{"vulnerability": "CVE-2025-3020", "sightings": [{"uuid": "fc9e8fa7-d599-4a39-8868-ae6518dfec50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30204", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114202990296478859", "content": "", "creation_timestamp": "2025-03-21T23:22:20.038602Z"}, {"uuid": "7a6186d3-453e-4ca2-945c-5f4d59f2ab74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30205", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll5m6i26n52x", "content": "", "creation_timestamp": "2025-03-24T20:34:46.696998Z"}, {"uuid": "e776dde4-465d-43b7-92ce-2af7584bafe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll5m6iaxgn2x", "content": "", "creation_timestamp": "2025-03-24T20:34:47.948214Z"}, {"uuid": "7655e9af-5791-45a7-88db-53799a34772e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llf742euph2x", "content": "", "creation_timestamp": "2025-03-27T21:02:10.561526Z"}, {"uuid": "64218093-b804-4c52-ae95-a89b6953aabf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lleuuhzsu22q", "content": "", "creation_timestamp": "2025-03-27T17:58:54.937796Z"}, {"uuid": "6a091998-e343-492a-a1a5-89d439abe9e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3llfjkpujdc2j", "content": "", "creation_timestamp": "2025-03-28T00:09:17.947633Z"}, {"uuid": "260fada7-2c61-4956-b5df-80bee3d61c19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llduxwshiw24", "content": "", "creation_timestamp": "2025-03-27T08:28:09.586720Z"}, {"uuid": "3f713f75-169b-45d3-bdaa-7a1bf74c040e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30205", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3ll5t7ag2js2j", "content": "", "creation_timestamp": "2025-03-24T22:40:28.481545Z"}, {"uuid": "29fa390f-fc1f-4e1f-9a9e-c92f8c1a0931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/sushicomabacate.com/post/3llbglogsws22", "content": "", "creation_timestamp": "2025-03-26T09:05:28.623310Z"}, {"uuid": "7cd77331-41f3-477e-9cbb-8efcc958d935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30208.yaml", "content": "", "creation_timestamp": "2025-03-26T14:56:05.000000Z"}, {"uuid": "9c991494-7fb5-4b3d-b466-d1ff49cab57b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3llvmlmpawj2z", "content": "", "creation_timestamp": "2025-04-03T09:46:02.031460Z"}, {"uuid": "0cc5133e-92ad-4465-9855-a5739fe3a968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/4m3rr0r.bsky.social/post/3llvzvjslh22o", "content": "", "creation_timestamp": "2025-04-03T13:44:26.214506Z"}, {"uuid": "23cc5021-dbc8-4da5-9dc7-79d4c3c9e7aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/leakix.bsky.social/post/3lmkdelare32c", "content": "", "creation_timestamp": "2025-04-11T15:26:56.419090Z"}, {"uuid": "b4473708-a8aa-455d-821a-6cceb43fdc7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llzctfm5rb2v", "content": "", "creation_timestamp": "2025-04-04T21:02:10.477073Z"}, {"uuid": "30f83588-b4fa-4997-bbc3-50292e7a99a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://gist.github.com/M0dZer0/00969065b82bdc848b04a394259a7b93", "content": "", "creation_timestamp": "2025-04-06T15:33:05.000000Z"}, {"uuid": "a10ef7f7-dd8a-44a1-965c-fef14d7740a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://mastodon.social/users/leakix/statuses/114320030829255172", "content": "", "creation_timestamp": "2025-04-11T15:27:17.799073Z"}, {"uuid": "c89ae756-e88c-4f08-a6fa-4c9471404560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30206", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114344414760600683", "content": "", "creation_timestamp": "2025-04-15T22:48:41.391487Z"}, {"uuid": "c2b2a736-b0a1-41a2-8358-c7629fe32efe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30206", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvd77jfff2q", "content": "", "creation_timestamp": "2025-04-16T00:23:13.519501Z"}, {"uuid": "d0f257ce-b8e3-47f9-bb70-31e623f4921d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lmy5kvhvu326", "content": "", "creation_timestamp": "2025-04-17T03:20:22.311230Z"}, {"uuid": "bf7d3e3c-422f-4c3d-ab91-116d8830974d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/nopfx.bsky.social/post/3ln64zcrck22q", "content": "", "creation_timestamp": "2025-04-19T12:26:30.102819Z"}, {"uuid": "205612ed-eb5f-4630-aeff-850bab06845c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ln7fhcql5s2l", "content": "", "creation_timestamp": "2025-04-20T00:30:10.048770Z"}, {"uuid": "91dd26e7-8850-4e84-b802-37dba52c6225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lr6ktjcukc2f", "content": "", "creation_timestamp": "2025-06-09T14:14:36.803670Z"}, {"uuid": "5aaa5356-fe4d-4ef2-90b2-98b5335a1cef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/bilaltariq01.bsky.social/post/3lr5r2jxicq24", "content": "", "creation_timestamp": "2025-06-09T06:33:13.122014Z"}, {"uuid": "6ee5c0b4-6a34-4165-b714-64044247398a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lny6irbwwa2k", "content": "", "creation_timestamp": "2025-04-29T21:02:15.933823Z"}, {"uuid": "846b8682-61a0-4989-83ad-988d62a395cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30202", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnyvdl4h4h2l", "content": "", "creation_timestamp": "2025-04-30T03:50:57.199304Z"}, {"uuid": "154936a6-18a6-426d-a666-6a043302f389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lo57i2saly2q", "content": "", "creation_timestamp": "2025-05-01T21:03:09.200002Z"}, {"uuid": "b49e5dc1-c53e-4df1-81e3-387f18630e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lo2oxsj4p62n", "content": "", "creation_timestamp": "2025-04-30T21:02:19.530653Z"}, {"uuid": "da222007-440d-45cb-90b2-344329bb7542", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30207", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2vikmxxnk2", "content": "", "creation_timestamp": "2025-05-13T16:31:01.708383Z"}, {"uuid": "9c29aaaf-5c39-42a9-8533-da1a8d66f7dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30204", "type": "seen", "source": "https://gist.github.com/EbonJaeger/085847d246bc8a2ec125431370f20129", "content