{"vulnerability": "CVE-2025-3039", "sightings": [{"uuid": "4c3ab743-866f-4028-90b6-4e3948368392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3039", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3llplf6usrv26", "content": "", "creation_timestamp": "2025-04-01T00:08:33.061492Z"}, {"uuid": "6641b759-f36d-4766-8c1b-613821587bd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/mm-ilsoftware-bot.bsky.social/post/3lpbrhfb2gz2p", "content": "", "creation_timestamp": "2025-05-16T10:00:40.018375Z"}, {"uuid": "522541cf-121b-4283-a7e5-82446ba178d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30394", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lqq7zfia7c2x", "content": "", "creation_timestamp": "2025-06-03T21:23:44.768941Z"}, {"uuid": "c9298bfe-fe95-41a7-a375-40915bb3bf69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30394", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-334/", "content": "", "creation_timestamp": "2025-06-10T03:00:00.000000Z"}, {"uuid": "76ed7703-32cd-487f-8116-d802dea682ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30399", "type": "seen", "source": "https://www.thezdi.com/blog/2025/6/10/the-june-2025-security-update-review", "content": "", "creation_timestamp": "2025-06-10T15:24:53.000000Z"}, {"uuid": "9ef7aa99-5e71-4504-aa99-0c35ba91a632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-303997", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0190", "content": "", "creation_timestamp": "2025-06-10T16:46:10.000000Z"}, {"uuid": "249541eb-6d4d-4c48-be13-ec883e342bd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/theunicornxxl.bsky.social/post/3lpf4iwku6s2l", "content": "", "creation_timestamp": "2025-05-17T17:56:25.162485Z"}, {"uuid": "ad039709-422c-4fa1-908b-865040eef5c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30399", "type": "seen", "source": "https://bsky.app/profile/msftdevblogs.bsky.social/post/3lrcq5eafxw2q", "content": "", "creation_timestamp": "2025-06-11T06:00:12.337161Z"}, {"uuid": "aec53f0f-ff37-4ec9-ab46-ea3b61b677f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30399", "type": "seen", "source": "https://bsky.app/profile/msftdevblogs.bsky.social/post/3lrcq5gayah2j", "content": "", "creation_timestamp": "2025-06-11T06:00:14.473209Z"}, {"uuid": "e388afde-43ac-467d-9e05-6b6f56b31bb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30391", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114428064949898924", "content": "", "creation_timestamp": "2025-04-30T17:21:46.638384Z"}, {"uuid": "36404a19-82d6-4567-bde6-910dd1f603c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30390", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114428064949898924", "content": "", "creation_timestamp": "2025-04-30T17:21:46.924929Z"}, {"uuid": "115de899-263b-4aca-a8a2-ecab33aae96e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30392", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114428064949898924", "content": "", "creation_timestamp": "2025-04-30T17:21:47.000850Z"}, {"uuid": "a809fe01-2427-42b6-a28d-e8ca926243bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30391", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114428642077120482", "content": "", "creation_timestamp": "2025-04-30T19:48:33.433572Z"}, {"uuid": "4c0b78e8-049c-4162-bcff-2fb0fac8f1d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30390", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114428642039876617", "content": "", "creation_timestamp": "2025-04-30T19:48:34.430272Z"}, {"uuid": "fbcd8260-c8ff-469b-8ac5-a95c99229aa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30392", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114428642482723437", "content": "", "creation_timestamp": "2025-04-30T19:48:40.554105Z"}, {"uuid": "092a2489-7136-4971-9b09-cfba46c78e91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30392", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2n7eiwpv2k", "content": "", "creation_timestamp": "2025-04-30T20:30:45.789627Z"}, {"uuid": "f55b740c-0673-49b5-804f-1d7933c2a685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30391", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2n7eppfq2t", "content": "", "creation_timestamp": "2025-04-30T20:30:46.991465Z"}, {"uuid": "5898ac81-b29f-4a38-8933-24a09e00419e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30390", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2n7eu7y22p", "content": "", "creation_timestamp": "2025-04-30T20:30:47.617505Z"}, {"uuid": "43b862bb-90ba-49c1-81a2-08ff03cd5123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30394", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "1688870c-da6d-4de0-b84c-ecedd80d72a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lp33p64qow2w", "content": "", "creation_timestamp": "2025-05-13T18:15:19.769755Z"}, {"uuid": "fdbc6920-c890-4d29-b937-3f3876aa05e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp354tmcdpr2", "content": "", "creation_timestamp": "2025-05-13T18:51:58.439083Z"}, {"uuid": "665a8964-3cdd-45d0-8088-df9913dc4f66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp37bn5kuoj2", "content": "", "creation_timestamp": "2025-05-13T19:24:04.035551Z"}, {"uuid": "52230589-de02-42bd-a598-d66b801620c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3998082", "content": "", "creation_timestamp": "2025-05-13T20:19:11.727302Z"}, {"uuid": "9ef68f02-1bf0-4b51-95fb-f950c502b61b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-303937", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0155", "content": "", "creation_timestamp": "2025-05-13T16:58:56.000000Z"}, {"uuid": "824e2401-7069-48ea-b69c-af2dbd0f0b46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "f9214625-176b-4cd4-af8b-65405371257b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lp4dxat7j224", "content": "", "creation_timestamp": "2025-05-14T06:15:41.446206Z"}, {"uuid": "9fa55e66-4ac7-4763-a980-81ebd8dd5f8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30393", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "330c651c-eb37-403a-b0f0-a045b556a276", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lp4e2v7xvc24", "content": "", "creation_timestamp": "2025-05-14T06:17:43.372442Z"}, {"uuid": "ba46a875-a3d0-4432-8c0d-233be6498094", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lp4nkqq42k2v", "content": "", "creation_timestamp": "2025-05-14T09:07:43.445541Z"}, {"uuid": "b1274ac5-0331-49cd-875c-61a9d431b63b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lp4nkrwar22v", "content": "", "creation_timestamp": "2025-05-14T09:07:43.995028Z"}, {"uuid": "098bb3ab-b910-420d-8fb5-3c38c5786ae5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lp4nkrwbqc2v", "content": "", "creation_timestamp": "2025-05-14T09:07:44.531600Z"}, {"uuid": "99563528-cb6c-4281-977b-c8a614cc1d2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lqmjv7atby2b", "content": "", "creation_timestamp": "2025-06-02T10:09:42.186339Z"}, {"uuid": "88867245-76dc-4162-ac0c-8fa40fddb344", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpachp5bxs22", "content": "", "creation_timestamp": "2025-05-15T19:59:48.015725Z"}, {"uuid": "11279b32-0373-44af-943d-27d8e0fb9a67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lp5vingcr32c", "content": "", "creation_timestamp": "2025-05-14T21:02:18.269617Z"}, {"uuid": "2d09e0b9-2a06-4550-a737-67501228caa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lp5wh4g2sc2u", "content": "", "creation_timestamp": "2025-05-14T21:19:24.936565Z"}, {"uuid": "27212efc-b916-4f81-94b6-4825349abea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lp6h2f5pkh2w", "content": "", "creation_timestamp": "2025-05-15T02:16:27.015484Z"}, {"uuid": "e739ace0-7001-4beb-bb12-7d5cac9e2989", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3lp4ym4ismbq2", "content": "", "creation_timestamp": "2025-05-14T12:25:34.024932Z"}, {"uuid": "58274999-6902-42d4-a3d2-77227e8d639a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/cyberbessa.bsky.social/post/3lp52kzhk6r2w", "content": "", "creation_timestamp": "2025-05-14T13:00:26.425455Z"}, {"uuid": "c0b981bc-3880-4135-98e0-6eb025e64e26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://krebsonsecurity.com/2025/05/patch-tuesday-may-2025-edition/", "content": "", "creation_timestamp": "2025-05-14T09:57:48.000000Z"}, {"uuid": "0a16cf31-3c13-4c0d-90ff-5c6d5c418792", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lp5jxympos2k", "content": "", "creation_timestamp": "2025-05-14T17:36:08.104031Z"}, {"uuid": "02e7f95e-4e68-4c3a-8114-5141e4deb265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://infosec.exchange/users/tomcat/statuses/114507398893118808", "content": "", "creation_timestamp": "2025-05-14T17:37:26.175422Z"}, {"uuid": "33344938-e3b9-47f8-9d51-eaa3d4e3a8d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpacqgelns22", "content": "", "creation_timestamp": "2025-05-15T20:04:39.376881Z"}, {"uuid": "e0d0e121-233b-4486-90a2-fc1d24d44395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30398", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5f5umbbg42j", "content": "", "creation_timestamp": "2025-11-11T22:13:30.059707Z"}, {"uuid": "bd2920c7-9965-4399-b504-ee25f8901b40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30398", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5exuamtavv2", "content": "", "creation_timestamp": "2025-11-11T20:27:01.104538Z"}, {"uuid": "7b49186c-af1a-44e2-a6f0-d288e8a183fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30398", "type": "seen", "source": "https://www.thezdi.com/blog/2025/11/11/the-november-2025-security-update-review", "content": "", "creation_timestamp": "2025-11-11T17:30:42.000000Z"}, {"uuid": "95e72e6f-f2c2-428d-9a1d-6f194e314b2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:17.000000Z"}, {"uuid": "de7a04d6-91a3-448b-afa7-6e33dafac4a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvbzuiv4km25", "content": "", "creation_timestamp": "2025-07-31T21:02:21.752342Z"}, {"uuid": "52d95e01-6c00-47da-b11c-bf5a92f62d01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "4010b68c-bc1c-4789-a8cf-a4e6f597fed8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30390", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14425", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30390\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper authorization in Azure allows an authorized attacker to elevate privileges over a network.