{"vulnerability": "CVE-2025-3047", "sightings": [{"uuid": "bd5580ae-f1e0-46a5-8d20-b556f589cc31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3047", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3llw55bulzv25", "content": "", "creation_timestamp": "2025-04-03T14:42:13.488400Z"}, {"uuid": "a637a28d-73ff-4324-b325-ad63c0aaf34c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3047", "type": "seen", "source": "https://bsky.app/profile/alexpulver.bsky.social/post/3llp2szkblt2o", "content": "", "creation_timestamp": "2025-03-31T19:12:03.892274Z"}, {"uuid": "9fb06f15-589a-4ed7-9645-cbf998de67ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30474", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ll2p6jo5fy2j", "content": "", "creation_timestamp": "2025-03-23T16:50:30.347534Z"}, {"uuid": "8cda550b-3dd7-460c-9e41-22813b232773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30474", "type": "seen", "source": "https://bsky.app/profile/garydgregory.bsky.social/post/3ll4t2xhgqs2w", "content": "", "creation_timestamp": "2025-03-24T13:05:24.838665Z"}, {"uuid": "9ee08823-2dcd-4b9b-ae17-3f47efacc028", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3047", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114258034481176074", "content": "", "creation_timestamp": "2025-03-31T16:40:47.727939Z"}, {"uuid": "a17b6d23-0452-4547-92d3-a2e2fb4984b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3047", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114258034481176074", "content": "", "creation_timestamp": "2025-03-31T16:40:47.729568Z"}, {"uuid": "2707b062-9d88-4ba3-ad0a-b4dafa766f61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30472", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114211973427016506", "content": "", "creation_timestamp": "2025-03-23T13:26:51.800313Z"}, {"uuid": "584cee08-2724-4f4e-83ec-cc24df8b910f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30474", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll2tunedit2l", "content": "", "creation_timestamp": "2025-03-23T18:14:26.905171Z"}, {"uuid": "3c103a21-0d25-48aa-abcf-0f3aaf374941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30472", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114203799964343264", "content": "", "creation_timestamp": "2025-03-22T02:48:14.521382Z"}, {"uuid": "5241f1a6-9bb1-4513-aaa9-f4a439ee7c4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30473", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm7szpmnvo2o", "content": "", "creation_timestamp": "2025-04-07T11:07:54.985288Z"}, {"uuid": "fe8402a9-17f9-4eed-8bd0-1df4bf816eae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30473", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lm52ralh4j2w", "content": "", "creation_timestamp": "2025-04-06T08:48:20.200340Z"}, {"uuid": "c6a086b7-d737-4c22-b025-0b4e6fb6cb7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30473", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llza3nw6xa2l", "content": "", "creation_timestamp": "2025-04-04T20:12:59.366596Z"}, {"uuid": "93a27fb3-22db-47af-b950-8d718cc81bd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30473", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lm6imrawbd2i", "content": "", "creation_timestamp": "2025-04-06T22:29:02.152152Z"}, {"uuid": "43c3d51e-1f7c-468d-bf4b-48bb496b08c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30473", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lm6m7ceczi2g", "content": "", "creation_timestamp": "2025-04-06T23:33:07.802556Z"}, {"uuid": "9e0417ae-54c5-4d25-9986-fb119c837e91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30473", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114297937253929899", "content": "", "creation_timestamp": "2025-04-07T17:48:35.815129Z"}, {"uuid": "2e3b3d58-e79a-42b4-8791-5d0f35002fa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30472", "type": "seen", "source": "https://gist.github.com/YellowOnion/8bd069ee35a6398aaa85d6abb27a1c9d", "content": "", "creation_timestamp": "2026-02-20T12:23:58.000000Z"}, {"uuid": "b12ec669-cae8-44e3-999e-dfce227cad32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30472", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lohaacg5jk27", "content": "", "creation_timestamp": "2025-05-05T20:43:16.958076Z"}, {"uuid": "02f92de7-e9f9-4450-b0b4-8a5f61c95e75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30475", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114513460850440442", "content": "", "creation_timestamp": "2025-05-15T19:19:04.303222Z"}, {"uuid": "7bbdd720-1a4d-4496-be83-82bed348b819", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30475", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpalbvcgu32h", "content": "", "creation_timestamp": "2025-05-15T22:37:32.829904Z"}, {"uuid": "d7d7902d-d1c4-40f4-9af6-8df026e50813", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30479", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4vn2fp6542x", "content": "", "creation_timestamp": "2025-11-05T18:02:34.684816Z"}, {"uuid": "7a66eab5-dc15-40e3-96f7-c347370d38ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30472", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3lvyciaarsn2x", "content": "", "creation_timestamp": "2025-08-09T17:35:05.828163Z"}, {"uuid": "f5618155-1b67-41cd-b02d-c880e1e12a3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30479", "type": "seen", "source": "https://gist.github.com/Darkcrai86/025fa50a2c0e3aa76a07f984c6e3a352", "content": "", "creation_timestamp": "2025-11-05T18:30:33.000000Z"}, {"uuid": "761f2416-7f65-4278-afc6-e6df3182a8a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30479", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m532fqt33s2k", "content": "", "creation_timestamp": "2025-11-07T21:44:54.339763Z"}, {"uuid": "ea384101-ae98-4c11-bb24-0ec1ca89f62f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30473", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10687", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30473\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow Common SQL Provider.\n\nWhen using the partition clause in SQLTableCheckOperator as parameter (which was a recommended pattern), Authenticated UI User could inject arbitrary SQL command when triggering DAG exposing partition_clause to the user.\nThis allowed the DAG Triggering user to escalate privileges to execute those arbitrary commands which they normally would not have.\n\n\nThis issue affects Apache Airflow Common SQL Provider: before 1.24.1.\n\nUsers are recommended to upgrade to version 1.24.1, which fixes the issue.\n\ud83d\udccf Published: 2025-04-07T08:31:57.220Z\n\ud83d\udccf Modified: 2025-04-07T08:31:57.220Z\n\ud83d\udd17 References:\n1. https://github.com/apache/airflow/pull/48098\n2. https://lists.apache.org/thread/53klkv790cylqcop0350w7nfq1y6h0t2", "creation_timestamp": "2025-04-07T08:44:56.000000Z"}, {"uuid": "04b92535-446d-438d-9756-fc3a59102ff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30471", "type": "seen", "source": "Telegram/-Si_Hi-7t2ljbsWh0Emiw8XzTIBgcOzztbYY7biu1twV718", "content": "", "creation_timestamp": "2026-04-02T22:16:05.000000Z"}, {"uuid": "dead3433-6447-46f7-a94d-6fce79d72b30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30472", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8687", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30472\n\ud83d\udd25 CVSS Score: 9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.\n\ud83d\udccf Published: 2025-03-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T15:10:15.130Z\n\ud83d\udd17 References:\n1. https://github.com/corosync/corosync/blob/73ba225cc48ebb1903897c792065cb5e876613b0/exec/totemsrp.c#L4677\n2. https://github.com/corosync/corosync/issues/778\n3. https://corosync.org", "creation_timestamp": "2025-03-25T15:24:06.000000Z"}, {"uuid": "01c10f30-3d1d-4dbf-9b7e-62fc6d6304fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3047", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9676", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3047\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container. \n\nUsers should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes.\n\ud83d\udccf Published: 2025-03-31T15:21:11.290Z\n\ud83d\udccf Modified: 2025-03-31T15:21:11.290Z\n\ud83d\udd17 References:\n1. https://aws.amazon.com/security/security-bulletins/AWS-2025-008/", "creation_timestamp": "2025-03-31T15:31:11.000000Z"}, {"uuid": "58bc40c7-9954-40bd-8ddb-37c9a685e827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30470", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9792", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30470\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A path handling issue was addressed with improved logic. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to read sensitive location information.