": "", "creation_timestamp": "2025-05-02T21:10:10.000000Z"}, {"uuid": "6dfe63fc-3f77-42fa-b10d-2c2963c70546", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30207", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp2wstgpzv2h", "content": "", "creation_timestamp": "2025-05-13T16:47:58.787922Z"}, {"uuid": "53a48429-8ab6-4665-a829-74815b509e59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30200", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-19", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}, {"uuid": "294323ec-6e27-4077-9adb-93ee36a8a453", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30204", "type": "seen", "source": "https://gist.github.com/EbonJaeger/4959b52b5b6898ca4e109d36bb8b6d36", "content": "", "creation_timestamp": "2025-05-23T22:39:43.000000Z"}, {"uuid": "bd432867-8814-4e1d-8d62-eb94703227ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-30208", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3m3dao7fmkp2l", "content": "", "creation_timestamp": "2025-10-16T17:07:54.080318Z"}, {"uuid": "eec4e569-a740-4ff3-b5d0-9f1521a1d4bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30204", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:48.000000Z"}, {"uuid": "fefe23ca-731f-475c-a308-385de8064a90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30204", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mhef5tyof22u", "content": "", "creation_timestamp": "2026-03-18T21:03:15.803655Z"}, {"uuid": "9346c680-200b-4f69-b470-a3ee86e61a4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30201", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m65zhty43e2s", "content": "", "creation_timestamp": "2025-11-21T19:31:20.224101Z"}, {"uuid": "e93f99f7-645e-48a9-973e-460b7b5fb480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/sansisc.bsky.social/post/3mijhezrmyt2r", "content": "", "creation_timestamp": "2026-04-02T14:51:31.661283Z"}, {"uuid": "471f6be3-ca66-4e0e-90fb-e161ba1a9268", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/clankussy.abu.guru/post/3mipv3s5pvu2h", "content": "", "creation_timestamp": "2026-04-05T04:12:53.523190Z"}, {"uuid": "f0288d9e-a797-477c-8f99-fd146a400c77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3miluznidlc2d", "content": "", "creation_timestamp": "2026-04-03T14:01:02.265728Z"}, {"uuid": "9750ee12-83e9-4afa-a746-eec645283279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/6v0tgXr67OHpT1VYYnEl9dNKXH-8Vq-uMwR5rJ3hS7Xe9zI", "content": "", "creation_timestamp": "2025-12-25T21:00:05.000000Z"}, {"uuid": "f6c28625-3141-4801-9fa6-4ea1feca9ee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "e92402ac-b04a-4e73-ad0b-3c8344ca18bd", "vulnerability": "CVE-2025-30208", "type": "exploited", "source": "https://isc.sans.edu/diary/32860", "content": "", "creation_timestamp": "2026-04-06T19:42:04.477316Z"}, {"uuid": "fdfc7885-5360-4246-a56f-8930627e8e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/43511", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208\nURL\uff1ahttps://github.com/gonn4cry/CVE-2025-30208\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-10T02:27:49.000000Z"}, {"uuid": "9da73aa4-6c19-48b1-a885-2a5a8f131e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25152", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208 \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\u5feb\u901f\u9a8c\u8bc1\nURL\uff1ahttps://github.com/YuanBenSir/CVE-2025-30208_POC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-26T19:09:12.000000Z"}, {"uuid": "c7dcf352-22ed-4dbe-8fa8-db9ae6826870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30204", "type": "seen", "source": "https://gist.github.com/paulo-raca/8a16df3664952c9b185211298075c6ab", "content": "", "creation_timestamp": "2026-04-10T17:08:55.000000Z"}, {"uuid": "97d564af-217c-4067-8607-b39ac3811bd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "cd6eba8f-a631-4b9d-a629-0d839048fa94", "vulnerability": "CVE-2025-30208", "type": "exploited", "source": "https://github.com/range42/range42-catalog/tree/main/03_container_layer/docker/_ctf/cve/web/vite/CVE-2025-30208", "content": "", "creation_timestamp": "2026-04-15T14:28:36.190289Z"}, {"uuid": "5db81e66-5d02-42c4-a83c-eb752860a08e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/information_security_channel/53936", "content": "CVE-2025-30208 \u2013 Vite Arbitrary File Read via @fs Path Traversal Bypass\nhttps://www.offsec.com/blog/cve-2025-30208/\n\nDiscover CVE-2025-30208, a critical arbitrary file read vulnerability in the Vite development server. Learn how remote attackers exploit @fs URL handling to access sensitive files.\nThe post CVE-2025-30208 \u2013 Vite Arbitrary File Read via @fs Path Traversal Bypass (https://www.offsec.com/blog/cve-2025-30208/) appeared first on OffSec (https://www.offsec.com/).", "creation_timestamp": "2025-07-31T20:18:33.000000Z"}, {"uuid": "d8fe103e-9255-4c89-9a2c-28577502b761", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25592", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.\nURL\uff1ahttps://github.com/On1onss/CVE-2025-30208-LFI\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-27T12:50:25.000000Z"}, {"uuid": "e00f30f0-f1fd-4e5e-9ed5-ad173a75c145", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://t.me/hackingbra/264", "content": "CVE-2025-30208 \n*\nVitejs File read vulnerability\n*\nPOC", "creation_timestamp": "2025-03-27T13:12:10.000000Z"}, {"uuid": "aefe06de-fe46-464b-a183-340f8a104679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/26164", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208 ViteVulnScanner\nURL\uff1ahttps://github.com/keklick1337/CVE-2025-30208-ViteVulnScanner\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-28T12:22:58.000000Z"}, {"uuid": "7cd96db2-01e7-4481-9f78-6cdf1aef5492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/four_rays/52", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Vite CVE-2025-30208\n\nCVE-2025-30208 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u043c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 \u0444\u0440\u043e\u043d\u0442\u0435\u043d\u0434-\u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 Vite, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0444\u0430\u0439\u043b\u0430\u043c. \u0423\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u043e 6.2.3, 6.1.2, 6.0.12, 5.4.15 \u0438 4.5.10\n\n\ud83d\ude2c \u041c\u0435\u0442\u0440\u0438\u043a\u0438\n\nBase Score: 5.3 \nCWE: CWE-200; CWE-284\n\n\ud83d\ude2c \u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \n\n\u0414\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0432 URL \u043f\u043e\u0434\u0441\u0442\u0440\u043e\u043a ?raw?? \u0438\u043b\u0438 ?import&amp;raw?? \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430. \u042d\u0442\u043e \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u0438\u0442 \u0438\u0437-\u0437\u0430 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0435 \u0440\u0430\u0437\u0434\u0435\u043b\u0438\u0442\u0435\u043b\u0438, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a ?, \u0443\u0434\u0430\u043b\u044f\u044e\u0442\u0441\u044f \u0432 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043c\u0435\u0441\u0442\u0430\u0445, \u043d\u043e \u043d\u0435 \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e \u0432 \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u044f\u0445, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0441\u0442\u0440\u043e\u043a\u0438 \u0437\u0430\u043f\u0440\u043e\u0441\u0430.\n\n\ud83d\ude2c \u041f\u043e\u043b\u0435\u0437\u043d\u0430\u044f \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0430\n\n\u041f\u043e\u043b\u0435\u0437\u043d\u0430\u044f \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0438\u0437 \u0441\u0435\u0431\u044f \u043f\u043e\u0434\u043e\u0431\u043d\u0443\u044e \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443:\n/@fs/etc/passwd??raw\n\n@fs \u2014 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u043f\u0440\u0435\u0449\u0430\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0444\u0430\u0439\u043b\u0430\u043c \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u043d\u044b\u0445 \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0439,\n\n/etc/passwd \u2014 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u044b\u0439 \u043d\u0430\u043c \u0444\u0430\u0439\u043b, \n\n? \u2014 \u043d\u0435 \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440, \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043b\u044e\u0431\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u043e\u0439,\n\nraw \u2014 \u0438\u043c\u043f\u043e\u0440\u0442 \u0444\u0430\u0439\u043b\u0430 \u043a\u0430\u043a \u0441\u0442\u0440\u043e\u043a\u0438.\n\n\ud83d\ude2c \u041a\u0430\u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0442\u044c\u0441\u044f \n\n\u0417\u043d\u0430\u044f \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 \u0440\u0430\u0437\u0433\u0440\u0443\u0437\u043a\u0438, \u043c\u043e\u0436\u0435\u043c \u043d\u0430\u043f\u0438\u0441\u0430\u0442\u044c \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e\u0435 \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u0435 \u043d\u0430 URI:\n\\/@fs\\/([a-zA-Z0-9_-]+\\/)*([a-zA-Z0-9_-]+).+?\\?raw", "creation_timestamp": "2025-03-27T14:06:39.000000Z"}, {"uuid": "dc3f4291-8fcf-4b42-8736-b57639c0468a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://t.me/ctinow/248192", "content": "Attempts to Exploit Exposed \"Vite\" Installs (CVE-2025-30208), (Thu, Apr 2nd)\nhttps://ift.tt/KGn9wga", "creation_timestamp": "2026-04-02T14:59:49.000000Z"}, {"uuid": "1ab23484-4c89-4b81-badf-e68ff05a2f13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30204", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8456", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30204\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: golang-jwt is a Go implementation of JSON Web Tokens. Prior to \n5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer  followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.\n\ud83d\udccf Published: 2025-03-21T21:42:01.382Z\n\ud83d\udccf Modified: 2025-03-21T21:42:01.382Z\n\ud83d\udd17 References:\n1. https://github.com/golang-jwt/jwt/security/advisories/GHSA-mh63-6h87-95cp\n2. https://github.com/golang-jwt/jwt/commit/0951d184286dece21f73c85673fd308786ffe9c3", "creation_timestamp": "2025-03-21T22:21:05.000000Z"}, {"uuid": "8b793745-cf86-4cd4-a7b2-c60b0418fef4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30209", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9737", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30209\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker can access release notes content or information via the FRS REST endpoints it should not have access to. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742812323 and Tuleap Enterprise Edition 16.5-6 and 16.4-10.\n\ud83d\udccf Published: 2025-03-31T15:53:46.455Z\n\ud83d\udccf Modified: 2025-03-31T18:19:35.993Z\n\ud83d\udd17 References:\n1. https://github.com/Enalean/tuleap/security/advisories/GHSA-hcp5-pmpm-mgwh\n2. https://github.com/Enalean/tuleap/commit/34af2d5d10b0349967129f53427f495815e5bbcc\n3. https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&amp;h=34af2d5d10b0349967129f53427f495815e5bbcc\n4. https://tuleap.net/plugins/tracker/?aid=42251", "creation_timestamp": "2025-03-31T18:32:18.000000Z"}, {"uuid": "4dfbe878-fadc-42bc-afd6-430fb8e1482a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30207", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16135", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30207\n\ud83d\udd25 CVSS Score: 2.3 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N)\n\ud83d\udd39 Description: Kirby is an open-source content management system. A vulnerability in versions prior to 3.9.8.3, 3.10.1.2, and 4.7.1 affects all Kirby setups that use PHP's built-in server. Such setups are commonly only used during local development. Sites that use other server software (such as Apache, nginx or Caddy) are not affected. A missing path traversal