{"vulnerability": "CVE-2025-3022", "sightings": [{"uuid": "672cc7fd-03b3-4402-83fe-d80245e3f590", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30223", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llovp2ml622b", "content": "", "creation_timestamp": "2025-03-31T17:40:22.204055Z"}, {"uuid": "61ed7cd9-ab99-4d23-af2f-a726ef0d73ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30223", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114258772189382510", "content": "", "creation_timestamp": "2025-03-31T19:48:23.945224Z"}, {"uuid": "9b1cfdce-0a34-48f3-b7f0-979005715470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30223", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114258772189382510", "content": "", "creation_timestamp": "2025-03-31T19:48:23.944048Z"}, {"uuid": "79cc8533-6ef5-4891-bedf-54f37d893e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30223", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llrqho3agk24", "content": "", "creation_timestamp": "2025-04-01T20:44:45.523672Z"}, {"uuid": "75972855-7d26-4f59-bd53-c34226ad0ceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3022", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lloewosakd2n", "content": "", "creation_timestamp": "2025-03-31T12:40:24.658558Z"}, {"uuid": "f9471261-adbe-4324-918f-a022514f354a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30223", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llsozkuihx2v", "content": "", "creation_timestamp": "2025-04-02T05:51:37.864025Z"}, {"uuid": "95b29d6d-5b92-4df0-a60e-254caf909a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30223", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llsyghusck2v", "content": "", "creation_timestamp": "2025-04-02T08:39:56.527977Z"}, {"uuid": "218c0aa2-06e1-403a-a50c-aa5cd6d9d66a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30223", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lluzo3uams23", "content": "", "creation_timestamp": "2025-04-03T04:07:28.293318Z"}, {"uuid": "7aa7488f-8f9e-4be4-a5d8-b72f1c0cede9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "b03b0e4f-feac-47bc-90a8-907e5aaded1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lrz3jimv6c2y", "content": "", "creation_timestamp": "2025-06-20T03:22:25.390958Z"}, {"uuid": "922e0243-395d-429c-83a8-3bd9e3e3979f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "5f5d52d3-8995-4805-b6cc-c70060881607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "4586a5cf-9bb5-4ddc-a563-e5380e4b638c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrbetiiidn2p", "content": "", "creation_timestamp": "2025-06-10T17:05:10.178412Z"}, {"uuid": "8895dc14-cccd-4bba-b139-dbeb3b4d2039", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "a341a9b9-947a-4f86-8ec8-763dde93728d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "57fc8262-6d2f-4d2d-ad82-6ebf064839ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "044a11a1-2f80-4c90-97e7-a9b02d8055ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "36dc6cc9-7592-4355-bb53-bc187a8abce7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "2504a86a-3f8a-426a-bebc-5dae555c8cf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "5e0810ba-58f4-4b7e-83fd-453223223e2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "d468b22b-fd69-4a9c-be86-7df1e88c5617", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "2b4a5d2a-2fa9-4adb-8855-533c7af32fc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lrvvszbgj42k", "content": "", "creation_timestamp": "2025-06-18T21:02:26.769372Z"}, {"uuid": "a1b85141-deb0-43c9-b38d-a968eba3faa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "05fa7d3b-79e6-4ca9-9993-aceabd493d39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "d599265c-0da0-48f5-88cd-b8826c52b96e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "a0366922-1acf-456d-8dff-8528bdc8ee55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "c353e2bb-f1c7-4b60-9074-cba18192775d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "33e4475d-43f2-4be3-9e51-25d669533f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "2aa4c126-0dcb-4461-bc17-ea7a9efe5fda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "ce9c1bb9-d80c-4be4-b8fe-364ffbab193f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "7a86b372-be7c-4735-af95-ba0b20f03a4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "135e9908-c574-480e-af5f-884fb664bf1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "1ee3720d-843e-4dea-b85c-ae84e01d4bf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "74cee02d-0ba5-454f-87f5-6636b8f8470d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "f624d156-9d45-4479-9a19-e5946e204626", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "0d9c1c57-2298-478a-b1f3-a94b18014e72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "92f476b6-a1f6-40f7-9f8e-2bdf85ef076d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