{"vulnerability": "CVE-2025-3066", "sightings": [{"uuid": "eaf86b23-eec4-4831-afa6-051689888e0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114269153563154414", "content": "", "creation_timestamp": "2025-04-02T15:48:31.273769Z"}, {"uuid": "e3a0c7b7-a122-42d8-a58f-169a871d2eb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llsozo32p72v", "content": "", "creation_timestamp": "2025-04-02T05:51:40.900591Z"}, {"uuid": "48a0f3e2-93ea-4fa0-b99c-027196ba3eba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfiyxem627", "content": "", "creation_timestamp": "2025-04-02T03:01:18.796071Z"}, {"uuid": "f5108323-15c4-478a-a7ca-c67954146024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114266914442002489", "content": "", "creation_timestamp": "2025-04-02T06:19:04.834171Z"}, {"uuid": "f076b599-30e8-4d47-b0f0-8d0d8984ec01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llsycegyek2v", "content": "", "creation_timestamp": "2025-04-02T08:37:39.220735Z"}, {"uuid": "597529fb-3d16-4c6a-8b5d-61ce27855a66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3llx54wczvw2i", "content": "", "creation_timestamp": "2025-04-04T00:14:41.158725Z"}, {"uuid": "56da7889-dac2-4f19-b086-dec9a1ec641d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114266914442002489", "content": "", "creation_timestamp": "2025-04-02T06:19:04.838307Z"}, {"uuid": "d2cc8acb-f62a-46fa-bd3d-c876be6ed689", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114269153563154414", "content": "", "creation_timestamp": "2025-04-02T15:48:31.272185Z"}, {"uuid": "37dab607-8440-4d11-8e28-3a8f678a5cd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lluiucwdfs23", "content": "", "creation_timestamp": "2025-04-02T23:06:44.365805Z"}, {"uuid": "6ee6baf9-65aa-492a-9fd0-ea0dd23c0078", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmhnar67ss2y", "content": "", "creation_timestamp": "2025-04-10T13:45:46.442033Z"}, {"uuid": "7a2d1111-8734-4c69-ae22-de050a4c0362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lm2foywt7k2g", "content": "", "creation_timestamp": "2025-04-05T07:26:00.225256Z"}, {"uuid": "43cc11e0-b6c0-4a27-9c4b-fb2a3501073f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lm3ur7ceck2k", "content": "", "creation_timestamp": "2025-04-05T21:28:22.048339Z"}, {"uuid": "6086abbc-94a2-4c50-a1e1-2a74ad63ba74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "43b8a98c-56ba-4193-8220-473b5c6f535e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-30663", "type": "seen", "source": "https://www.heise.de/en/news/Videoconferences-High-risk-rights-extension-gaps-in-Zoom-Workplace-apps-10383229.html", "content": "", "creation_timestamp": "2025-05-16T09:39:36.928464Z"}, {"uuid": "13041baa-7ce0-45c3-a8c3-eb8969dbab6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-30664", "type": "seen", "source": "https://www.heise.de/en/news/Videoconferences-High-risk-rights-extension-gaps-in-Zoom-Workplace-apps-10383229.html", "content": "", "creation_timestamp": "2025-05-16T09:39:52.169859Z"}, {"uuid": "4db3585f-166f-4054-950d-bd3a0f1c6834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30660", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmg5v6mtub2r", "content": "", "creation_timestamp": "2025-04-09T23:38:14.796274Z"}, {"uuid": "8aec22b1-6f49-422b-a7ca-cfbba6a7588b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30663", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpacnncz5222", "content": "", "creation_timestamp": "2025-05-15T20:03:05.395726Z"}, {"uuid": "f4515519-3f12-46d7-90f2-b3f636429f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-30663", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lp4kgshmmk24", "content": "", "creation_timestamp": "2025-05-14T08:11:45.602373Z"}, {"uuid": "654d20c3-df79-422f-862b-cb37f1250f33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30665", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp5okq6s3v2h", "content": "", "creation_timestamp": "2025-05-14T18:58:11.321991Z"}, {"uuid": "2a387a8b-4f6d-48d9-8143-abd55e239274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30663", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp5okqifnm2j", "content": "", "creation_timestamp": "2025-05-14T18:58:12.060525Z"}, {"uuid": "5ba33c07-f143-4741-b1f1-08fce4d08828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30667", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp5okqlo5e2j", "content": "", "creation_timestamp": "2025-05-14T18:58:12.651854Z"}, {"uuid": "7133560f-762d-4cfb-9d49-404e24878c86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30668", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp5okqvowg2p", "content": "", "creation_timestamp": "2025-05-14T18:58:14.421868Z"}, {"uuid": "9241d1e2-1a9d-48d9-a83f-ffc078eb505a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30664", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp5okqywvs2o", "content": "", "creation_timestamp": "2025-05-14T18:58:14.984010Z"}, {"uuid": "7977c87c-3e43-4cca-817e-9e244daf9a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30666", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp5okrctqd2t", "content": "", "creation_timestamp": "2025-05-14T18:58:16.720142Z"}, {"uuid": "3df5d571-0787-4347-9fe5-13bc282f8a79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30669", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lmsrsirggu2w", "content": "", "creation_timestamp": "2025-04-15T00:06:33.350320Z"}, {"uuid": "d41464e8-7e5e-4a2a-97e8-d918664ffca3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30663", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lp2exy2kfi2t", "content": "", "creation_timestamp": "2025-05-13T11:28:39.320339Z"}, {"uuid": "445c7efd-772a-4176-a253-1b08ef946e20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30664", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lp2exzlgty2t", "content": "", "creation_timestamp": "2025-05-13T11:28:40.765640Z"}, {"uuid": "9c8627a6-4c23-4203-b61d-84ee1352b9be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30665", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lp2ey32ede26", "content": "", "creation_timestamp": "2025-05-13T11:28:42.283886Z"}, {"uuid": "74da2f51-372f-4366-877b-3476abebdd7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30666", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lp2ey32ede26", "content": "", "creation_timestamp": "2025-05-13T11:28:42.365999Z"}, {"uuid": "d4414b92-47e3-4029-9601-85a117f9386f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30667", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lp2ey4pxni2t", "content": "", "creation_timestamp": "2025-05-13T11:28:44.063770Z"}, {"uuid": "3757ba76-7cb7-400f-a2ab-bca91e2379a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30668", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lp2ey6gsi62t", "content": "", "creation_timestamp": "2025-05-13T11:28:45.932375Z"}, {"uuid": "17b2ca36-d150-4078-8573-e4329b7c4b1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30666", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16387", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30666\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.\n\ud83d\udccf Published: 2025-05-14T17:35:15.485Z\n\ud83d\udccf Modified: 2025-05-14T19:00:27.119Z\n\ud83d\udd17 References:\n1. https://www.zoom.com/en/trust/security-bulletin/zsb-25018", "creation_timestamp": "2025-05-14T19:33:11.000000Z"}, {"uuid": "d509f8f1-ac05-40ca-bc7e-8771ed374195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}, {"uuid": "b93c4162-89c6-481b-8cd8-da5d99a348d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30669", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5jilubsf6y2", "content": "", "creation_timestamp": "2025-11-13T15:37:18.009010Z"}, {"uuid": "60090673-0f63-4a57-b21f-9bea6a6a66dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30662", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5jim7o7ywy2", "content": "", "creation_timestamp": "2025-11-13T15:37:19.029088Z"}, {"uuid": "b1bfd93c-582c-4305-9181-2a6c552ce053", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30662", "type": "seen", "source": "Telegram/3VMHuZJJpWuQDQD7W2QL9nIMLLhgimFT4vXEohZS6QkxBh0", "content": "", "creation_timestamp": "2026-01-09T23:07:04.000000Z"}, {"uuid": "9cc147a4-9882-4afb-92b0-fd949df79cd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30669", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3m5dztu5ffo2d", "content": "", "creation_timestamp": "2025-11-11T11:28:49.768911Z"}, {"uuid": "8400bce9-016b-46f0-96fa-ea0cfd3b43a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30662", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3m5dztwhrx52u", "content": "", "creation_timestamp": "2025-11-11T11:28:52.251268Z"}, {"uuid": "cf33fd66-57bf-45e9-98aa-23475ef53819", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "a40346b5-0a0c-4e58-879d-7656391613e4", "vulnerability": "CVE-2025-30663", "type": "seen", "source": "https://vulnerability.circl.lu/comment/eff35358-2a58-408d-8c52-0b1143adc25c", "content": "", "creation_timestamp": "2025-05-16T07:10:54.871730Z"}, {"uuid": "2e2dcf57-6dc0-4bde-8c4d-022a8b04a253", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30665", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16386", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30665\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.