check allowed attackers to navigate all files on the server that were accessible to the PHP process, including files outside of the Kirby installation. The vulnerable implementation delegated all existing files to PHP, including existing files outside of the document root. This leads to a different response that allows attackers to determine whether the requested file exists. Because Kirby's router only delegates such requests to PHP and does not load or execute them, contents of the files were not exposed as PHP treats requests to files outside of the document root as invalid. The problem has been patched in Kirby 3.9.8.3, Kirby 3.10.1.2, and Kirby 4.7.1. In all of the mentioned releases, the maintainers of Kirby have updated the router to check if existing static files are within the document root. Requests to files outside the document root are treated as page requests of the error page and will no longer allow to determine whether the file exists or not.\n\ud83d\udccf Published: 2025-05-13T15:20:00.707Z\n\ud83d\udccf Modified: 2025-05-13T15:20:00.707Z\n\ud83d\udd17 References:\n1. https://github.com/getkirby/kirby/security/advisories/GHSA-9p3p-w5jf-8xxg\n2. https://github.com/getkirby/kirby/releases/tag/3.10.1.2\n3. https://github.com/getkirby/kirby/releases/tag/3.9.8.3\n4. https://github.com/getkirby/kirby/releases/tag/4.7.1", "creation_timestamp": "2025-05-13T15:31:08.000000Z"}, {"uuid": "30441b56-7410-4c3a-8afd-aaff736476f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "Telegram/TYo-tUYtY4yoEXhJVKLpp5w3OfhrOAScdxsUdCHbWOXddqU", "content": "", "creation_timestamp": "2025-10-04T09:00:05.000000Z"}, {"uuid": "08a1b5d1-b3dc-468a-8957-64c470adbc63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/30741", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\u9488\u5bf9CVE-2025-30208\u548cCVE-2025-31125\u7684\u6f0f\u6d1e\u5229\u7528\nURL\uff1ahttps://github.com/jackieya/ViteVulScan\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-09T13:33:30.000000Z"}, {"uuid": "0f442cd9-4a30-4a3a-b55e-d70af60cc173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25190", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208-EXP\nURL\uff1ahttps://github.com/marino-admin/Vite-CVE-2025-30208-Scanner\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-26T20:39:35.000000Z"}, {"uuid": "878a0f15-51cc-40d9-afd8-f3a8bddf0248", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/27278", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208-EXP\nURL\uff1ahttps://github.com/Ahmed-mostafa03/CVE-2025-30208-EXP\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-30T10:05:18.000000Z"}, {"uuid": "6351231f-c4a2-4812-ace5-33d22d1bac38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/28870", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1amass scan for CVE-2025-30208\nURL\uff1ahttps://github.com/sumeet-darekar/CVE-2025-30208\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-02T05:57:16.000000Z"}, {"uuid": "19f2071e-77be-47fa-b9ce-33728a7fca3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/28914", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\u9488\u5bf9CVE-2025-30208\u7684\u7b80\u5355\u6f0f\u6d1e\u5229\u7528\nURL\uff1ahttps://github.com/jackieya/CVE-2025-30208-and-CVE-2025-31125\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-02T07:40:49.000000Z"}, {"uuid": "9206235e-7d9d-4ab9-9f4a-5265eabd3475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/29419", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208 - Vite Arbitrary File Read PoC\nURL\uff1ahttps://github.com/4m3rr0r/CVE-2025-30208-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-03T11:57:22.000000Z"}, {"uuid": "dd8cf700-d709-4be9-82f4-d66247f0da1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25594", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA PoC of the exploit script for the vulnerability of Vite @fs/ Path Traversal in transformMiddleware (CVE-2025-30208)\nURL\uff1ahttps://github.com/4xura/CVE-2025-30108\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-27T13:00:07.000000Z"}, {"uuid": "232a6db5-bb7e-460d-b994-d79cf9a21dbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/41884", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208\nURL\uff1ahttps://github.com/B1ack4sh/Blackash-CVE-2025-30208\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-25T19:07:00.000000Z"}, {"uuid": "4882a89a-566b-4632-8ac5-584dc1eb18df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25427", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208\u52a8\u6001\u68c0\u6d4b\u811a\u672c\uff0c\u652f\u6301\u9ed8\u8ba4\u8def\u5f84\uff0c\u81ea\u5b9a\u4e49\u8def\u5f84\u52a8\u6001\u68c0\u6d4b\nURL\uff1ahttps://github.com/iSee857/CVE-2025-30208-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-27T06:25:48.000000Z"}, {"uuid": "f62d20a4-c42f-42ab-95b7-d1603fbbe50f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25478", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\u6700\u65b0\u7684CVE-2025-30208\u7684poc\uff08\u8fd9\u4e2a\u4ed3\u5e93\u4e3b\u8981\u62ff\u6765\u5199\u5237src\u7684\u4e00\u4e9b\u4e2a\u4eba\u601d\u8def\u6280\u5de7\uff0c\u81ea\u5df1\u5199\u7684\u6216\u8005\u641c\u96c6\u6316src\u7684bypass-waf\u7684\u811a\u672c\uff09\nURL\uff1ahttps://github.com/LiChaser/CVE-2025-30208\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-27T08:22:25.000000Z"}, {"uuid": "9eb64dd3-96fa-47de-b941-5bb612c7a47d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/26100", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208 | Vite\u811a\u672c\nURL\uff1ahttps://github.com/sadhfdw129/CVE-2025-30208-Vite\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-28T09:52:52.000000Z"}, {"uuid": "c709975f-eb78-4963-a9a7-2ae378682b50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25066", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208-EXP\nURL\uff1ahttps://github.com/ThumpBo/CVE-2025-30208-EXP\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-26T17:06:20.000000Z"}, {"uuid": "49fc6847-8dbf-4347-80f6-84c3b7c2f725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25139", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208 