-28)", "content": "", "creation_timestamp": "2025-07-28T00:00:00.000000Z"}, {"uuid": "41d26c09-652b-49ae-8744-1f6c000f612e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "22e394c2-b406-4568-87ae-b5a61348858b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3luqgm5gcx32z", "content": "", "creation_timestamp": "2025-07-24T21:02:25.197077Z"}, {"uuid": "d91fcb4a-4ea6-4853-bb98-b66f145ff607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}, {"uuid": "20108473-8a35-49f8-8ea4-f8220e68cc2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3022", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-09-10T07:47:57.000000Z"}, {"uuid": "344583f1-9e0d-4fce-8a78-c4d42b66ac75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "28559e0b-7a54-4c88-86e5-4e120b4de709", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "3827dbde-0049-4966-8f52-d673b64e2e66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-30220.yaml", "content": "", "creation_timestamp": "2025-06-17T22:12:34.000000Z"}, {"uuid": "c1623737-b7d1-4851-b738-0f76404c0af2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-07)", "content": "", "creation_timestamp": "2025-08-07T00:00:00.000000Z"}, {"uuid": "b1ffead1-59db-459c-bf2c-890641fdc935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-02)", "content": "", "creation_timestamp": "2025-08-02T00:00:00.000000Z"}, {"uuid": "0766b578-cff6-44d8-a5c0-c8a327ceb1d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-05)", "content": "", "creation_timestamp": "2025-08-05T00:00:00.000000Z"}, {"uuid": "76943f6e-1166-4361-9ebe-1ce43b7be5f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-03)", "content": "", "creation_timestamp": "2025-08-03T00:00:00.000000Z"}, {"uuid": "afddcda6-668d-48d6-a05c-d3a19f952b95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-13)", "content": "", "creation_timestamp": "2025-08-13T00:00:00.000000Z"}, {"uuid": "ded7053f-719d-4494-970d-d814d9ca141e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3022", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-08-10T18:27:44.000000Z"}, {"uuid": "9a1b34b3-d892-480f-b040-9c0f0cb57e08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-24)", "content": "", "creation_timestamp": "2025-12-24T00:00:00.000000Z"}, {"uuid": "492b6f82-ef19-440f-a8cc-c2103b2790bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-15)", "content": "", "creation_timestamp": "2025-08-15T00:00:00.000000Z"}, {"uuid": "19e5b42d-4e98-4e38-ae9d-59a26c6e93ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-20)", "content": "", "creation_timestamp": "2025-08-20T00:00:00.000000Z"}, {"uuid": "4e869b30-c0a3-4c2c-84c2-3736ede9245d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-22)", "content": "", "creation_timestamp": "2025-08-22T00:00:00.000000Z"}, {"uuid": "91823606-4b48-4d0f-b28d-298f24a6be30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-26)", "content": "", "creation_timestamp": "2025-11-26T00:00:00.000000Z"}, {"uuid": "27caa9a5-2e93-49ba-a640-5db17cc9d8f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}, {"uuid": "5e0112cd-634b-4e6a-9795-7427b00046bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-10)", "content": "", "creation_timestamp": "2026-03-10T00:00:00.000000Z"}, {"uuid": "d7004020-293f-4ea7-aaf8-f560c93383f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}, {"uuid": "def9786b-327b-49e6-894b-1cf58709b263", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30225", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8907", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30225\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of malformed transformations. When making many malformed transformation requests at once, at some point, all assets are served as 403. This causes denial of assets for all policies of Directus, including Admin and Public. Version 12.0.1 of the `@directus/storage-driver-s3` package, corresponding to version 11.5.0 of Directus, fixes the issue.\n\ud83d\udccf Published: 2025-03-26T16:27:14.665Z\n\ud83d\udccf Modified: 2025-03-26T16:27:14.665Z\n\ud83d\udd17 References:\n1. https://github.com/directus/directus/security/advisories/GHSA-j8xj-7jff-46mx", "creation_timestamp": "2025-03-26T17:25:35.000000Z"}, {"uuid": "8c2eaf18-c5e4-4af3-88d6-4924ea66da3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30225", "type": "seen", "source": "https://t.me/cvedetector/21213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30225 - Directus S3 Storage Driver Asset Unavailability Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-30225 \nPublished : March 26, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of malformed transformations. When making many malformed transformation requests at once, at some point, all assets are served as 403. This causes denial of assets for all policies of Directus, including Admin and Public. Version 12.0.1 of the `@directus/storage-driver-s3` package, corresponding