:57:49.889Z\n\ud83d\udccf Modified: 2025-05-22T00:57:49.889Z\n\ud83d\udd17 References:\n1. https://www.zerodayinitiative.com/advisories/ZDI-25-268/", "creation_timestamp": "2025-05-22T01:42:44.000000Z"}, {"uuid": "f0911fec-031c-4348-acd1-1f810261449c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50140", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aLocal Privilege Escalation vai `below` (CVE-2025-27591) - PoC Exploit\nURL\uff1ahttps://github.com/HOEUN-Visai/CVE-2025-27591-below-\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-03T16:20:53.000000Z"}, {"uuid": "c146e8d2-e214-4198-aeac-c2a9af964784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/43876", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0\nURL\uff1ahttps://github.com/BridgerAlderson/CVE-2025-27591-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-13T08:56:45.000000Z"}, {"uuid": "1b7e9c5d-e4d6-4ae6-9e1f-558ac1138e40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/44088", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-27591 is a known privilege escalation vulnerability in the Below service (version &lt; v0.9.0)\nURL\uff1ahttps://github.com/dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-15T06:25:38.000000Z"}, {"uuid": "c0f84a37-2b38-434f-9ca8-b98f53ea337d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/44872", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udd25 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection\nURL\uff1ahttps://github.com/00xCanelo/CVE-2025-27591-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-21T19:06:46.000000Z"}, {"uuid": "88ae60fc-62a0-4a9f-b34e-e8ea0e3e375c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/44083", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-27591\nURL\uff1ahttps://github.com/DarksBlackSk/CVE-2025-27591-Proof-Of-Concept\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-15T05:17:07.000000Z"}, {"uuid": "f45386bf-91ba-4bee-adab-4e9cc57f16ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/49863", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC for CVE-2025-27591 \u2013 Local privilege escalation in the below monitoring tool. By symlinking its log file to /etc/passwd, an attacker can inject a root account and gain full system compromise.\nURL\uff1ahttps://github.com/danil-koltsov/below-log-race-poc\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-01T12:25:21.000000Z"}, {"uuid": "30257e99-714e-4bdd-b212-c5f0d55bf42e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/48659", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC exploit for Below privilege escalation (CVE-2025-27591) allowing local root access via symlink manipulation in world-writable log directory.\nURL\uff1ahttps://github.com/Diabl0xE/CVE-2025-27519\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-22T12:34:40.000000Z"}, {"uuid": "8f75f0d4-7548-466e-9f80-aaa99d4ebb65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/qSyM_CObkKGA7Q7HpzeouiC5p1gyRUk9NSeKtBswwYL551E", "content": "", "creation_timestamp": "2025-07-13T03:00:05.000000Z"}, {"uuid": "fccff728-5f78-4b22-9be8-88aa64e3079c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/0M5jO4VIK8AI8C1mAkrE9XFqeLJqz32SrznEd5MdyL5tahc", "content": "", "creation_timestamp": "2025-08-16T15:00:08.000000Z"}, {"uuid": "2f702160-b26d-42cf-ac8e-336a4afb31d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "seen", "source": "Telegram/cWtiHx103QDqzsPEFibXmjg0nuYdbQyVZSdVVV_BXQwi1FA", "content": "", "creation_timestamp": "2025-07-31T15:00:06.000000Z"}, {"uuid": "4e0ba820-f149-4879-aa9a-cfa0edc542b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "published-proof-of-concept", "source": "Telegram/T40TgjeWGWGsXoUl8seqwuPrYGUpdj-sMthNdJApG881fE0", "content": "", "creation_timestamp": "2025-07-15T09:00:04.000000Z"}, {"uuid": "7ad2dc72-6d7f-412a-afef-b5eaf356aac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27591", "type": "seen", "source": "Telegram/G-kx-DTDWfPOp5cJepg92j2e9E9yyQ0k9SVYaxiupb8kGRk", "content": "", "creation_timestamp": "2025-07-13T15:00:06.000000Z"}, {"uuid": "b7963eeb-cb17-45b6-8ec5-7f1ba14f0611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27598", "type": "seen", "source": "Telegram/Yedcr8MAXo2th64zcIGwzgIZflploYCa-tt0bHyZEPWJw_4D", "content": "", "creation_timestamp": "2025-03-08T04:35:53.000000Z"}, {"uuid": "1b6c7368-81e7-45a6-95dd-88ecdc7da637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27599", "type": "seen", "source": "https://t.me/cvedetector/23322", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27599 - Element X Android Cross-Site Scripting (XSS) and Permission Tampering Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27599 \nPublished : April 18, 2025, 4:15 p.m. | 26\u00a0minutes ago \nDescription : Element X Android is a Matrix Android Client provided by element.io. Prior to version 25.04.2, a crafted hyperlink on a webpage, or a locally installed malicious app, can force Element X up to version 25.04.1 to load a webpage with similar permissions to Element Call and automatically grant it temporary access to microphone and camera. This issue has been patched in version 25.04.2. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T19:05:06.000000Z"}, {"uuid": "c7e13d0a-17e0-4d01-99a1-4a8192d0a2ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27590", "type": "seen", "source": "https://t.me/CyberBulletin/2988", "content": "\u26a1\ufe0fCVE-2025-27590 \u2013 Oxidized Web: Local File Overwrite to Remote Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2025-04-10T11:36:55.000000Z"}, {"uuid": "00e11779-2d61-469b-98f3-b03776747983", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://t.me/cvedetector/20307", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27595 - Cisco Device Weak Password Hash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27595 \nPublished : March 14, 2025, 1:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T16:42:43.000000Z"}, {"uuid": "a7978265-5432-4a66-9789-4c42f4a1afc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27594", "type": "seen", "source": "https://t.me/cvedetector/20306", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27594 - Cisco Device Pass-the-Hash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27594 \nPublished : March 14, 2025, 1:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : The device uses an unencrypted, proprietary protocol for communication. Through this protocol, configuration data is transmitted and device authentication is performed. An attacker can thereby intercept the authentication hash and use it to log into the device using a pass-the-hash attack. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T16:42:42.000000Z"}, {"uuid": "81fe24d8-76a3-446c-a3e2-e1d6f0594fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27593", "type": "seen", "source": "https://t.me/cvedetector/20305", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27593 - Cisco SDD Device Driver Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27593 \nPublished : March 14, 2025, 1:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : The product can be used to distribute malicious code using SDD Device Drivers due to missing download verification checks, leading to code execution on target systems. \nSeverity: 9.3 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T16:42:38.000000Z"}, {"uuid": "656a5bf1-bedd-4d78-b099-e0b6c14a4bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27597", "type": "seen", "source": "Telegram/JdRhtlbmlAjvwKcB8S75wJ5UgHg8p0glcxAuk_LyuqjTS6Mc", "content": "", "creation_timestamp": "2025-03-08T04:35:51.000000Z"}, {"uuid": "1e1f1698-e05b-44a7-ad38-70da8f6af463", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27590", "type": "published-proof-of-concept", "source": "Telegram/p9d_ACvMhwgjQHzi_flG_te3gVSPsQD85yv29crmwoHofRE", "content": "", "creation_timestamp": "2025-03-03T06:00:40.000000Z"}, {"uuid": "01591266-0522-4dc1-8c66-816b3ab2cdbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27597", "type": "seen", "source": "Telegram/MKyyCJNfVvpUH0P_EmhW7az9OPnbIUC-jF-3Mo1io2kFbkQ", "content": "", "creation_timestamp": "2025-03-07T18:01:34.000000Z"}]}