POC\nURL\uff1ahttps://github.com/YuanBenSir/CVE-2025-30208POCcn\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-26T18:35:40.000000Z"}, {"uuid": "cf1cc3d3-b7ba-4c74-a29b-537a1448cbcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25108", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208\u6f0f\u6d1e\u626b\u63cf\u5de5\u5177\nURL\uff1ahttps://github.com/kk12-30/CVE-2025-30208\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-26T17:20:51.000000Z"}, {"uuid": "0060df81-2755-482a-a5c5-30097fdcceac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25107", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208 \u68c0\u6d4b\u5de5\u5177\nURL\uff1ahttps://github.com/xaitx/CVE-2025-30208\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-26T17:16:43.000000Z"}, {"uuid": "953fa4ce-d82f-4a10-98a9-8f1346edf732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/25479", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\u6700\u65b0\u7684CVE-2025-30208\u7684poc\uff08\u8fd9\u4e2a\u4ed3\u5e93\u4e3b\u8981\u62ff\u6765\u5199\u5237src\u7684\u4e00\u4e9b\u4e2a\u4eba\u601d\u8def\u6280\u5de7\uff0c\u81ea\u5df1\u5199\u7684\u6216\u8005\u641c\u96c6\u6316src\u7684bypass-waf\u7684\u811a\u672c\uff09\nURL\uff1ahttps://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-29T16:25:33.000000Z"}, {"uuid": "593023be-b0a3-43c6-90e6-a5fb2132a6eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/27940", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\u9488\u5bf9CVE-2025-30208\u7684\u7b80\u5355\u6f0f\u6d1e\u5229\u7528\nURL\uff1ahttps://github.com/jackieya/CVE-2025-30208\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-31T13:19:34.000000Z"}, {"uuid": "5e2b9431-0b00-47f1-bb97-9470f987d9ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/j9hhUGrn1UjsT61HvOuwLNUknuYr4whXlqdhwz-FvQYkdb4", "content": "", "creation_timestamp": "2025-07-10T07:00:11.000000Z"}, {"uuid": "05e4abae-5bcc-498d-b66d-676639de875f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/33274", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30208 vite file read nuclei template\nURL\uff1ahttps://github.com/imbas007/CVE-2025-30208-template\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-21T01:35:07.000000Z"}, {"uuid": "edb7e4b1-7bf1-4c62-85cd-fe232d127130", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/34017", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aAnalysis of the Reproduction of CVE-2025-30208 Series Vulnerabilities\nURL\uff1ahttps://github.com/r0ngy40/CVE-2025-30208-Series\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-24T10:57:00.000000Z"}, {"uuid": "4edf95a2-1101-4bbb-b6de-ea2bed864370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50773", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udee0\ufe0f Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.\nURL\uff1ahttps://github.com/Dany60-98/CVE-2025-30208-EXP\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-08T20:27:27.000000Z"}, {"uuid": "67b911d7-bbfb-4dda-ac0f-a1eafddfa7fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50844", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udee0\ufe0f Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.\nURL\uff1ahttps://github.com/prabhatverma47/CVE-2025-58180-RCE-in-OctoPrint-via-Unsanitized-Filename\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-09T09:00:49.000000Z"}, {"uuid": "16e513ac-a249-420a-b38e-4173a920d8a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50842", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udee0\ufe0f Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.\nURL\uff1ahttps://github.com/prabhatverma47/CVE-2025-58180-RCE-in-OctoPrint-via-Unsanitized-Filename\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-09T08:47:04.000000Z"}, {"uuid": "8a55eee5-1af2-4e77-a073-789a9122ebb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50779", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udee0\ufe0f Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.\nURL\uff1ahttps://github.com/Dany60-98/CVE-2025-30208-EXP\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-08T21:11:42.000000Z"}, {"uuid": "289b1ac0-eff7-4a31-bc76-52641eea1d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/8h8Hof7StAZ6aRznwRxa4merJrUBQ8lRPVMkNJUc9vM2lk4", "content": "", "creation_timestamp": "2025-09-09T03:00:06.000000Z"}, {"uuid": "747d6507-e510-4154-b54c-1148deada7ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/154", "content": "\ud83d\udea8 CVE-2025-30208: Vite Development Server Arbitrary File Read \ud83d\udea8\n\n\ud83d\udd0d Vulnerability: Arbitrary file read in Vite development server\n\u26a0\ufe0f Risk Level: High\n\n\ud83d\udcca Affected Services: 277K+ instances found yearly on hunter.how\n\n\ud83d\udee0 PoC &amp; Exploit:\n\ud83d\udd25 PoC: GitHub Advisory\n\n\ud83d\udd17 Search Queries for Detection:\nHunter: product.name=\"Vite\"\nFOFA: body=\"/@vite/client\"\nShodan: http.html:\"/@vite/client\"\n\n\ud83d\udcf0 More Details:\nRedPacketSecurity\n\n\ud83d\udd12 Mitigation:\n\u2705 Upgrade to the latest patched version of Vite\n\u2705 Restrict access to development servers\n\u2705 Monitor for unauthorized file access\n\n\ud83d\udd17 Stay ahead in cybersecurity: @cybersecplayground\n\n#VITE #infosec #OSINT #CyberSecurity #BugBounty #CVE", "creation_timestamp": "2025-03-28T16:14:46.000000Z"}, {"uuid": "9697fdab-c37b-4fa4-b754-081401bbf753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/wgM1JuHOftA_L6-0IhGLa_Zw8cbNONsSbVoMnYMuxEToJx8", "content": "", "creation_timestamp": "2025-06-29T21:00:04.000000Z"}, {"uuid": "474d6336-e5e3-4dee-8205-4044df0219d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/alm2jq9O8YYx6qnzF2eh-OesfBkG_Ys-e6brm3R0S-yK0DU", "content": "", "creation_timestamp": "2025-06-30T11:00:09.000000Z"}, {"uuid": "59d29941-ecd1-4d2c-b328-3e53769361e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "Telegram/0HYLGhUKfOaz0jB50dGhU2fq-G_e7X2GSHNTYyogkSMsgQo", "content": "", "creation_timestamp": "2025-06-06T21:00:09.000000Z"}, {"uuid": "e7645c74-1538-49de-820a-c5d64f5ff0fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "Telegram/crpzqjFg2q8jdF8RZFydh5cupcYB9bomukRVrpH_6asC9QA", "content": "", "creation_timestamp": "2025-07-10T09:00:04.000000Z"}, {"uuid": "bea70b20-8fa5-4f7c-986a-c5a99748ba54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/seeOg7d7Xdx0LWEqXd7dvE90Oq6nBMNvrC8yGWUmnEYbL4k", "content": "", "creation_timestamp": "2025-06-26T03:00:05.000000Z"}, {"uuid": "d70b5f5e-d1de-46dc-bff9-b11756dd84a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/-VwGhvHbAqGxMoIqAuNl2S-GtS9GOszjSHCSlHw-Z7vkd70", "content": "", "creation_timestamp": "2025-06-26T15:00:10.000000Z"}, {"uuid": "65657632-b700-4ecb-a804-dc030d874875", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/3eIPKEIRkEw_PqwO-kBGhzBrFeWBrRMe-u4MQgs52HclK4o", "content": "", "creation_timestamp": "2025-06-27T15:00:06.000000Z"}, {"uuid": "9c6c7678-3ef0-4ad0-8d7e-57876def3450", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/psXQ70dBFgtvrvGtZTLSrd3BiDDBPRy5bv6EU4aO0O3qwqo", "content": "", "creation_timestamp": "2025-06-27T19:00:08.000000Z"}, {"uuid": "370fe977-3d2a-47e2-ba38-6d0cea2666af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/rJsgkQOydsU18EwQDKO_kzUWB5N7HBS-S5BE4u4LW5jBkxc", "content": "", "creation_timestamp": "2025-06-06T15:00:10.000000Z"}, {"uuid": "af94a07c-b787-46b2-8c50-32f70f700c02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30207", "type": "seen", "source": "https://t.me/cvedetector/25209", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30207 - \"Kirby PHP Built-in Server Path Traversal Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-30207 \nPublished : May 13, 2025, 4:15 p.m. | 59\u00a0minutes ago \nDescription : Kirby is an open-source content management system. A vulnerability in versions prior to 3.9.8.3, 3.10.1.2, and 4.7.1 affects all Kirby setups that use PHP's built-in server. Such setups are commonly only used during local development. Sites that use other server software (such as Apache, nginx or Caddy) are not affected. A missing path traversal check allowed attackers to navigate all files on the server that were accessible to the PHP process, including files outside of the Kirby installation. The vulnerable implementation delegated all existing files to PHP, including existing files outside of the document root. This leads to a different response that allows attackers to determine whether the requested file exists. Because Kirby's router only delegates such requests to PHP and does not load or execute them, contents of the files were not exposed as PHP treats requests to files outside of the document root as invalid. The problem has been patched in Kirby 3.9.8.3, Kirby 3.10.1.2, and Kirby 4.7.1. In all of the mentioned releases, the maintainers of Kirby have updated the router to check if existing static files are within the document root. Requests to files outside the document root are treated as page requests of the error page and will no longer allow to determine whether the file exists or not. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T19:43:54.000000Z"}, {"uuid": "acf014fb-61ce-44af-812b-feefa67b36b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30206", "type": "seen", "source": "https://t.me/cvedetector/23006", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30206 - Dpanel Hardcoded JWT Secret Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30206 \nPublished : April 15, 2025, 8:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : Dpanel is a Docker visualization panel system which provides complete Docker management functions. The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT tokens. By forging these tokens, an attacker can successfully bypass authentication mechanisms, impersonate privileged users, and gain unauthorized administrative access. Consequently, this enables full control over the host machine, potentially leading to severe consequences such as sensitive data exposure, unauthorized command execution, privilege escalation, or further lateral movement within the network environment. This issue is patched in version 1.6.1. A workaround for this vulnerability involves replacing the hardcoded secret with a securely generated value and load it from secure configuration storage. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T00:08:24.000000Z"}, {"uuid": "511d88d2-aeca-40c8-a856-1292e25d0af7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30202", "type": "seen", "source": "https://t.me/cvedetector/24064", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30202 - vLLM ZeroMQ Denial of Service and Data Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30202 \nPublished : April 30, 2025, 1:15 a.m. | 2\u00a0hours ago \nDescription : vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.5.2 and prior to 0.8.5 are vulnerable to denial of service and data exposure via ZeroMQ on multi-node vLLM deployment. In a multi-node vLLM deployment, vLLM uses ZeroMQ for some multi-node communication purposes. The primary vLLM host opens an XPUB ZeroMQ socket and binds it to ALL interfaces. While the socket is always opened for a multi-node deployment, it is only used when doing tensor parallelism across multiple hosts. Any client with network access to this host can connect to this XPUB socket unless its port is blocked by a firewall. Once connected, these arbitrary clients will receive all of the same data broadcasted to all of the secondary vLLM hosts. This data is internal vLLM state information that is not useful to an attacker. By potentially connecting to this socket many times and not reading data published to them, an attacker can also cause a denial of service by slowing down or potentially blocking the publisher. This issue has been patched in version 0.8.5. