{"vulnerability": "CVE-2025-3240", "sightings": [{"uuid": "d30e0c6f-a8e6-490d-8706-1801e98a37e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3240", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyiciu7o72z", "content": "", "creation_timestamp": "2025-04-04T13:07:26.139195Z"}, {"uuid": "19b2be65-7158-4802-b3b0-ba1851b0474e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114299352397344855", "content": "", "creation_timestamp": "2025-04-07T23:48:29.524720Z"}, {"uuid": "98846d90-5644-4051-95b2-05241816e3fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32406", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114304070990427674", "content": "", "creation_timestamp": "2025-04-08T19:48:29.038994Z"}, {"uuid": "2cab7290-afa1-40cd-9add-bf7ffdac6419", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32408", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114376212658273815", "content": "", "creation_timestamp": "2025-04-21T13:35:03.215940Z"}, {"uuid": "da1f80bd-c6da-47f3-8ef4-4a7f06392561", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32408", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lndg6o34s32y", "content": "", "creation_timestamp": "2025-04-21T14:53:51.738617Z"}, {"uuid": "c303dea3-9224-4a1c-8b68-b218b4e7453e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32408", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lndgn2oi7n2d", "content": "", "creation_timestamp": "2025-04-21T15:01:54.821049Z"}, {"uuid": "694f202d-2737-4ee0-ad1c-f36f75376d89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32408", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114376738258130919", "content": "", "creation_timestamp": "2025-04-21T15:48:43.718691Z"}, {"uuid": "9f39875e-a0d6-4b51-b835-f37da5c12bb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32405", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lokwiifo25l2", "content": "", "creation_timestamp": "2025-05-07T08:03:25.644724Z"}, {"uuid": "14a01726-1bef-4351-b42f-5b9f8654766f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32403", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lokwjin4zs52", "content": "", "creation_timestamp": "2025-05-07T08:05:43.512338Z"}, {"uuid": "cfbac586-0954-4c06-aa26-f3fa12469312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32404", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lokwjiomdq52", "content": "", "creation_timestamp": "2025-05-07T08:05:44.221673Z"}, {"uuid": "878f6681-4575-4d45-ba06-4c997016c529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32402", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lokwjikxv7l2", "content": "", "creation_timestamp": "2025-05-07T08:05:44.763327Z"}, {"uuid": "b6d2676f-2418-4488-98fe-9247b26e33ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32400", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lokxykw52r2h", "content": "", "creation_timestamp": "2025-05-07T08:26:26.023040Z"}, {"uuid": "fbdd5712-a61a-4c0b-ab13-fdee9b6c9f25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32402", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lokxyl4ta42h", "content": "", "creation_timestamp": "2025-05-07T08:26:27.188253Z"}, {"uuid": "1a87ad01-6622-4c25-af50-3d03df5d1a3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32403", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lokxyla7pt2n", "content": "", "creation_timestamp": "2025-05-07T08:26:27.698267Z"}, {"uuid": "15ae27b8-3b2a-4867-9fec-0c4d12df15d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32404", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lokxyldree22", "content": "", "creation_timestamp": "2025-05-07T08:26:28.271505Z"}, {"uuid": "5dd845a7-2f74-4774-bb4f-e7f2eb3fca32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32405", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lokxylo2xp2j", "content": "", "creation_timestamp": "2025-05-07T08:26:30.004202Z"}, {"uuid": "529fdc9e-bb57-4e7e-9da0-5f82eb0bb901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32401", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lokxylrevc2p", "content": "", "creation_timestamp": "2025-05-07T08:26:30.573222Z"}, {"uuid": "781389f4-2e07-447f-adb2-fcfeedb7188a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32407", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvjlbwizkf2f", "content": "", "creation_timestamp": "2025-08-03T21:02:51.102915Z"}, {"uuid": "3c43f1b2-d9a2-426c-b440-f3d4f11c2616", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32408", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:56.000000Z"}, {"uuid": "4c9bc461-22cd-44f1-8ec5-31a3862d6f7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32408", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:37.000000Z"}, {"uuid": "b5dd857a-556b-424d-b7e3-a5d537ec2747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "seen", "source": "Telegram/t0F4y_WS-Izge_sRAx1w26KxSWN5Dvu_48e4NjYxre7mHKNLRA", "content": "", "creation_timestamp": "2025-10-28T23:31:05.000000Z"}, {"uuid": "e4383a71-3073-40ad-93ae-426b893d418d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32403", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15272", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32403\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to corrupt the memory of IO devices that use the library by sending a malicious RPC packet.