{"vulnerability": "CVE-2025-30232", "sightings": [{"uuid": "dfa336ef-385a-4c96-a737-d4155169964f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3llc2rx277m2d", "content": "", "creation_timestamp": "2025-03-26T15:06:51.063262Z"}, {"uuid": "68306aab-0cda-4ef9-83d1-42804592a46b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llc4kw3ufk2v", "content": "", "creation_timestamp": "2025-03-26T15:38:42.453729Z"}, {"uuid": "c789b2b1-0859-42e0-be72-578e332f775f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3llfkq7xjg42x", "content": "", "creation_timestamp": "2025-03-28T00:30:12.845532Z"}, {"uuid": "ae1848f5-c037-46aa-beb1-e7c6f7403b87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llev4aniv22q", "content": "", "creation_timestamp": "2025-03-27T18:03:16.758168Z"}, {"uuid": "912ac845-1965-4fe1-850a-de7bd646cdd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lldnyaargx2u", "content": "", "creation_timestamp": "2025-03-27T06:23:06.276687Z"}, {"uuid": "14cd88aa-3596-4cb9-a829-ecb116141ab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3llgo4arldt26", "content": "", "creation_timestamp": "2025-03-28T11:03:17.275876Z"}, {"uuid": "47d451cf-6401-4fc9-94f2-d88eb0e1e8e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://bsky.app/profile/prohoster.bsky.social/post/3llhi43ilq32q", "content": "", "creation_timestamp": "2025-03-28T18:48:29.076848Z"}, {"uuid": "98f3b161-37de-4566-9b9f-199863935a2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lljblcv6yc24", "content": "", "creation_timestamp": "2025-03-29T11:57:09.544539Z"}, {"uuid": "e843e715-3083-4d74-a0a0-74f2b288c668", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3llgiabavxn27", "content": "", "creation_timestamp": "2025-03-28T09:18:08.999822Z"}, {"uuid": "9499f149-f408-431c-bb5b-2e7fb8382ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-09-10T07:47:58.000000Z"}, {"uuid": "adf4f7b5-326a-42a3-a7c5-c059296fa6fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-200/", "content": "", "creation_timestamp": "2025-04-07T03:00:00.000000Z"}, {"uuid": "fd4fba8f-e679-45a4-900e-959d98def890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-08-10T18:27:44.000000Z"}, {"uuid": "d2f33e0f-a3cc-4625-956d-62dcdbed62c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://t.me/cvedetector/21358", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30232 - Exim Use-After-Free Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-30232 \nPublished : March 28, 2025, 12:15 a.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : A use-after-free in Exim 4.96 through 4.98.1 could allow users (with command-line access) to escalate privileges. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T03:31:53.000000Z"}, {"uuid": "69a4bd8d-2241-4cbf-bbff-baf79b927492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "Telegram/PWNK0uEjqc3o9Ao2DS9MNA_zBBKtA6SCYaqSlMWCwGOICKU", "content": "", "creation_timestamp": "2025-10-31T04:31:55.000000Z"}, {"uuid": "45d5aedd-d4ff-45bc-ad83-ed831c213ad2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9243", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30232\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A use-after-free in Exim 4.96 through 4.98.1 could allow users (with command-line access) to escalate privileges.\n\ud83d\udccf Published: 2025-03-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-28T00:11:36.790Z\n\ud83d\udd17 References:\n1. https://www.exim.org/static/doc/security/CVE-2025-30232.txt", "creation_timestamp": "2025-03-28T00:35:30.000000Z"}, {"uuid": "d7b8a3c5-f2a7-4a96-a07a-03e7b35d1a9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "published-proof-of-concept", "source": "Telegram/FM2EOk86-hsfYWtXeDik_4c3ateEFNrnuhfOBQbGFDHktVc", "content": "", "creation_timestamp": "2025-03-28T02:00:41.000000Z"}, {"uuid": "b837e83a-d47f-44e6-afce-e8d0ba05feab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30232", "type": "seen", "source": "https://t.me/suboxone_chatroom/7690", "content": "CVE-2025-30232: Use-after-free in Exim, \"medium\" rating\u2757\ufe0f\n\nA vulnerability in some versions of Exim potentially allows an attacker to perform Privilege Escalation, if he has command line access.\n\nSearch at Netlas.io:\n\ud83d\udc49 Link: https://nt.ls/mtDNc\n\ud83d\udc49 Dork: smtp.banner:\"Exim 4.96\" OR smtp.banner:\"Exim 4.97\" OR smtp.banner:\"Exim 4.98\" OR smtp.banner:\"Exim 4.98.1\"\n\nVendor's advisory: https://exim.org/static/doc/security/CVE-2025-30232.txt", "creation_timestamp": "2025-04-07T11:28:11.000000Z"}]}