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T05:22:33.000000Z"}, {"uuid": "1ea15456-213a-48b1-b035-a6c072ccdcb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30205", "type": "seen", "source": "https://t.me/cvedetector/20987", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30205 - Kanidim-Provision Admin Credential Leakage Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30205 \nPublished : March 24, 2025, 5:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : kanidim-provision is a helper utility that uses kanidm's API to provision users, groups and oauth2 systems. Prior to version 1.2.0, a faulty function intrumentation in the (optional) kanidm patches provided by kandim-provision will cause the provisioned admin credentials to be leaked to the system log. This only impacts users which both use the provided patches and provision their `admin` or `idm_admin` account credentials this way. No other credentials are affected. Users should recompile kanidm with the newest patchset from tag `v1.2.0` or higher. As a workaround, the user can set the log level `KANIDM_LOG_LEVEL` to any level higher than `info`, for example `warn`. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T20:54:48.000000Z"}, {"uuid": "9430747f-fe5f-4ff6-ac01-ccef7ddae4a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30209", "type": "seen", "source": "https://t.me/cvedetector/21619", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30209 - Tuleap FRS REST Endpoint Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-30209 \nPublished : March 31, 2025, 4:15 p.m. | 48\u00a0minutes ago \nDescription : Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker can access release notes content or information via the FRS REST endpoints it should not have access to. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742812323 and Tuleap Enterprise Edition 16.5-6 and 16.4-10. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T19:12:26.000000Z"}, {"uuid": "f16a2683-224a-4e21-94ea-47297f5cfb79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30203", "type": "seen", "source": "https://t.me/cvedetector/21618", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30203 - Tuleap RSS Feed Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30203 \nPublished : March 31, 2025, 4:15 p.m. | 48\u00a0minutes ago \nDescription : Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the content of RSS feeds in the RSS widgets. A project administrator or someone with control over an used RSS feed could use this vulnerability to force victims to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742562878 and Tuleap Enterprise Edition 16.5-5 and 16.4-8. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T19:12:24.000000Z"}, {"uuid": "f0eae1f8-2237-419d-a07a-3cff85bd38f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "https://t.me/cvedetector/20985", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30208 - Vite File Access Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30208 \nPublished : March 24, 2025, 5:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&amp;raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T20:54:47.000000Z"}, {"uuid": "716d2b47-7bba-4271-85d6-5022cb378aa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/8445", "content": "#exploit\n1. CCleaner LPE Vulnerability on macOS\nhttps://blog.quarkslab.com/ccleaner_lpe_macos.html\n\n2. CVE-2025-0868:\nArbitrary Command Injection in DocsGPT\nhttps://github.com/shreyas-malhotra/PoC_CVE-2025-0868\n\n3. CVE-2025-30208:\nVite Arbitrary File Read vulnerability\nhttps://github.com/jackieya/CVE-2025-30208", "creation_timestamp": "2025-04-01T06:29:39.000000Z"}, {"uuid": "7da9d889-7c16-4d38-955e-c95109e81324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30204", "type": "seen", "source": "https://t.me/cvedetector/20840", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30204 - golang-jwt Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2025-30204 \nPublished : March 21, 2025, 10:15 p.m. | 37\u00a0minutes ago \nDescription : golang-jwt is a Go implementation of JSON Web Tokens. Prior to   \n5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer  followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-22T00:20:13.000000Z"}, {"uuid": "19a4a135-562d-4047-b591-b7f06a45dccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/iJPJQ7beObHWJMXmyJYgwwaHFOb8gLgGrh3rLSNCelQTJaU", "content": "", "creation_timestamp": "2025-03-28T17:14:53.000000Z"}, {"uuid": "d623c00e-163c-4829-8fbb-8d40d9bb3b6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/2836", "content": "\u26a1Millions at Risk: PoC Exploit Releases for Vite Arbitrary File Read Flaw (CVE-2025-30208).\n\n#CyberBulletin", "creation_timestamp": "2025-03-27T14:54:47.000000Z"}, {"uuid": "f0649633-7813-4d56-a8f1-fa20ed729e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/3362", "content": "#exploit\n1. CCleaner LPE Vulnerability on macOS\nhttps://blog.quarkslab.com/ccleaner_lpe_macos.html\n\n2. CVE-2025-0868:\nArbitrary Command Injection in DocsGPT\nhttps://github.com/shreyas-malhotra/PoC_CVE-2025-0868\n\n3. CVE-2025-30208:\nVite Arbitrary File Read vulnerability\nhttps://github.com/jackieya/CVE-2025-30208", "creation_timestamp": "2025-04-01T06:29:39.000000Z"}, {"uuid": "6a763322-7403-4dfd-8850-0b9b4c8fae6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/Wa2McuvJZCVV_m5Ct1f77n9MEyOW40YuIOFim_HJGAo6VM8", "content": "", "creation_timestamp": "2025-03-28T23:45:58.000000Z"}, {"uuid": "e48cc2ff-8b3a-4db0-901a-f2897c013c8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/KggYeN27jZ-a4rfgVHT2MGe0BAzOSuPW6YEwI7pxp7JEmks", "content": "", "creation_timestamp": "2025-03-29T08:00:08.000000Z"}, {"uuid": "5ad9da13-ec3a-4abe-85bb-644867a46426", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/V-169nqOxfMIrj0WT1-azAjNgIbGyidnL378uF7TvnLYdwE", "content": "", "creation_timestamp": "2025-03-28T23:53:22.000000Z"}, {"uuid": "40839a29-5646-4252-bf13-933a85c3cef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/4n6mfM_xv4uavydfdKkdBPOPI2gWNV_wMBFRreY1FAnSrV4", "content": "", "creation_timestamp": "2025-03-28T16:00:09.000000Z"}, {"uuid": "a0e8d8c1-c18f-42ff-afa2-c0943b3fb001