\n\ud83d\udccf Published: 2025-04-30T17:14:51.736Z\n\ud83d\udccf Modified: 2025-05-02T03:55:23.899Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30390", "creation_timestamp": "2025-05-02T04:15:35.000000Z"}, {"uuid": "051343a7-0c43-4015-87ef-a7069bf41994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-30397", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/a7d9c04d-f954-4d4f-9d62-5066496da175", "content": "", "creation_timestamp": "2026-02-02T12:26:01.500872Z"}, {"uuid": "96e65c5e-0e22-4e34-8816-d943016bf0db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1548", "content": "", "creation_timestamp": "2025-05-14T04:00:00.000000Z"}, {"uuid": "692112fa-462d-4878-a522-7a4294c018c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30392", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14424", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30392\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.\n\ud83d\udccf Published: 2025-04-30T17:14:52.419Z\n\ud83d\udccf Modified: 2025-05-02T03:55:25.237Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30392", "creation_timestamp": "2025-05-02T04:15:34.000000Z"}, {"uuid": "86258802-5c8c-4c76-bce1-24b1b71f961d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30399", "type": "seen", "source": "Telegram/YAQ_JQCmsPiXmqZ7phOl7Olo1teqLC4-3XH11jchkPqYPeM", "content": "", "creation_timestamp": "2025-06-13T09:22:49.000000Z"}, {"uuid": "4048dd08-50dc-4be1-8c83-0a38ebe96293", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30399", "type": "seen", "source": "Telegram/LUes7yrHh4VfYs2vZ4A0c6hKucSFdFUmsMytPNp0TuzuxOs", "content": "", "creation_timestamp": "2025-06-13T02:32:30.000000Z"}, {"uuid": "ffda5084-4b1b-4d35-b628-8923dd6c7058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30391", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15164", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30391\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper input validation in Microsoft Dynamics allows an unauthorized attacker to disclose information over a network.\n\ud83d\udccf Published: 2025-04-30T17:14:49.584Z\n\ud83d\udccf Modified: 2025-05-06T17:04:00.257Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30391", "creation_timestamp": "2025-05-06T17:21:43.000000Z"}, {"uuid": "8c2fb28e-7edd-4f62-92b1-4edda74e9305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "published-proof-of-concept", "source": "Telegram/EYkASGxj3Tiuz3kIHRMz13gpRd2GwQ5wKmXB5D8I7ZTChs4", "content": "", "creation_timestamp": "2025-07-23T21:00:04.000000Z"}, {"uuid": "168d9e27-e6a3-42b7-a1fb-126a0bd9c014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3039", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9788", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3039\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in code-projects Payroll Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /add_employee.php. The manipulation of the argument lname/fname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.\n\ud83d\udccf Published: 2025-03-31T23:00:10.116Z\n\ud83d\udccf Modified: 2025-03-31T23:00:10.116Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302100\n2. https://vuldb.com/?ctiid.302100\n3. https://vuldb.com/?submit.524676\n4. https://github.com/xuzhuojia22/cve/blob/main/cvexuzhoujia.md\n5. https://code-projects.org/", "creation_timestamp": "2025-03-31T23:31:23.000000Z"}, {"uuid": "c7850ad9-0e56-4044-86ac-cdfc16173d37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16265", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30397\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)\n\ud83d\udd39 Description: Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-05-13T16:59:10.994Z\n\ud83d\udccf Modified: 2025-05-13T21:40:36.751Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397", "creation_timestamp": "2025-05-13T22:30:56.000000Z"}, {"uuid": "f62d724d-463b-4913-b0c1-20213b27e840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30393", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16237", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30393\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:58:47.856Z\n\ud83d\udccf Modified: 2025-05-13T20:13:26.975Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30393", "creation_timestamp": "2025-05-13T20:31:21.000000Z"}, {"uuid": "5d904cfc-0612-4c5c-a720-86bae4c345a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30399", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18258", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30399\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Untrusted search path in .NET and Visual Studio allows an unauthorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-06-13T01:08:00.208Z\n\ud83d\udccf Modified: 2025-06-13T01:10:44.310Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30399", "creation_timestamp": "2025-06-13T02:34:19.000000Z"}, {"uuid": "1e6bf062-17aa-439e-b3dd-a878f795a095", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/38768", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aRemote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)\nURL\uff1ahttps://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-31T12:24:51.000000Z"}, {"uuid": "9881d3df-9a31-496d-82f3-40c1ea06dd35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3039", "type": "seen", "source": "https://t.me/cvedetector/21688", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3039 - Code-projects Payroll Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3039 \nPublished : March 31, 2025, 11:15 p.