{"vulnerability": "CVE-2025-3035", "sightings": [{"uuid": "2df930dd-e239-4662-be09-f07aab1ba562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30355", "type": "seen", "source": "https://bsky.app/profile/element.io/post/3llcybrbt622e", "content": "", "creation_timestamp": "2025-03-26T23:54:43.073269Z"}, {"uuid": "fd350279-c666-411c-8e42-0d3c8df46192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30353", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llfssjrsbb2m", "content": "", "creation_timestamp": "2025-03-28T02:54:40.006008Z"}, {"uuid": "ac7199da-a255-435e-bb05-9154bfcc684a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30353", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llggszm5nc2e", "content": "", "creation_timestamp": "2025-03-28T08:52:53.873082Z"}, {"uuid": "dc40dbeb-1379-47f4-b5fb-87677f63e4d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3035", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114262832435614839", "content": "", "creation_timestamp": "2025-04-01T13:00:58.787918Z"}, {"uuid": "3b0c59d3-dfc9-4ab0-a83a-ea790695ab6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30355", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llhpl55a3q2a", "content": "", "creation_timestamp": "2025-03-28T21:02:12.456338Z"}, {"uuid": "844b28d2-30e0-4965-adfd-2f27b9dc5255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30357", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln42frbshg2b", "content": "", "creation_timestamp": "2025-04-18T16:34:36.035379Z"}, {"uuid": "19b9c54b-9726-4fe9-8d2c-a07044e697fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30356", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lls2brmaqb2p", "content": "", "creation_timestamp": "2025-04-01T23:40:24.047444Z"}, {"uuid": "3772c625-ffb5-4b2e-b033-e05de5f9945b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30356", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llrxufeglj2j", "content": "", "creation_timestamp": "2025-04-01T22:57:13.329212Z"}, {"uuid": "2258b2e6-9d82-4bef-8c1b-1d4f7800a62e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30353", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lmv4v2tn6s2y", "content": "", "creation_timestamp": "2025-04-15T22:30:15.714385Z"}, {"uuid": "ecbe414e-68c6-4b0a-8c8c-bebe79229c62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30357", "type": "seen", "source": "https://bsky.app/profile/Minecraft.activitypub.awakari.com.ap.brid.gy/post/3ln45d2ygk6y2", "content": "", "creation_timestamp": "2025-04-18T17:27:36.672112Z"}, {"uuid": "1fb20f29-d6d7-402e-ae53-fcf3b0dae365", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30359", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqpx3zn5yk2q", "content": "", "creation_timestamp": "2025-06-03T18:44:08.738337Z"}, {"uuid": "1cd4bb20-09d6-40b8-8e12-163d8942403d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30355", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-09-10T07:48:00.000000Z"}, {"uuid": "f34d184e-ee98-42ab-8923-576b8fa73c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30359", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqpv7kbezf62", "content": "", "creation_timestamp": "2025-06-03T18:11:11.980519Z"}, {"uuid": "437e90fd-d42e-4c8c-8a5f-291311361571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30355", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-08-10T18:27:45.000000Z"}, {"uuid": "36cc02c0-de30-48e4-a66d-ced526a08b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30351", "type": "seen", "source": "https://t.me/cvedetector/21207", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30351 - Directus Session Token Abuse\", \n  \"Content\": \"CVE ID : CVE-2025-30351 \nPublished : March 26, 2025, 6:15 p.m. | 31\u00a0minutes ago \nDescription : Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 10.10.0 and prior to version 11.5.0, a suspended user can use the token generated in session auth mode to access the API despite their status. This happens because there is a check missing in `verifySessionJWT` to verify that a user is actually still active and allowed to access the API. One can extract the session token obtained by, e.g. login in to the app while still active and then, after the user has been suspended continue to use that token until it expires. Version 11.5.0 patches the issue. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T20:34:55.000000Z"}, {"uuid": "84c1528c-e69b-488c-af0d-c6b942cace1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30353", "type": "seen", "source": "https://t.me/cvedetector/21203", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30353 - Directus Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30353 \nPublished : March 26, 2025, 6:15 p.m. | 31\u00a0minutes ago \nDescription : Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.5.0, when a Flow with the \"Webhook\" trigger and the \"Data of Last Operation\" response body encounters a ValidationError thrown by a failed condition operation, the API response includes sensitive data. This includes environmental variables, sensitive API keys, user accountability information, and operational data. This issue poses a significant security risk, as any unintended exposure of this data could lead to potential misuse. Version 11.5.0 fixes the issue. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T20:34:49.000000Z"}, {"uuid": "0117b9f8-8369-41cc-ae34-9d312dc12f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30352", "type": "seen", "source": "https://t.me/cvedetector/21202", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30352 - Directus Unrestricted Field Enumerability\", \n  \"Content\": \"CVE ID : CVE-2025-30352 \nPublished : March 26, 2025, 6:15 p.m. | 31\u00a0minutes ago \nDescription : Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0-alpha.4 and prior to version 11.5.0, the `search` query parameter allows users with access to a collection to filter items based on fields they do not have permission to view. This allows the enumeration of unknown field contents. The searchable columns (numbers &amp; strings) are not checked against permissions when injecting the `where` clauses for applying the search query. This leads to the possibility of enumerating those un-permitted fields. Version 11.5.0 fixes the issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T20:34:48.000000Z"}, {"uuid": "59224316-3709-4ecd-a74c-3a7c9eee55ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30352", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9122", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30352\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0-alpha.4 and prior to version 11.5.0, the `search` query parameter allows users with access to a collection to filter items based on fields they do not have permission to view. This allows the enumeration of unknown field contents. The searchable columns (numbers &amp; strings) are not checked against permissions when injecting the `where` clauses for applying the search query. This leads to the possibility of enumerating those un-permitted fields. Version 11.5.0 fixes the issue.\n\ud83d\udccf Published: 2025-03-26T17:18:39.567Z\n\ud83d\udccf Modified: 2025-03-27T15:15:07.652Z\n\ud83d\udd17 References:\n1. https://github.com/directus/directus/security/advisories/GHSA-7wq3-jr35-275c\n2. https://github.com/directus/directus/commit/ac5a9964d9926f20dc063a74cb417dc7bbad676d", "creation_timestamp": "2025-03-27T15:26:55.000000Z"}, {"uuid": "d9d2e267-2643-4cfe-b77f-6337880b46cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30350", "type": "seen", "source": "https://t.me/cvedetector/21210", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30350 - Directus S3 Storage Driver HEAD Flood Denial of Assets\", \n  \"Content\": \"CVE ID : CVE-2025-30350 \nPublished : March 26, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of HEAD requests. Some tools use Directus to sync content and assets, and some of those tools use the HEAD method to check the existence of files. When making many HEAD requests at once, at some point, all assets are eventually served as 403. This causes denial of assets for all policies of Directus, including Admin and Public. Version 12.0.1 of the `@directus/storage-driver-s3` package, corresponding to version 11.5.0 of Directus, fixes the issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T20:34:57.000000Z"}, {"uuid": "1c107297-7552-4873-ac5d-a9134e3d849c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30351", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8899", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30351\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 10.10.0 and prior to version 11.5.0, a suspended user can use the token generated in session auth mode to access the API despite their status. This happens because there is a check missing in `verifySessionJWT` to verify that a user is actually still active and allowed to access the API. One can extract the session token obtained by, e.g. login in to the app while still active and then, after the user has been suspended continue to use that token until it expires. Version 11.5.0 patches the issue.