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/IpSkdng-DvuBirFh-8nYsY3OgxKRFd_quSrS72XmwTlTwLs", "content": "", "creation_timestamp": "2025-03-28T00:00:06.000000Z"}, {"uuid": "475dee0a-eb3b-42c6-8106-651d8ad5f5f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/u4QW-PhXvOdEz-DPSjg467lSb3twIBu6R_ivSGfCYMMnQBw", "content": "", "creation_timestamp": "2025-03-26T22:00:05.000000Z"}, {"uuid": "0b6edd5e-c6fe-4d42-9670-17d8a4757df2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/otAoaF9HglqRlYurEeGfVVpj7vUDLPFmRTv87nx_aQ9uiE0", "content": "", "creation_timestamp": "2025-03-27T04:00:06.000000Z"}, {"uuid": "970a450b-52ba-4b5d-b858-de6aff505f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/vQ0Sm3TCgGLw115KTy13Xlz5wNa50qfz0GIGSnr52V26EMk", "content": "", "creation_timestamp": "2025-03-26T20:00:07.000000Z"}, {"uuid": "0fce8485-027a-4edf-afc5-3ccca2511f90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/bsHc6hYCGodfaBywPUDWD_0bkK7FEhNfpE-j_IqFjWAY4yA", "content": "", "creation_timestamp": "2025-03-28T16:00:11.000000Z"}, {"uuid": "58399355-bf0b-4f60-ba18-1060fd9c6fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/YrbI_dt818NPMUxxPwmqr_pW9uiKUjv8OvWWBWCo12-kqN4", "content": "", "creation_timestamp": "2025-04-02T17:00:12.000000Z"}, {"uuid": "39199802-e841-4bd1-95d1-aece2847982b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/kXZvd58izIQiU_MwCLyFKxklQIm_6IOm5Js_A1mT7KUydck", "content": "", "creation_timestamp": "2025-04-02T11:00:05.000000Z"}, {"uuid": "4fe11abc-6a83-4de6-b4ce-f29b4c1dd731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/gptxcG5Jvg83wR56zKKTs8fGBMXLE7PNQ-HCnd7IEVmsKx8", "content": "", "creation_timestamp": "2025-04-05T21:00:06.000000Z"}, {"uuid": "9350c781-263e-48cb-80c0-1f930beb58a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/DrDMVPOkPfm9vtFh1Nj-7-aXipUqQ1t_SrmiRq5-pb3VSK8", "content": "", "creation_timestamp": "2025-03-31T23:00:05.000000Z"}, {"uuid": "c0eb2343-6dba-4c87-9a48-47bb95932efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/qtf5UlSjl8ansax6HEFOWjNwUYd29vo_Y6ok0vpVyjxeaHc", "content": "", "creation_timestamp": "2025-03-30T17:00:07.000000Z"}, {"uuid": "a8c28403-981c-4c3b-b7a9-6d95d98fcdac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/1FU9JKkDtGpcne3Ep4nL0vHVyNGozrk1LcnkQn-O_2rRjKw", "content": "", "creation_timestamp": "2025-03-27T22:00:06.000000Z"}, {"uuid": "0332e1e5-7f70-404d-af5a-cda25b37d4a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/dTUgk8GObROOjGU8Vy5Hdn1MXIpr9wUQqGef_7FiGWlqFgw", "content": "", "creation_timestamp": "2025-03-27T10:00:06.000000Z"}, {"uuid": "32624e0e-cfd3-4cc3-a845-e379e5a14921", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/2Mv-2iki26E7M91NoHSItb85uE7hmbSk_CGlhbCKtUOV7I0", "content": "", "creation_timestamp": "2025-04-05T17:00:10.000000Z"}, {"uuid": "5a21ec08-dffe-4a1f-a825-d20a69dcc96b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/l-RUKEq1u5JC4p5gtwKJVjQtOGsljXG_cScAzYuNwcOFMHM", "content": "", "creation_timestamp": "2025-04-02T01:00:08.000000Z"}, {"uuid": "822a1bc2-45f6-4da4-a7bc-fe25275e7239", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/aVBd3ldNRLl7Xo5CPtKzp3UErMxRgMRg31wU9VFi81ukDXk", "content": "", "creation_timestamp": "2025-04-04T01:00:08.000000Z"}, {"uuid": "b1d8c9b7-bd18-4e51-b2a1-e17f90f2c8eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/jnAs9lps1GrOAmfA7o_KP2NPuXzjFi3WsSTqFMdnmakbvBw", "content": "", "creation_timestamp": "2025-04-03T17:00:07.000000Z"}, {"uuid": "5f1d5b55-c8d8-4488-8ff3-7fb858f7051b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "Telegram/S8evqPLoGvKFCYHeTINL4ie15PDtB1zbRa6NYmcOYj_DCuM", "content": "", "creation_timestamp": "2025-03-27T08:00:07.000000Z"}, {"uuid": "60a11b34-643a-47ce-a9c0-da129175a9a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "seen", "source": "Telegram/NAruocmtQNyLCH4bmdIY1Qg136secAgw_mUlSwrdmRjcry8", "content": "", "creation_timestamp": "2025-04-21T11:00:06.000000Z"}, {"uuid": "3880c04d-383d-48c8-b119-c92e920fad9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30202", "type": "published-proof-of-concept", "source": "Telegram/hbVDftoo7cklg62Gdj6otKY7hUkOaO8wH7xugOEL8u8l2Gc", "content": "", "creation_timestamp": "2025-04-30T03:30:38.000000Z"}, {"uuid": "67f408af-e6e0-4279-bb8d-ebcfa3e50407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2568", "content": "CVE-2025-30208 \n*\nVitejs File read vulnerability\n*\nPOC", "creation_timestamp": "2025-03-27T06:15:17.000000Z"}, {"uuid": "dd773da9-c31c-4512-889c-92e9d88623a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/jj_8tl/275", "content": "Do you know Vite's latest CVE-2025-30208 is a follow-up and patch bypass of a old issue? https://t.co/VZlpIPKbwW\nThe old issue doesn't have a CVE id, but you still can reproduce it via #Vulhub https://t.co/G0dwsLpcW9\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-11T12:17:51.000000Z"}, {"uuid": "a7f5253c-74f1-4ced-b59a-2c83a7cd8054", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/jj_8tl/276", "content": "Vite Development Server Arbitrary File Read (CVE-2025-30208)\nUse #Vulhub to reproduce it:\nhttps://t.co/U51vXlGNae\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-11T12:17:59.000000Z"}, {"uuid": "49569558-39fd-4add-b514-4eb15377debd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11994", "content": "#exploit\n1. CCleaner LPE Vulnerability on macOS\nhttps://blog.quarkslab.com/ccleaner_lpe_macos.html\n\n2. CVE-2025-0868:\nArbitrary Command Injection in DocsGPT\nhttps://github.com/shreyas-malhotra/PoC_CVE-2025-0868\n\n3. CVE-2025-30208:\nVite Arbitrary File Read vulnerability\nhttps://github.com/jackieya/CVE-2025-30208", "creation_timestamp": "2025-04-01T18:10:02.000000Z"}, {"uuid": "cd03b933-107d-441e-8c09-0b7c4bfc51bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30208", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/1420", "content": "cve-2025-30208\n\nLinux\n\nGET /@fs/etc/passwd?import&amp;raw??\n\nWindows\n\nGET /@fs/C://windows/win.ini?import&amp;raw??\n\n#exploit #poc", "creation_timestamp": "2025-03-28T12:33:32.000000Z"}]}