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Payroll Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /add_employee.php. The manipulation of the argument lname/fname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T03:35:22.000000Z"}, {"uuid": "c67421c2-a171-4e31-81d6-a6d8646a8c52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/38432", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aAdvanced AI-Powered Exploitation Framework  |  CVE-2025-4664 &amp; CVE-2025-2783 &amp; CVE-2025-2857 &amp; CVE-2025-30397  |  \nURL\uff1ahttps://github.com/Leviticus-Triage/ChromSploit-Framework\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-28T14:37:55.000000Z"}, {"uuid": "a86e3538-b0f3-4876-a441-1a47ff7421f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "exploited", "source": "https://t.me/CyberUnderworlds/8", "content": "\ud83c\udf11 @CyberUnderworlds | Echoes from the Digital Void \ud83c\udf11\nMay 28, 2025 \u2013 The digital battlefield never sleeps, and today\u2019s whispers bring fresh tales of chaos and cunning. Behold the latest from the cybersecurity abyss:\n\n\ud83c\udde8\ud83c\uddf3 Taiwan-China Cyber Tensions Escalate: China accuses Taiwan of targeting a tech firm with a cyberattack, while Taiwan calls it a disinformation ploy. A high-stakes shadow war unfolds in the East.\n\n\ud83e\udda0 DarkCloud Stealer Emerges: A new wave of DarkCloud Stealer malware targets government organizations, extracting sensitive data since January 2025. Chihuahua and Pentagon Stealers join the fray, lurking in the wild.\n\n\ud83c\udfe6 JPMorgan\u2019s SaaS Warning: CISO Pat Opet sounds the alarm on OAuth-based SaaS vulnerabilities, highlighting risks from fourth-party vendors. Implicit trust in app connections is a ticking time bomb.\n\n\ud83c\uddec\ud83c\udde7 UK Legal Aid Breach: Hackers infiltrate Britain\u2019s Legal Aid Agency, stealing personal data, including criminal records, since 2010. Addresses, IDs, and financial details are now in the wrong hands.\n\n\ud83d\udee1\ufe0f Pentesting Crisis: Pentera\u2019s 2025 State of Pentesting Report reveals only 14% of CISOs trust government support for cyber challenges, with 59% adopting solutions driven by cyber insurance demands.\n\n\u26a0\ufe0f Microsoft\u2019s Zero-Day Fixes: Five actively exploited zero-days (CVE-2025-30397, CVE-2025-30400, CVE-2025-32701, CVE-2025-32706, CVE-2025-32709) patched in May 2025, targeting Windows vulnerabilities. Act fast or fall prey.\n\n\ud83c\udf10 Fourth-Party Risk Looms: Trellix\u2019s April 2025 Cyberthreat Report warns of evolving attack chains exploiting supply chain weaknesses, targeting cybersecurity tools themselves to erode defenses from within.\n\n@CyberUnderworlds \u2013 #CyberUnderworlds", "creation_timestamp": "2025-05-28T09:48:56.000000Z"}, {"uuid": "a8ded6a9-32b5-4cd6-8284-f3d1aafddf56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "published-proof-of-concept", "source": "Telegram/_c9mX1e7lYEaEfuijaZ7z4NiD8FeO0jBmdfMxWXxnmlOICot", "content": "", "creation_timestamp": "2025-06-11T19:49:20.000000Z"}, {"uuid": "4342da88-3f81-47a4-b349-8bfdded6f250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2629", "content": "CVE-2025-30397\n*\nWindows-Server-2025  JScript-RCE-Use-After-Free\n*\nexploit", "creation_timestamp": "2025-06-02T10:31:10.000000Z"}, {"uuid": "4371cfba-0dd5-41ef-9b68-78b52609d47f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "published-proof-of-concept", "source": "Telegram/JoBJmRZiUuBiM81nRuTWRhMrYjvJcMULNnkp_534O2ayHg", "content": "", "creation_timestamp": "2025-06-11T19:49:20.000000Z"}, {"uuid": "488e9eaa-f149-4a3b-a506-d6ceb1435e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/489", "content": "CVE-2025-30397\n*\nWindows-Server-2025  JScript-RCE-Use-After-Free\n*\nexploit", "creation_timestamp": "2025-06-05T18:55:19.000000Z"}, {"uuid": "b20c177f-0315-4f4b-956f-cfe1ff13502b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://t.me/ViralCyber/13425", "content": "\u26a0\ufe0f\u0647\u0634\u062f\u0627\u0631 \u0627\u0645\u0646\u06cc\u062a\u06cc | \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u2013 \u0645\u0647 \u06f2\u06f0\u06f2\u06f5\n\u274c \u06f7\u06f5 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f\u060c \u06f5 \u0645\u0648\u0631\u062f \u062f\u0631 \u062d\u0627\u0644 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0641\u0639\u0627\u0644\u060c \u0648 \u06f1\u06f2 \u0645\u0648\u0631\u062f \u00ab\u0628\u062d\u0631\u0627\u0646\u06cc\u00bb!