{"vulnerability": "CVE-2025-2964", "sightings": [{"uuid": "0e6f791b-7078-4662-93dc-ef9007fdac34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29648", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lmzjwtttnq2s", "content": "", "creation_timestamp": "2025-04-17T16:34:28.785161Z"}, {"uuid": "9922e191-c17d-42a8-b087-0ea11a2915eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29649", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lmzjwtttnq2s", "content": "", "creation_timestamp": "2025-04-17T16:34:28.889363Z"}, {"uuid": "e939c536-4e8f-4f84-8065-f1348f9e561b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29646", "type": "published-proof-of-concept", "source": "Telegram/0Gqa7yHMLnSRMpvEBFkbS1bZwf-5Db-LyNODVg59tHDTKas", "content": "", "creation_timestamp": "2025-06-18T18:33:16.000000Z"}, {"uuid": "05bb3582-20a8-4630-a759-d0ae8cea6630", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29646", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrvrkxwxx72v", "content": "", "creation_timestamp": "2025-06-18T19:46:17.769997Z"}, {"uuid": "92901e48-9aa5-4d6d-8a57-d023a531848c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29640", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:48.000000Z"}, {"uuid": "36787638-866f-4fa4-87b4-315529074cec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29641", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:48.000000Z"}, {"uuid": "c4fb7984-3a77-4732-9b94-a38efdeabbc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29646", "type": "seen", "source": "https://gist.github.com/scemodicecosa/581fa485f957239ea5551daa173d0189", "content": "", "creation_timestamp": "2025-06-14T11:07:41.000000Z"}, {"uuid": "44442d04-1dfd-4f1f-8963-92fced27e52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2964", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10369", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2964\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-03-30T22:31:04.804Z\n\ud83d\udccf Modified: 2025-04-04T00:02:40.416Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-04-04T00:35:09.000000Z"}, {"uuid": "f8cf59f0-5d90-4b8d-95b6-eb0950b12250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29641", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8497", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29641\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Phpgurukul Vehicle Record Management System v1.0 is vulnerable to SQL Injection in /index.php via the 'searchinputdata' parameter.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-24T17:59:28.628Z\n\ud83d\udd17 References:\n1. https://github.com/Pei4AN/CVE/issues/5", "creation_timestamp": "2025-03-24T18:23:08.000000Z"}, {"uuid": "177a997a-6bbd-4acf-90d0-fe3d93ee3a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29641", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8352", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29641\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Phpgurukul Vehicle Record Management System v1.0 is vulnerable to SQL Injection in /index.php via the 'searchinputdata' parameter.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T14:58:34.949Z\n\ud83d\udd17 References:\n1. https://github.com/Pei4AN/CVE/issues/5", "creation_timestamp": "2025-03-21T15:19:33.000000Z"}, {"uuid": "24785e72-6dab-4144-a0e7-63ad0570ed33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29640", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8360", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29640\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Phpgurukul Human Metapneumovirus (HMPV) \u2013 Testing Management System v1.0 is vulnerable to SQL Injection in /patient-report.php via the parameter searchdata..\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T14:50:22.016Z\n\ud83d\udd17 References:\n1. https://github.com/Pei4AN/CVE/issues/4", "creation_timestamp": "2025-03-21T15:19:40.000000Z"}, {"uuid": "fb075d43-4c90-48f5-81a5-945e65bd9564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29647", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10463", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29647\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SeaCMS v13.3 has a SQL injection vulnerability in the component admin_tempvideo.php.\n\ud83d\udccf Published: 2025-04-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-04T15:32:51.279Z\n\ud83d\udd17 References:\n1. https://gitee.com/B00W_NSD/poc/blob/master/seacms13.3-sql/poc.md", "creation_timestamp": "2025-04-04T15:36:43.000000Z"}, {"uuid": "6212c5a1-cd18-46ca-b693-0028226048f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29649", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12146", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29649\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SQL Injection vulnerability exists in the TP-Link TL-WR840N router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields.\n\ud83d\udccf Published: 2025-04-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-16T19:30:03.371Z\n\ud83d\udd17 References:\n1. https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29649", "creation_timestamp": "2025-04-16T19:56:34.000000Z"}, {"uuid": "715d231c-30b9-41ba-894b-736c6afbf889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29649", "type": "seen", "source": "https://t.me/cvedetector/23186", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29649 - TP-Link TL-WR840N Router SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29649 \nPublished : April 16, 2025, 8:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : SQL Injection vulnerability exists in the TP-Link TL-WR840N router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T00:26:03.000000Z"}, {"uuid": "99cafdd1-72c1-43a2-8614-710b50879059", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29648", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12147", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29648\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SQL Injection vulnerability exists in the TP-Link EAP120 router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the login fields.\n\ud83d\udccf Published: 2025-04-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-16T19:28:40.189Z\n\ud83d\udd17 References:\n1. https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29648", "creation_timestamp": "2025-04-16T19:56:35.000000Z"}, {"uuid": "1633041c-4260-4fd1-bd27-9da93b396e41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29648", "type": "seen", "source": "https://t.me/cvedetector/23185", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29648 - TP-Link EAP120 Router SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-29648 \nPublished : April 16, 2025, 8:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : SQL Injection vulnerability exists in the TP-Link EAP120 router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the login fields. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T00:26:02.000000Z"}, {"uuid": "17c4ae24-f813-4477-ba4c-c82babe4f711", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29641", "type": "seen", "source": "https://t.me/cvedetector/20823", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29641 - \"PhpGurukul Vehicle Record Management System SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-29641 \nPublished : March 21, 2025, 3:15 p.m. | 1\u00a0hour, 28\u00a0minutes ago \nDescription : Phpgurukul Vehicle Record Management System v1.0 is vulnerable to SQL Injection in /index.php via the 'searchinputdata' parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T18:29:11.000000Z"}, {"uuid": "f21b1773-6674-44f6-bc49-aff25d4de2a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2964", "type": "seen", "source": "https://t.me/cvedetector/21529", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2964 - ConcreteCMS Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2964 \nPublished : March 30, 2025, 11:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in ConcreteCMS up to 9.3.9. Affected is the function Save of the component FAQ Block Handler. The manipulation of the argument Navigation/Title Text/Description Source leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T03:17:37.000000Z"}, {"uuid": "f72ae610-61aa-44a8-92fb-f6fad19970cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29640", "type": "seen", "source": "https://t.me/cvedetector/20822", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29640 - \"PhpGurukul Testing Management System SQL Injection\"\", \n  \"Content\": \"CVE ID : CVE-2025-29640 \nPublished : March 21, 2025, 3:15 p.m. | 1\u00a0hour, 28\u00a0minutes ago \nDescription : Phpgurukul Human Metapneumovirus (HMPV) \u2013 Testing Management System v1.0 is vulnerable to SQL Injection in /patient-report.php via the parameter searchdata.. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T18:29:10.000000Z"}]}