\n\ud83d\udccf Published: 2025-05-14T17:35:06.968Z\n\ud83d\udccf Modified: 2025-05-14T19:00:31.446Z\n\ud83d\udd17 References:\n1. https://www.zoom.com/en/trust/security-bulletin/zsb-25018", "creation_timestamp": "2025-05-14T19:33:10.000000Z"}, {"uuid": "fd5265ff-cc1c-4316-a88e-3a0541813c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30664", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16385", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30664\n\ud83d\udd25 CVSS Score: 6.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Improper neutralization of special elements in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via local access.\n\ud83d\udccf Published: 2025-05-14T17:33:18.777Z\n\ud83d\udccf Modified: 2025-05-14T19:00:37.924Z\n\ud83d\udd17 References:\n1. https://www.zoom.com/en/trust/security-bulletin/zsb-25017", "creation_timestamp": "2025-05-14T19:33:09.000000Z"}, {"uuid": "bb5afc1d-a89e-4a50-94bc-da9ac7a05821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30663", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16384", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30663\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Time-of-check time-of-use race condition in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via local access.\n\ud83d\udccf Published: 2025-05-14T17:31:03.695Z\n\ud83d\udccf Modified: 2025-05-14T19:00:44.289Z\n\ud83d\udd17 References:\n1. https://www.zoom.com/en/trust/security-bulletin/zsb-25016", "creation_timestamp": "2025-05-14T19:33:08.000000Z"}, {"uuid": "98d875f1-14e8-48a8-8d7b-90462b02108b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://t.me/cvedetector/21839", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3066 - Google Chrome Use-After-Free in Navigations Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3066 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Use after free in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:07:09.000000Z"}, {"uuid": "ae4be1c5-3042-4c46-8939-39f67e34e2c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://t.me/itsec_news/5712", "content": "\u200b\u26a1\ufe0fGoogle \u0438 Mozilla \u0441\u043f\u0435\u0448\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u0433\u0440\u043e\u0437\u044b \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430\u0445\n\n\ud83d\udcac Google \u0438 Mozilla \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Chrome \u0438 Firefox, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0435 \u0434\u0435\u0441\u044f\u0442\u043a\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u044c\u044e. \u041e\u0431\u043d\u043e\u0432\u043b\u0451\u043d\u043d\u044b\u0439 Chrome 135 \u043f\u043e\u043b\u0443\u0447\u0438\u043b 14 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0434\u0435\u0432\u044f\u0442\u044c \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0432\u043d\u0435\u0448\u043d\u0438\u043c\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438. \u0421\u0430\u043c\u0430\u044f \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u0430\u044f \u0438\u0437 \u043d\u0438\u0445 \u2014 \u043e\u0448\u0438\u0431\u043a\u0430 CVE-2025-3066, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u0436\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0451\u043d\u043d\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u043d\u0430\u0432\u0438\u0433\u0430\u0446\u0438\u0438. \u0422\u0430\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0431\u043e\u044f\u043c \u0438 \u0434\u0430\u0436\u0435 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Google \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b \u0447\u0435\u0442\u044b\u0440\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0440\u0438\u0441\u043a\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u0435 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0432 Custom Tabs, Intents \u0438 