\n\u26a0\ufe0f\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u062f\u0631 Patch Tuesday \u0627\u06cc\u0646 \u0645\u0627\u0647\u060c \u0641\u0647\u0631\u0633\u062a\u06cc \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f \u06a9\u0647 \u0627\u0645\u0646\u06cc\u062a \u0628\u0633\u06cc\u0627\u0631\u06cc \u0627\u0632 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u06a9\u0644\u06cc\u062f\u06cc \u0631\u0627 \u062a\u0647\u062f\u06cc\u062f \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\n\u2757\ufe0f\u2757\ufe0f \u06f5 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 Exploit \u0622\u0646\u0647\u0627 \u0647\u0645 \u0627\u06a9\u0646\u0648\u0646 \u062f\u0631 \u062d\u0627\u0644 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0633\u062a: \n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-30397 \u2013 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0644\u06cc\u0646\u06a9\u200c\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u062f\u0631 IE mode (\u0645\u0631\u0648\u0631\u06af\u0631 Edge)\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-32701 &amp; CVE-2025-32706 \u2013 \u0627\u0631\u062a\u0642\u0627\u0621 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0631 Windows Log File System\u060c \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631\u0647\u0627\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-32709 \u2013 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u062c\u062f\u062f \u0627\u0632 WinSock \n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-30400 \u2013 \u0646\u0642\u0635 \u062e\u0637\u0631\u0646\u0627\u06a9 \u062f\u0631 DWM Core Library\u060c \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u062f\u0631 \u06a9\u0645\u067e\u06cc\u0646\u200c\u0647\u0627\u06cc \u0641\u06cc\u0634\u06cc\u0646\u06af \u0648 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631\n\n\ud83d\udde3 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc Public \u0634\u062f\u0647 (\u0646\u06cc\u0627\u0632 \u0628\u0647 \u0646\u0635\u0628 \u0633\u0631\u06cc\u0639 Patch):\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-26685 \u2013 \u062c\u0639\u0644 \u0647\u0648\u06cc\u062a \u062f\u0631 Microsoft Defender for Identity\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-32702 \u2013 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u062f\u0631 Visual Studio\n\n\u2757\ufe0f\u2757\ufe0f \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc\u0647\u0627\u06cc \u0646\u0645\u0631\u0647 10 !\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-29813 \u2013 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0631\u062a\u0642\u0627\u0621 \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0631 Azure DevOps\n\n\ud83d\udcce \u0644\u06cc\u0633\u062a \u06a9\u0627\u0645\u0644 CVE\u0647\u0627\n\n\u2709\ufe0f@PingChannel\n\u062e\u0628\u0631\u060c \u062a\u062d\u0644\u06cc\u0644\u060c \u0627\u0646\u062a\u0642\u0627\u062f - \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a\n\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b", "creation_timestamp": "2025-05-16T22:31:12.000000Z"}, {"uuid": "2cd5b613-1069-4546-b1cd-96ebad3103c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "seen", "source": "https://t.me/kasperskyb2b/1734", "content": "\ud83d\udc40 \u0417\u0430 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u043d\u0435 \u0443\u043f\u0440\u0430\u0432\u0438\u043c\u0441\u044f. \u041e\u0431\u044a\u044f\u0432\u043b\u044f\u0435\u043c Patch Week!\n\n\u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u044b\u043c  \u043f\u0430\u0442\u0447\u0438\u043d\u0433\u043e\u043c \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Microsoft \u043f\u043e\u0441\u043b\u0435 \u0432\u0442\u043e\u0440\u043e\u0433\u043e \u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u043c\u0435\u0441\u044f\u0446\u0430 \u043d\u0430\u043c \u043d\u0435 \u043e\u0431\u043e\u0439\u0442\u0438\u0441\u044c \u2014 \u0437\u0430\u043a\u0440\u044b\u0442\u044c \u0437\u0438\u0440\u043e\u0434\u0435\u0438 \u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u044b \u043f\u043e\u0441\u043f\u0435\u0448\u0438\u043b\u0438 \u043c\u043d\u043e\u0433\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438 \u041f\u041e \u0434\u043b\u044f \u043a\u0440\u0443\u043f\u043d\u044b\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Microsoft, Fortinet, SAP, Adobe, \u0438 \u043a\u043e\u043d\u0435\u0447\u043d\u043e Ivanti. \n\n\ud83d\udcbb \u0420\u0435\u0434\u043c\u043e\u043d\u0434 \u0432\u044b\u043a\u0430\u0442\u0438\u043b 72 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f (\u0435\u0441\u043b\u0438 \u043d\u0435 \u0441\u0447\u0438\u0442\u0430\u0442\u044c Azure \u0438 Chromium), \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0432 5 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432 \u0438 2 \u0431\u0430\u0433\u0430, \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0451\u043d\u043d\u044b\u0445 \u0434\u043e \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 Microsoft.  \n\n\u0418\u0437 72 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, 6 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438 (\u0432 \u0442.