\n\ud83d\udccf Published: 2025-03-26T17:13:42.096Z\n\ud83d\udccf Modified: 2025-03-26T17:13:42.096Z\n\ud83d\udd17 References:\n1. https://github.com/directus/directus/security/advisories/GHSA-56p6-qw3c-fq2g", "creation_timestamp": "2025-03-26T17:25:24.000000Z"}, {"uuid": "125345aa-77df-4c7c-85bd-8119529c3590", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30354", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9906", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30354\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Bruno is an open source IDE for exploring and testing APIs. A bug in the assertion runtime caused assert expressions to run in Developer Mode, even if Safe Mode was selected. The bug resulted in the sandbox settings to be ignored for the particular case where a single request is run/sent. This vulnerability's attack surface is limited strictly to scenarios where users import collections from untrusted or malicious sources. The exploit requires deliberate action from the user\u2014specifically, downloading and opening an externally provided malicious Bruno collection. The vulnerability is fixed in 1.39.1.\n\ud83d\udccf Published: 2025-04-01T14:21:39.625Z\n\ud83d\udccf Modified: 2025-04-01T14:21:39.625Z\n\ud83d\udd17 References:\n1. https://github.com/usebruno/bruno/security/advisories/GHSA-hffg-7v8v-79j3", "creation_timestamp": "2025-04-01T14:33:08.000000Z"}, {"uuid": "1ce13adc-613a-4cba-b0d9-ec62a7da18d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30356", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10022", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30356\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In 1.3.3 and earlier, a heap buffer overflow vulnerability persists in the Crypto_TC_ApplySecurity function due to an incomplete validation check on the fl (frame length) field. Although CVE-2025-29912 addressed an underflow issue involving fl, the patch fails to fully prevent unsafe calculations. As a result, an attacker can still craft malicious frames that cause a negative tf_payload_len, which is then interpreted as a large unsigned value, leading to a heap buffer overflow in a memcpy call.\n\ud83d\udccf Published: 2025-04-01T22:06:22.576Z\n\ud83d\udccf Modified: 2025-04-01T22:06:22.576Z\n\ud83d\udd17 References:\n1. https://github.com/nasa/CryptoLib/security/advisories/GHSA-6w2x-w7w3-85w2\n2. https://github.com/nasa/CryptoLib/commit/59d1bce7608c94c6131ef4877535075b0649799c", "creation_timestamp": "2025-04-01T22:32:41.000000Z"}, {"uuid": "9e2af0c2-d47b-42dc-a3b4-3c0da4ff4de9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30350", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8902", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30350\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of HEAD requests. Some tools use Directus to sync content and assets, and some of those tools use the HEAD method to check the existence of files. When making many HEAD requests at once, at some point, all assets are eventually served as 403. This causes denial of assets for all policies of Directus, including Admin and Public. Version 12.0.1 of the `@directus/storage-driver-s3` package, corresponding to version 11.5.0 of Directus, fixes the issue.\n\ud83d\udccf Published: 2025-03-26T16:49:48.880Z\n\ud83d\udccf Modified: 2025-03-26T16:49:48.880Z\n\ud83d\udd17 References:\n1. https://github.com/directus/directus/security/advisories/GHSA-rv78-qqrq-73m5", "creation_timestamp": "2025-03-26T17:25:27.000000Z"}, {"uuid": "c4f70b7e-e839-40d1-b993-dc99ad79ea7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30357", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12466", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30357\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:H)\n\ud83d\udd39 Description: NamelessMC is a free, easy to use &amp; powerful website software for Minecraft servers. In version 2.1.4 and prior, if a malicious user is leaving spam comments on many topics then an administrator, unable to manually remove each spam comment, may delete the malicious account. Once an administrator deletes the malicious user's account, all their posts (comments) along with the associated topics (by unrelated users) will be marked as deleted. This issue has been patched in version 2.2.0.\n\ud83d\udccf Published: 2025-04-18T15:51:21.670Z\n\ud83d\udccf Modified: 2025-04-18T15:51:21.670Z\n\ud83d\udd17 References:\n1. https://github.com/NamelessMC/Nameless/security/advisories/GHSA-22mc-7c9m-gv8h\n2. https://github.com/NamelessMC/Nameless/commit/7040924e27f99aa486c619a5b4ca809051a1ca7f\n3. https://github.com/NamelessMC/Nameless/releases/tag/v2.2.0", "creation_timestamp": "2025-04-18T15:58:46.000000Z"}, {"uuid": "9cf355dc-8b49-4e84-b62c-9491f77dcc33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30357", "type": "seen", "source": "https://t.me/cvedetector/23319", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30357 - NamelessMC Comment Deletion Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30357 \nPublished : April 18, 2025, 4:15 p.m. | 26\u00a0minutes ago \nDescription : NamelessMC is a free, easy to use &amp; powerful website software for Minecraft servers. In version 2.1.4 and prior, if a malicious user is leaving spam comments on many topics then an administrator, unable to manually remove each spam comment, may delete the malicious account. Once an administrator deletes the malicious user's account, all their posts (comments) along with the associated topics (by unrelated users) will be marked as deleted. This issue has been patched in version 2.2.0. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T19:05:00.000000Z"}, {"uuid": "eb9eb69c-d119-444a-b822-14b3eda045cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30357", "type": "published-proof-of-concept", "source": "Telegram/7jNmJD5vjZVenNUqyYR0CPI9qktay_Z3-idVdIxY76S8ayI", "content": "", "creation_timestamp": "2025-04-18T18:31:46.000000Z"}, {"uuid": "ad862c09-f913-40e4-a7d5-5e41244581c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30358", "type": "seen", "source": "https://t.me/cvedetector/21300", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30358 - Mesop Class Pollution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30358 \nPublished : March 27, 2025, 3:16 p.m. | 20\u00a0minutes ago \nDescription : Mesop is a Python-based UI framework that allows users to build web applications. A class pollution vulnerability in Mesop prior to version 0.14.1 allows attackers to overwrite global variables and class attributes in certain Mesop modules during runtime. This vulnerability could directly lead to a denial of service (DoS) attack against the server. Additionally, it could also result in other severe consequences given the application's implementation, such as identity confusion, where an attacker could impersonate an assistant or system role within conversations. This impersonation could potentially enable jailbreak attacks when interacting with large language models (LLMs). Just like the Javascript's prototype pollution, this vulnerability could leave a way for attackers to manipulate the intended data-flow or control-flow of the application at runtime and lead to severe consequences like remote code execution when gadgets are available. Users should upgrade to version 0.14.1 to obtain a fix for the issue. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T16:39:09.000000Z"}, {"uuid": "5174a851-d636-44e5-82d4-306572ff11e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30355", "type": "exploited", "source": "https://t.me/cvedetector/21249", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30355 - Synapse Denial of Federation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30355 \nPublished : March 27, 2025, 1:15 a.m. | 1\u00a0hour, 42\u00a0minutes ago \nDescription : Synapse is an open source Matrix homeserver implementation. A malicious server can craft events which, when received, prevent Synapse version up to 1.127.0 from federating with other servers. The vulnerability has been exploited in the wild and has been fixed in Synapse v1.127.1. No known workarounds are available. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T04:06:47.000000Z"}, {"uuid": "99041e20-873e-44f2-8022-f9c8af6e345f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30356", "type": "seen", "source": "https://t.me/cvedetector/21825", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30356 - \"CryptoLib Heap Buffer Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-30356 \nPublished : April 1, 2025, 10:15 p.m. | 1\u00a0hour, 30\u00a0minutes ago \nDescription : CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In 1.3.3 and earlier, a heap buffer overflow vulnerability persists in the Crypto_TC_ApplySecurity function due to an incomplete validation check on the fl (frame length) field. Although CVE-2025-29912 addressed an underflow issue involving fl, the patch fails to fully prevent unsafe calculations. As a result, an attacker can still craft malicious frames that cause a negative tf_payload_len, which is then interpreted as a large unsigned value, leading to a heap buffer overflow in a memcpy call. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T02:26:39.000000Z"}, {"uuid": "0b102fc0-0d9a-4fc4-8ee4-094f766adf85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30355", "type": "published-proof-of-concept", "source": "Telegram/9TpCNhQKFnadVGgW9WBxm9NS8GzN0eHgiitUv2OHldFzgpc", "content": "", "creation_timestamp": "2025-03-27T02:30:13.000000Z"}, {"uuid": "a5d2f396-5c0f-47e4-9c8d-2058cece70d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30355", "type": "published-proof-of-concept", "source": "Telegram/-_T7fiB1UH9VRuMWqeF5wAirAQ9WEH4yGxP0ggrYXPxHLtk", "content": "", "creation_timestamp": "2025-03-28T04:00:06.000000Z"}]}