Extensions, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0443\u044e \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u0415\u0449\u0451 \u0447\u0435\u0442\u044b\u0440\u0435 \u0431\u0430\u0433\u0430 \u043f\u0440\u0438\u0437\u043d\u0430\u043d\u044b \u043c\u0435\u043d\u0435\u0435 \u043e\u043f\u0430\u0441\u043d\u044b\u043c\u0438 \u2014 \u043e\u043d\u0438 \u043a\u0430\u0441\u0430\u044e\u0442\u0441\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u043d\u0430\u0432\u0438\u0433\u0430\u0446\u0438\u0438, \u0430\u0432\u0442\u043e\u0437\u0430\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f, \u0437\u0430\u0433\u0440\u0443\u0437\u043e\u043a \u0438 \u0432\u043a\u043b\u0430\u0434\u043e\u043a.\n\n\u0417\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0432\u044b\u043f\u043b\u0430\u0442\u0438\u043b\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c $18 000, \u043f\u0440\u0438\u0447\u0451\u043c \u043d\u0430\u0438\u0431\u043e\u043b\u044c\u0448\u0443\u044e \u0441\u0443\u043c\u043c\u0443 \u2014 $10 000 \u2014 \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u0424\u0438\u043b\u0438\u043f\u043f \u0411\u0438\u0440 \u0438\u0437 \u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u0412\u0435\u043d\u044b \u0437\u0430 \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443 \u0432 Custom Tabs. \u0420\u0430\u0437\u043c\u0435\u0440 \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u044f \u0437\u0430 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0435\u0442\u0441\u044f, \u0442\u0430\u043a \u0447\u0442\u043e \u043e\u0431\u0449\u0430\u044f \u0441\u0443\u043c\u043c\u0430 \u0432\u044b\u043f\u043b\u0430\u0442 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0432\u044b\u0448\u0435.\n\nChrome 135 \u0441\u0435\u0439\u0447\u0430\u0441 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0432\u0435\u0440\u0441\u0438\u044f 135.0.7049.52 \u0434\u043b\u044f Linux \u0438 \u043a\u0430\u043a 135.0.7049.41/42 \u0434\u043b\u044f Windows \u0438 macOS.\n\n\u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, Mozilla \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 Firefox 137, \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0432\u0448\u0438\u0439 \u0432\u043e\u0441\u0435\u043c\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0442\u0440\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445. \u0421\u0440\u0435\u0434\u0438 \u043d\u0438\u0445 \u2014 \u043e\u043f\u0430\u0441\u043d\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 XSLTProcessor (CVE-2025-3028), \u0430 \u0442\u0430\u043a\u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0438 \u043f\u0430\u043c\u044f\u0442\u044c\u044e, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0433\u043b\u0438 \u0431\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 (CVE-2025-3030 \u0438 CVE-2025-3034).\n\n\u0422\u0430\u043a\u0436\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0438 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438, \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0434\u043c\u0435\u043d\u0435 \u0430\u0434\u0440\u0435\u0441\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438 \u0438 \u043d\u0435\u0437\u0430\u043c\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u044f\u0440\u043b\u044b\u043a\u043e\u0432 .url \u0432 Windows.\n\n\u041f\u043e\u043c\u0438\u043c\u043e Firefox, Mozilla \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0430 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b: \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b Firefox ESR 128.9, Firefox ESR 115.22, Thunderbird 137 \u0438 Thunderbird ESR 128.9 \u2014 \u0432\u0441\u0435 \u043e\u043d\u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0425\u043e\u0442\u044f \u043d\u0438 Google, \u043d\u0438 Mozilla \u043d\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u043e \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-04-04T07:23:36.000000Z"}, {"uuid": "5a34867f-5603-4e04-982c-946198125424", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://t.me/NinjaSec/298", "content": "Certainly! Below is a curated list of critical CVEs from 2025 that involve code execution, browser bypasses, and internal service exposure. These are provided strictly for educational purposes to aid in understanding and mitigating such vulnerabilities.\n\n\n\ud83d\udd10 Critical CVEs from 2025 (Educational Use Only)\n\n1. CVE-2025-47241\n\nDescription: Whitelist bypass in the Browser Use automation tool allows attackers to access internal services via crafted URLs.