\u0447. RCE \u0432 Office \u0438 Remote desktop client), \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u2014 \u0432\u0430\u0436\u043d\u044b\u043c\u0438. \u0412\u0441\u0435\u0433\u043e 28 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE, 17 \u2014 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, 15 \u2014 \u043a \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 7 \u2014 \u043a DoS, 2 \u2014 \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0437\u0438\u0440\u043e\u0434\u0435\u0438:\nCVE-2025-30397 (CVSS3 7.5) \u2014 RCE \u0432 Scripting Engine \u0438\u0437-\u0437\u0430 \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438, \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0438\u0437 \u0440\u0435\u0436\u0438\u043c\u0430 Internet Explorer  \u0432 Edge. \u0423\u043c\u0435\u0440, \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u0435, \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u043b\u0438, \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u0435. \u0416\u0435\u0440\u0442\u0432\u0430 \u0434\u043e\u043b\u0436\u043d\u0430 \u043a\u043b\u0438\u043a\u043d\u0443\u0442\u044c \u043d\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0441\u0441\u044b\u043b\u043a\u0443 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435.\n\nCVE-2025-32701 \u0438 -32706 (7.8) \u2014 \u043f\u0430\u0440\u0430 EoP \u0447\u0435\u0440\u0435\u0437 \u0440\u0435\u0448\u0435\u0442\u043e \u0434\u0440\u0430\u0439\u0432\u0435\u0440 CLFS. \u041f\u0440\u043e\u0448\u043b\u044b\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u044b \u0442\u0430\u043a\u043e\u0433\u043e \u0440\u043e\u0434\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0431\u0430\u043d\u0434\u0430\u043c\u0438 ransomware.\n\nCVE-2025-32709 (7.8) \u2014 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0447\u0435\u0440\u0435\u0437 Windows Ancillary Function Driver for Winsock, \u043f\u043e\u0445\u043e\u0436\u0438\u0439 \u0434\u0435\u0444\u0435\u043a\u0442 \u043c\u044b \u0443\u0436\u0435 \u0432\u0438\u0434\u0435\u043b\u0438 \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435.\n\nCVE-2025-30400 (7.8) \u2014 \u0442\u043e\u0436\u0435 EoP, \u043d\u043e \u0447\u0435\u0440\u0435\u0437 DWM Core Library.\n\n\u041e \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u0438\u0445 \u0431\u0430\u0433\u043e\u0432 Microsoft \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u043d\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442.\n\n\u0421\u0440\u0435\u0434\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u0431\u0440\u0430\u0442\u0438\u043c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0430\u0440\u0443 RCE \u0432 RDP Client (CVE-2025-29966 \u0438 -29967) \u0438 \u043f\u0430\u0440\u0443 RCE \u0432 Office (CVE-2025-30377 \u0438 -30386). \u0425\u043e\u0442\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u0435\u0442 \u0448\u0430\u043d\u0441\u044b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435\u0432\u044b\u0441\u043e\u043a\u043e, \u0445\u043e\u0440\u043e\u0448\u043e \u0437\u043d\u0430\u043a\u043e\u043c\u044b\u0435 \u0438\u0437 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0438 \u0432\u0435\u043a\u0442\u043e\u0440\u044b \u0430\u0442\u0430\u043a (\u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0438\u0439 \u0434\u0430\u0436\u0435 \u0438\u0437 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430, \u0438 \u0442.\u043f.) \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043f\u043e\u0442\u043e\u0440\u043e\u043f\u0438\u0442\u044c\u0441\u044f \u0441 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438.\n\n\ud83d\udd0e Fortinet \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0437\u0438\u0440\u043e\u0434\u0435\u0439 CVE-2025-32756 \u0441\u043e \u0441\u043a\u0440\u043e\u043c\u043d\u044b\u043c CVSS 9.6. \u041a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u043b\u043e \u043a RCE, \u0438 \u0445\u043e\u0442\u044f \u0440\u0435\u0430\u043b\u044c\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0431\u044b\u043b\u0430 \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u0430 \u0432 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u044d\u043a\u0437\u043e\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u043c FortiVoice, \u0440\u043e\u0432\u043d\u043e \u0442\u043e\u0442 \u0436\u0435 \u0434\u0435\u0444\u0435\u043a\u0442 \u0435\u0441\u0442\u044c \u0432  FortiMail, FortiNDR, FortiRecorder \u0438 FortiCamera, \u0447\u0442\u043e \u0443\u0436\u0435 \u0433\u043e\u0440\u0430\u0437\u0434\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u0435\u0435. \n\u0412 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u044b \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u0430\u0442\u0447\u0438, \u043d\u043e \u0438 IoC \u0438\u0437 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u043e\u0432. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0441\u043c\u044f\u0433\u0447\u0430\u044e\u0449\u0435\u0439 \u043c\u0435\u0440\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0432\u0435\u0431-\u043a\u043e\u043d\u0441\u043e\u043b\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\ud83c\udd70\ufe0f Adobe \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 13 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 40 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f ColdFusion. Lightroom, InDesign, Photoshop. \u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0441\u0440\u043e\u0447\u043d\u044b\u043c\u0438 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f 8 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 ColdFusion, 6 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0438\u043c\u0435\u044e\u0442 CVSS 9.1 \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043d\u0430 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 (\u043f\u043e\u043a\u0430) \u043d\u0435 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043e.\n\n\u2699\ufe0f SAP \u0442\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043f\u0430\u0440\u043d\u044b\u0439 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0439 \u0432\u0442\u043e\u0440\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 NetWeaver, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u043e\u0436\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445. CVE-2025-42999 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u043e\u0434\u043d\u043e\u0439 \u0446\u0435\u043f\u043e\u0447\u043a\u0435 \u0441 \u0440\u0430\u043d\u0435\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u043e\u0439 CVE-2025-31324.\n\n\ud83d\udcac Ivanti \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0434\u0432\u0430 \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u0430 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435 EPMM (CVE-2025-4427 \u0438 -4428), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0445 \u043a RCE \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438. \u0414\u0440\u0443\u0433\u0438\u043c \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u043c \u0437\u0430\u043a\u0440\u044b\u0442\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-22462 \u0432 Ivanti Neurons for ITSM (on-prem)  \u0441 CVSS 9.8, \u043a\u043e\u0442\u043e\u0440\u0430\u044f (\u043f\u043e\u043a\u0430) \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f.\n\n\u0423\u0434\u0430\u0447\u043d\u043e\u0433\u043e \u0432\u0441\u0435\u043c \u043f\u0430\u0442\u0447\u0438\u043d\u0433\u0430!\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u043f\u0430\u0442\u0447\u0438 @\u041f2\u0422", "creation_timestamp": "2025-05-14T08:36:25.000000Z"}, {"uuid": "dceaa649-adf2-4597-8161-03ee45104af6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "exploited", "source": "https://t.me/true_secator/7032", "content": "Microsoft \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u043c\u0430\u0439\u0441\u043a\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f PatchTuesday \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 78 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\u00a0\u0432\u043e \u0432\u0441\u0435\u0439 \u043b\u0438\u043d\u0435\u0439\u043a\u0435 \u0441\u0432\u043e\u0435\u0433\u043e \u041f\u041e, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 5 0-day, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u043b\u0438\u0441\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\n11 \u0438\u0437 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c, 66 - \u043a \u0432\u0430\u0436\u043d\u044b\u043c \u0438 \u043b\u0438\u0448\u044c \u043e\u0434\u043d\u0430 \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438. 28 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE , 21 - EoP, \u0430 16 - \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438. \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0421\u0440\u0435\u0434\u0438 \u043d\u0443\u043b\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445:\n\n- CVE-2025-30397\u00a0(CVSS: 7,5): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 Scripting Engine;\n\n\u0412 Action1 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443 \u0438\u043b\u0438 \u0441\u043a\u0440\u0438\u043f\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432\u044b\u0439 \u0434\u0432\u0438\u0436\u043e\u043a \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0442\u0438\u043f\u044b \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u0432, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 RCE \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.\n\n\u0415\u0441\u043b\u0438 \u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0435\u0441\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0441\u043e \u0432\u0441\u0435\u043c\u0438 \u0432\u044b\u0442\u0435\u043a\u0430\u044e\u0449\u0438\u043c\u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438.\n\n- CVE-2025-30400\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0430\u0437\u043e\u0432\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Microsoft Desktop Window Manager (DWM), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\nCVE-2025-30400 - \u044d\u0442\u043e \u0442\u0440\u0435\u0442\u044c\u044f EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 DWM Core Library, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 2023 \u0433\u043e\u0434\u0430. \n\n\u0413\u043e\u0434 \u043d\u0430\u0437\u0430\u0434 Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f CVE-2024-30051, \u043a\u043e\u0442\u043e\u0440\u0430\u044f, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e QakBot (Qwaking Mantis).