{"vulnerability": "CVE-2025-3206", "sightings": [{"uuid": "61e9865c-4649-4a91-8966-6fea207e6125", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3206", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llxnhf2hcr24", "content": "", "creation_timestamp": "2025-04-04T05:06:53.910586Z"}, {"uuid": "4c2aad73-3b91-4182-b678-99d456a4bfb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32063", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-d85938e6-e6afb3a032a3100c", "content": "", "creation_timestamp": "2025-04-14T16:51:02.019387Z"}, {"uuid": "baff8362-227e-404d-a2e7-1742afa7f43d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32067", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114320523948394256", "content": "", "creation_timestamp": "2025-04-11T17:32:41.380164Z"}, {"uuid": "beba8282-1d9b-438b-b896-1054093649f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32068", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114320523948394256", "content": "", "creation_timestamp": "2025-04-11T17:32:41.463795Z"}, {"uuid": "e6422ab9-5508-4a17-b28d-30104b5543b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32069", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114320523948394256", "content": "", "creation_timestamp": "2025-04-11T17:32:41.568566Z"}, {"uuid": "62851f42-5b76-4cf8-aa24-bb9a61f2a204", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32069", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkroqprwg2f", "content": "", "creation_timestamp": "2025-04-11T19:43:10.410297Z"}, {"uuid": "74ccaf44-2f52-4b00-81b6-81d3ca093202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32068", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkroqtege2z", "content": "", "creation_timestamp": "2025-04-11T19:43:10.982961Z"}, {"uuid": "102b32e2-9b5a-4f8f-8bda-d88aad4000d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32067", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkroscuzw2u", "content": "", "creation_timestamp": "2025-04-11T19:43:18.860454Z"}, {"uuid": "1ffbde17-ecba-4619-a2e8-82cc62e24106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32061", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mez5kgznrz2h", "content": "", "creation_timestamp": "2026-02-16T22:57:25.590943Z"}, {"uuid": "f72608e0-9acb-47b2-9d90-9acfced9192c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32060", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-645abf81-6d0121fb06ee9f87", "content": "", "creation_timestamp": "2025-05-14T05:56:35.715376Z"}, {"uuid": "a144a6d5-0b99-47c5-ad1d-5f2fb8097158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32063", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-645abf81-6d0121fb06ee9f87", "content": "", "creation_timestamp": "2025-05-14T05:56:35.811294Z"}, {"uuid": "9cda7d39-95b2-4145-8150-f7d69ab2ab4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32062", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mez5x54sil2c", "content": "", "creation_timestamp": "2026-02-16T23:04:31.531826Z"}, {"uuid": "2a06b544-afa0-4f56-a39a-abfa57658180", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32062", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mez5knnwov2u", "content": "", "creation_timestamp": "2026-02-16T22:57:32.597469Z"}, {"uuid": "fe0b7863-4f0a-4a1a-b756-9a68cb6245a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32062", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mez5lvia272d", "content": "", "creation_timestamp": "2026-02-16T22:58:14.260964Z"}, {"uuid": "ce816c87-aeb8-41da-a0f9-3becebd21f5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3206", "type": "seen", "source": "https://t.me/cvedetector/22081", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3206 - \"Code-projects Hospital Management System SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-3206 \nPublished : April 4, 2025, 4:15 a.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : A vulnerability has been found in code-projects Hospital Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/doctor-specilization.php. The manipulation of the argument doctorspecilization leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T07:58:47.000000Z"}, {"uuid": "5f387f50-3aa2-42d4-ba71-c9f00637f755", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32062", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116075975938329542", "content": "", "creation_timestamp": "2026-02-15T18:07:12.510932Z"}, {"uuid": "5e1537b3-0da6-45ec-873d-dc933222edb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32069", "type": "seen", "source": "https://t.me/cvedetector/22779", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32069 - \"Wikimedia Mediawiki Wikibase Media Info Extension Cross-Site Scripting (XSS)\"\", \n  \"Content\": \"CVE ID : CVE-2025-32069 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Wikibase Media Info Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Wikibase Media Info Extension: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:28.000000Z"}, {"uuid": "ac45db7f-2434-4b03-bb27-665596bf7745", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32067", "type": "seen", "source": "https://t.me/cvedetector/22778", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32067 - Wikimedia Mediawiki Growth Experiments XSS\", \n  \"Content\": \"CVE ID : CVE-2025-32067 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Growth Experiments Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Growth Experiments Extension: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:27.000000Z"}, {"uuid": "12e8e6a5-e3c8-4920-9bc0-3b726e19237f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32068", "type": "seen", "source": "https://t.me/cvedetector/22773", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32068 - Wikimedia Foundation Mediawiki OAuth Extension Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-32068 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Incorrect Authorization vulnerability in The Wikimedia Foundation Mediawiki - OAuth Extension allows Authentication Bypass.This issue affects Mediawiki - OAuth Extension: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:20.000000Z"}, {"uuid": "9c7df440-811c-403f-b017-3e2a23476501", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3206", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10553", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3206\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in code-projects Hospital Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/doctor-specilization.php. The manipulation of the argument doctorspecilization leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-04T03:31:05.315Z\n\ud83d\udccf Modified: 2025-04-04T20:20:51.779Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303160\n2. https://vuldb.com/?ctiid.303160\n3. https://vuldb.com/?submit.545895\n4. https://github.com/Lanxiy7th/lx_CVE_report-/issues/19\n5. https://code-projects.org/", "creation_timestamp": "2025-04-04T20:36:27.000000Z"}]}