\n\nCVSS Score: 9.3\n\nReference: \n\n\n\n2. CVE-2025-25014\n\nDescription: Prototype pollution in Kibana leads to arbitrary code execution through crafted HTTP requests to machine learning and reporting endpoints.\n\nCVSS Score: 9.1\n\nReference: \n\n\n\n3. CVE-2025-29927\n\nDescription: Authorization bypass in Next.js middleware allows attackers to access protected routes by manipulating internal headers.\n\nCVSS Score: 9.1\n\nReference: \n\n\n\n4. CVE-2025-24813\n\nDescription: \n\nCVSS Score: \n\nReference: \n\n\n\n5. CVE-2025-2783\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n6. CVE-2025-2636\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n7. CVE-2025-2505\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n8. CVE-2025-2746 &amp; CVE-2025-2747\n\nDescription: \n\nCVSS Score: \n\nReference: \n\n\n\n9. CVE-2025-3066\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n10. CVE-2025-46728\n\nDescription: Denial of Service vulnerability in cpp-httplib, potentially exposing servers to service disruptions.\n\nCVSS Score: High\n\nReference: \n\n#HackersFactory", "creation_timestamp": "2025-05-19T12:58:14.000000Z"}, {"uuid": "4acc553f-b5aa-4c0f-aa27-714b81ed4359", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3066", "type": "seen", "source": "https://t.me/NinjaSec/299", "content": "Code execution, and bypass vulnerabilities \u2014 for educational purposes only:\n\n\n1. CVE-2025-47241 \u2013 Whitelist bypass in Browser Use tool (CVSS 9.3)\n2. CVE-2025-25014 \u2013 Prototype pollution in Kibana (CVSS 9.1)\n3. CVE-2025-29927 \u2013 Next.js middleware authorization bypass (CVSS 9.1)\n4. CVE-2025-24813 \u2013 Apache Tomcat path traversal RCE (Critical)\n5. CVE-2025-2783 \u2013 Chrome Mojo use-after-free (High)\n6. CVE-2025-2636 \u2013 WordPress InstaWP plugin LFI (High)\n7. CVE-2025-2505 \u2013 WordPress Age Gate plugin LFI (High)\n8. CVE-2025-2746 \u2013 Kentico CMS auth bypass (CVSS 9.8)\n9. CVE-2025-2747 \u2013 Kentico CMS staging sync auth bypass (CVSS 9.8)\n10. CVE-2025-3066 \u2013 Chrome Site Isolation use-after-free (High)\n11. CVE-2025-46728 \u2013 cpp-httplib DoS vulnerability\n12. CVE-2025-12345 \u2013 Buffer overflow in XYZ app (CVSS 9.0)\n13. CVE-2025-12346 \u2013 SQL injection in ABC web app (CVSS 8.5)\n14. CVE-2025-12347 \u2013 XSS in DEF platform (CVSS 7.8)\n15. CVE-2025-12348 \u2013 Auth bypass in GHI system (CVSS 9.2)\n16. CVE-2025-12349 \u2013 RCE in JKL service via crafted packets (CVSS 9.5)\n17. CVE-2025-12350 \u2013 Privilege escalation in MNO app (CVSS 8.7)\n18. CVE-2025-12351 \u2013 Info disclosure in PQR system (CVSS 7.5)\n19. CVE-2025-12352 \u2013 DoS in STU server (CVSS 6.8)\n20. CVE-2025-12353 \u2013 Directory traversal in VWX app (CVSS 8.0)\n21. CVE-2025-12354 \u2013 Command injection in YZA tool (CVSS 9.1)\n22. CVE-2025-12355 \u2013 Insecure deserialization in BCD lib (CVSS 9.3)\n23. CVE-2025-12356 \u2013 CSRF in EFG portal (CVSS 7.2)\n24. CVE-2025-12357 \u2013 Memory corruption in HIJ driver (CVSS 8.9)\n25. CVE-2025-12358 \u2013 Improper auth in KLM API (CVSS 9.0)\n\n#HackersFactory", "creation_timestamp": "2025-05-07T15:48:27.000000Z"}, {"uuid": "4fb8cf0c-3835-45dc-8138-3749808e74de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30660", "type": "seen", "source": "https://t.me/cvedetector/22587", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30660 - Juniper Networks Junos OS GRE Traffic Denial-of-Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30660 \nPublished : April 9, 2025, 8:15 p.m. | 24\u00a0minutes ago \nDescription : An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).When processing a high rate of specific GRE traffic destined to the device, the respective PFE will hang causing traffic forwarding to stop.   \n  \n  \n  \nWhen this issue occurs the following logs can be observed:  \n  \n  MQSS(0): LI-3: Received a parcel with more than 512B\u00a0accompanying data   \nCHASSISD_FPC_ASIC_ERROR: ASIC Error detected &lt;...This issue affects Junos OS:  \n  \n  *  all versions before 21.2R3-S9,  \n  *  21.4 versions before 21.4R3-S8,  \n  *  22.2 versions before 22.2R3-S4,  \n  *  22.4 versions before 22.4R3-S5,  \n  *  23.2 versions before 23.2R2-S2,  \n  *  23.4 versions before 23.4R2. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T23:28:00.000000Z"}]}