to version 11.5.0 of Directus, fixes the issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T20:35:02.000000Z"}, {"uuid": "2ec517e7-9494-4f9f-8048-d9fdc632f338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-12)", "content": "", "creation_timestamp": "2026-04-12T00:00:00.000000Z"}, {"uuid": "76453ca3-8d1b-4fc1-a36a-3157d1668537", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-24)", "content": "", "creation_timestamp": "2026-04-24T00:00:00.000000Z"}, {"uuid": "28f5e2ea-d3b2-401d-b84c-b650d1f3a3c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3022", "type": "seen", "source": "https://t.me/cvedetector/21579", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3022 - E-solutions E-Management Os Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3022 \nPublished : March 31, 2025, 12:15 p.m. | 33\u00a0minutes ago \nDescription : Os command injection vulnerability in e-solutions e-management. This vulnerability allows an attacker to execute arbitrary commands on the server via the \u2018client\u2019 parameter in the /data/apache/e-management/api/api3.php endpoint. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T15:00:46.000000Z"}, {"uuid": "9557811d-3ec8-4db4-8eeb-c55b827adc2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3022", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9630", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3022\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Os command injection vulnerability in e-solutions e-management. This vulnerability allows an attacker to execute arbitrary commands on the server via the \u2018client\u2019 parameter in the /data/apache/e-management/api/api3.php endpoint.\n\ud83d\udccf Published: 2025-03-31T11:09:17.106Z\n\ud83d\udccf Modified: 2025-03-31T11:09:17.106Z\n\ud83d\udd17 References:\n1. https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-e-management-e-solutions", "creation_timestamp": "2025-03-31T11:31:37.000000Z"}, {"uuid": "e0040bf4-59aa-425a-8d78-2291b8efe129", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30223", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9693", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30223\n\ud83d\udd25 CVSS Score: 9.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: Beego is an open-source web framework for the Go programming language. Prior to 2.3.6, a Cross-Site Scripting (XSS) vulnerability exists in Beego's RenderForm() function due to improper HTML escaping of user-controlled data. This vulnerability allows attackers to inject malicious JavaScript code that executes in victims' browsers, potentially leading to session hijacking, credential theft, or account takeover. The vulnerability affects any application using Beego's RenderForm() function with user-provided data. Since it is a high-level function generating an entire form markup, many developers would assume it automatically escapes attributes (the way most frameworks do). This vulnerability is fixed in 2.3.6.\n\ud83d\udccf Published: 2025-03-31T16:17:05.914Z\n\ud83d\udccf Modified: 2025-03-31T16:17:05.914Z\n\ud83d\udd17 References:\n1. https://github.com/beego/beego/security/advisories/GHSA-2j42-h78h-q4fg\n2. https://github.com/beego/beego/commit/939bb18c66406466715ddadd25dd9ffa6f169e25", "creation_timestamp": "2025-03-31T16:33:14.000000Z"}, {"uuid": "eb797503-6c44-4579-a822-9f6e45cd06b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/57", "content": "", "creation_timestamp": "2025-08-03T03:07:36.000000Z"}, {"uuid": "2eb4e857-72c6-4be5-9bf6-701ba6c65518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30221", "type": "seen", "source": "https://t.me/cvedetector/21299", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30221 - Pitchfork HTTP Response Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30221 \nPublished : March 27, 2025, 3:16 p.m. | 20\u00a0minutes ago \nDescription : Pitchfork is a preforking HTTP server for Rack applications. Versions prior to 0.11.0 are vulnerable to HTTP Response Header Injection when used in conjunction with Rack 3. The issue was fixed in Pitchfork release 0.11.0. No known workarounds are available. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T16:39:09.000000Z"}, {"uuid": "08579f38-44c9-441f-a05e-0e0dd972d2ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30224", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9957", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30224\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: MyDumper is a MySQL Logical Backup Tool. The MySQL C client library (libmysqlclient) allows authenticated remote actors to read arbitrary files from client systems via a crafted server response to LOAD LOCAL INFILE query, leading to sensitive information disclosure when clients connect to untrusted MySQL servers without explicitly disabling the local infile capability. Mydumper has the local infile option enabled by default and does not have an option to disable it. This can lead to an unexpected arbitrary file read if the Mydumper tool connects to an untrusted server. This vulnerability is fixed in 0.18.2-8.