\n\ud83d\udccf Published: 2025-03-31T22:24:25.184Z\n\ud83d\udccf Modified: 2025-03-31T22:24:25.184Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122371\n2. https://support.apple.com/en-us/122373\n3. https://support.apple.com/en-us/122378\n4. https://support.apple.com/en-us/122374\n5. https://support.apple.com/en-us/122375", "creation_timestamp": "2025-03-31T23:31:29.000000Z"}, {"uuid": "6df5e2ac-1581-4ad0-b219-9e075aaf4e32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3047", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/30277", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aIssue with AWS SAM CLI (CVE-2025-3047, CVE-2025-3048)\nURL\uff1ahttps://github.com/murataydemir/AWS-SAM-CLI-Vulnerabilities\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-07T06:09:56.000000Z"}, {"uuid": "d78b88b5-5360-4b4e-ae11-ecde6180e707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3047", "type": "seen", "source": "https://t.me/cvedetector/21612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3047 - AWS SAM CLI Docker Symlink Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3047 \nPublished : March 31, 2025, 4:15 p.m. | 48\u00a0minutes ago \nDescription : When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container.   \n  \nUsers should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T19:12:16.000000Z"}, {"uuid": "6506d5b6-9ada-44e5-afba-268c40a617ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30473", "type": "seen", "source": "https://t.me/cvedetector/22278", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30473 - Apache Airflow Common SQL Provider SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-30473 \nPublished : April 7, 2025, 9:15 a.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow Common SQL Provider.  \n  \nWhen using the partition clause in SQLTableCheckOperator as parameter (which was a recommended pattern), Authenticated UI User could inject arbitrary SQL command when triggering DAG exposing partition_clause to the user.  \nThis allowed the DAG Triggering user to escalate privileges to execute those arbitrary commands which they normally would not have.  \n  \n  \nThis issue affects Apache Airflow Common SQL Provider: before 1.24.1.  \n  \nUsers are recommended to upgrade to version 1.24.1, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T12:53:00.000000Z"}, {"uuid": "d0fa9b41-9de3-4d97-be5b-d1871246ea74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30470", "type": "seen", "source": "https://t.me/cvedetector/21690", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30470 - Apple VisionOS Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30470 \nPublished : March 31, 2025, 11:15 p.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : A path handling issue was addressed with improved logic. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to read sensitive location information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T03:35:23.000000Z"}, {"uuid": "7bb51e93-8453-4440-a4cb-90978a8e5c81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30471", "type": "seen", "source": "https://t.me/cvedetector/21692", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30471 - Apple VisionOS/OS Denial of Service Validation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30471 \nPublished : March 31, 2025, 11:15 p.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : A validation issue was addressed with improved logic. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A remote user may be able to cause a denial-of-service. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T03:35:28.000000Z"}, {"uuid": "38322f11-1d6b-4048-9921-38fd1ba33e5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30474", "type": "seen", "source": "https://t.me/cvedetector/20901", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30474 - Apache Commons VFS Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-30474 \nPublished : March 23, 2025, 3:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Commons VFS.  \n  \nThe FtpFileObject class can throw an exception when a file is not found, revealing the original URI in its message, which may include a password. The fix is to mask the password in the exception message  \nThis issue affects Apache Commons VFS: before 2.10.0.  \n  \nUsers are recommended to upgrade to version 2.10.0, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-23T18:09:20.000000Z"}, {"uuid": "f2549f62-bb5b-4ed5-a18a-28ea0cd307a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30472", "type": "seen", "source": "https://t.me/cvedetector/20848", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30472 - Corosync Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30472 \nPublished : March 22, 2025, 2:15 a.m. | 48\u00a0minutes ago \nDescription : Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-22T04:31:07.000000Z"}, {"uuid": "f9e9e0c1-d8fb-4864-971d-0858278c3efb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30472", "type": "published-proof-of-concept", "source": "Telegram/IxOpXsjTgS7WyqZhGOFOfgLSEyNeZfcGtw6iB4R6SfAugAo", "content": "", "creation_timestamp": "2025-03-22T03:00:28.000000Z"}]}