\n\n\u0413\u043e\u0434\u043e\u043c \u0440\u0430\u043d\u0435\u0435 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043d\u0443\u043b\u044f \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430\u0441\u044c CVE-2023-36033.\n\n- CVE-2025-32701\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u043e\u0431\u0449\u0435\u0439 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0436\u0443\u0440\u043d\u0430\u043b\u0430 Windows (CLFS), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\n- CVE-2025-32706\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows Common Log, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\n\u041e\u0431\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0441\u043e\u0431\u043e\u0439 \u0441\u0435\u0434\u044c\u043c\u0443\u044e \u0438 \u0432\u043e\u0441\u044c\u043c\u0443\u044e EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 CLFS \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0435\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0441 2022 \u0433\u043e\u0434\u0430.\n\n\u0411\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u043c\u0435\u0441\u044f\u0446 \u043d\u0430\u0437\u0430\u0434 \u0434\u0440\u0443\u0433\u0430\u044f CVE-2025-29824 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043d\u0443\u043b\u044f \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432 \u0421\u0428\u0410, \u0412\u0435\u043d\u0435\u0441\u0443\u044d\u043b\u0435, \u0418\u0441\u043f\u0430\u043d\u0438\u0438 \u0438 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0431\u0430\u043d\u0434\u043e\u0439 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 Play.\n\n- CVE-2025-32709\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0432\u0441\u043f\u043e\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Windows \u0434\u043b\u044f WinSock, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP.\n\n\u0410\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u043e, CVE-2025-32709 - \u044d\u0442\u043e \u0442\u0440\u0435\u0442\u044c\u044f EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 Ancillary Function Driver for WinSock, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0433\u043e\u0434\u0430 \u043f\u043e\u0441\u043b\u0435 CVE-2024-38193 (\u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b Lazarus) \u0438 CVE-2025-21418.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0435\u0440\u0432\u044b\u0445 \u0442\u0440\u0435\u0445 \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Microsoft, CVE-2025-32706 - \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Google Threat Intelligence Group \u0438 CrowdStrike Advanced Research Team, \u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f - \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u043c\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044e.\n\n\u041d\u043e\u0432\u044b\u0439 Patch Tuesday \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f EoP-\u043e\u0448\u0438\u0431\u043a\u0438 \u0432 Microsoft Defender \u0434\u043b\u044f Endpoint \u0434\u043b\u044f Linux (CVE-2025-26684, CVSS: 6,7), \u043a\u043e\u0442\u043e\u0440\u0430\u044f  \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438. \u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Stratascale.\n\n\u0414\u0440\u0443\u0433\u0438\u043c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u043c \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0437\u0432\u0430\u0442\u044c CVE-2025-26685 (CVSS: 6,5) \u0432 Microsoft Defender for Identity, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u0447\u0435\u0440\u0435\u0437 \u0441\u043e\u0441\u0435\u0434\u043d\u044e\u044e \u0441\u0435\u0442\u044c.\n\n\u0418, \u043d\u0430\u043a\u043e\u043d\u0435\u0446, \u043d\u0435\u043b\u044c\u0437\u044f \u043d\u0435 \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044c \u043f\u0440\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441 CVSS: 10,0 - CVE-2025-29813, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a EoP \u0432 Azure DevOps Server, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043f\u043e \u0441\u0435\u0442\u0438.\n\nMicrosoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a, \u0432\u043c\u0435\u0448\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f.", "creation_timestamp": "2025-05-14T19:14:33.000000Z"}, {"uuid": "afb7a1ca-ba5f-4dfa-a4d3-632253fa7377", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30397", "type": "exploited", "source": "https://t.me/thehackernews/6828", "content": "\ud83d\uded1 5 Microsoft zero-days exploited in the wild!\n\nOne flaw lets attackers hijack full system control\u2014just by visiting a webpage.\n\n\u25c6 78 flaws fixed \u2014 11 critical\n\u25c6 CVE-2025-30397 to 32709 now in CISA\u2019s KEV list\n\u25c6 10.0 CVSS bug in Azure DevOps Server\n\n\ud83d\udd17 Details here: https://thehackernews.com/2025/05/microsoft-fixes-78-flaws-5-zero-days.html\n\n\ud83d\udee1\ufe0f Don\u2019t wait. Patch now.", "creation_timestamp": "2025-05-14T10:23:43.000000Z"}]}