\n\ud83d\udccf Published: 2025-04-01T14:38:43.253Z\n\ud83d\udccf Modified: 2025-04-01T17:18:52.450Z\n\ud83d\udd17 References:\n1. https://github.com/mydumper/mydumper/security/advisories/GHSA-r8qc-xp3g-c458", "creation_timestamp": "2025-04-01T17:32:37.000000Z"}, {"uuid": "a3596dd6-656d-4f2a-8bba-dc25332ff95c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-25)", "content": "", "creation_timestamp": "2026-04-25T00:00:00.000000Z"}, {"uuid": "761f0eff-8018-40b3-b1fa-8d8b79153108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30220", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17910", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30220\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L)\n\ud83d\udd39 Description: GeoServer is an open source server that allows users to share and edit geospatial data. GeoTools Schema class use of Eclipse XSD library to represent schema data structure is vulnerable to XML External Entity (XXE) exploit. This impacts whoever exposes XML processing with gt-xsd-core involved in parsing, when the documents carry a reference to an external XML schema. The gt-xsd-core Schemas class is not using the EntityResolver provided by the ParserHandler (if any was configured). This also impacts users of gt-wfs-ng DataStore where the ENTITY_RESOLVER connection parameter was not being used as intended. This vulnerability is fixed in GeoTools 33.1, 32.3, 31.7, and 28.6.1, GeoServer 2.27.1, 2.26.3, and 2.25.7, and GeoNetwork 4.4.8 and 4.2.13.\n\ud83d\udccf Published: 2025-06-10T15:16:39.339Z\n\ud83d\udccf Modified: 2025-06-10T15:16:39.339Z\n\ud83d\udd17 References:\n1. https://github.com/geoserver/geoserver/security/advisories/GHSA-jj54-8f66-c5pc\n2. https://github.com/geonetwork/core-geonetwork/security/advisories/GHSA-2p76-gc46-5fvc\n3. https://github.com/geotools/geotools/security/advisories/GHSA-826p-4gcg-35vw\n4. https://github.com/geonetwork/core-geonetwork/pull/8757\n5. https://github.com/geonetwork/core-geonetwork/pull/8803\n6. https://github.com/geonetwork/core-geonetwork/pull/8812\n7. https://docs.geoserver.org/latest/en/user/production/config.html#production-config-external-entities", "creation_timestamp": "2025-06-10T15:31:13.000000Z"}, {"uuid": "7f453d5e-08e6-443a-9bf7-04e1202e9278", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30222", "type": "seen", "source": "https://t.me/cvedetector/21138", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30222 - Shescape Windows Environment Variable Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-30222 \nPublished : March 25, 2025, 11:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Shescape is a simple shell escape library for JavaScript. Versions 1.7.2 through 2.1.1 are vulnerable to potential environment variable exposure on Windows with CMD. This impact users of Shescape on Windows that explicitly configure `shell: 'cmd.exe'` or `shell: true` using any of `quote`/`quoteAll`/`escape`/`escapeAll`. An attacker may be able to get read-only access to environment variables. This bug has been patched in v2.1.2. For those who are already using v2 of Shescape, no further changes are required. Those who are are using v1 of Shescape should follow the migration guide to upgrade to v2. There is no plan to release a patch compatible with v1 of Shescape. As a workaround, users can remove all instances of `%` from user input before using Shescape. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T02:11:08.000000Z"}, {"uuid": "58b3bf0c-a9c4-431e-8c5e-e1daed137710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30223", "type": "seen", "source": "https://t.me/cvedetector/21637", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30223 - Beego Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30223 \nPublished : March 31, 2025, 5:15 p.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : Beego is an open-source web framework for the Go programming language. Prior to 2.3.6, a Cross-Site Scripting (XSS) vulnerability exists in Beego's RenderForm() function due to improper HTML escaping of user-controlled data. This vulnerability allows attackers to inject malicious JavaScript code that executes in victims' browsers, potentially leading to session hijacking, credential theft, or account takeover. The vulnerability affects any application using Beego's RenderForm() function with user-provided data. Since it is a high-level function generating an entire form markup, many developers would assume it automatically escapes attributes (the way most frameworks do). This vulnerability is fixed in 2.3.6. \nSeverity: 9.3 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T21:43:20.000000Z"}]}