\n\ud83d\udccf Published: 2025-05-07T07:05:41.872Z\n\ud83d\udccf Modified: 2025-05-07T07:05:41.872Z\n\ud83d\udd17 References:\n1. https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32403", "creation_timestamp": "2025-05-07T07:22:01.000000Z"}, {"uuid": "5cb48bcf-3189-459f-a58a-1f76d8aa313b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3240", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10435", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3240\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in PHPGurukul Online Fire Reporting System 1.2. Affected by this issue is some unknown functionality of the file /admin/search.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-04T10:31:08.632Z\n\ud83d\udccf Modified: 2025-04-04T12:01:28.550Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303266\n2. https://vuldb.com/?ctiid.303266\n3. https://vuldb.com/?submit.546615\n4. https://github.com/JunGu-W/cve/issues/5\n5. https://phpgurukul.com/", "creation_timestamp": "2025-04-04T12:36:47.000000Z"}, {"uuid": "bae4fb30-8541-4f05-ae32-9c2c1262a67e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10799", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32409\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Ratta SuperNote A6 X2 Nomad before December 2024 allows remote code execution because an arbitrary firmware image (signed with debug keys) can be sent to TCP port 60002, and placed into the correct image-update location as a consequence of both directory traversal and unintended handling of concurrency.\n\ud83d\udccf Published: 2025-04-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-07T21:38:56.554Z\n\ud83d\udd17 References:\n1. https://www.prizmlabs.io/post/remote-rootkits-uncovering-a-0-click-rce-in-the-supernote-nomad-e-ink-tablet", "creation_timestamp": "2025-04-07T21:45:57.000000Z"}, {"uuid": "0e66aa02-b923-42fa-bb23-50de70f69f7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32400", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15275", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32400\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet.\n\ud83d\udccf Published: 2025-05-07T07:05:29.110Z\n\ud83d\udccf Modified: 2025-05-07T07:05:29.110Z\n\ud83d\udd17 References:\n1. https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32400", "creation_timestamp": "2025-05-07T07:22:04.000000Z"}, {"uuid": "74d5d687-b938-440d-b946-32a0f1ebafeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32401", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15274", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32401\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to corrupt the memory of IO devices that use the library by sending a malicious RPC packet.\n\ud83d\udccf Published: 2025-05-07T07:05:33.647Z\n\ud83d\udccf Modified: 2025-05-07T07:05:33.647Z\n\ud83d\udd17 References:\n1. https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32401", "creation_timestamp": "2025-05-07T07:22:03.000000Z"}, {"uuid": "26a89413-3bec-4eb3-92cf-66659397cbc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32405", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15270", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32405\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet.\n\ud83d\udccf Published: 2025-05-07T07:05:50.198Z\n\ud83d\udccf Modified: 2025-05-07T07:05:50.198Z\n\ud83d\udd17 References:\n1. https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32405", "creation_timestamp": "2025-05-07T07:21:58.000000Z"}, {"uuid": "a4b56025-c3cf-4fb9-bad2-56cb45c24ebc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32404", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15271", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32404\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to corrupt the memory of IO devices that use the library by sending a malicious RPC packet.\n\ud83d\udccf Published: 2025-05-07T07:05:46.358Z\n\ud83d\udccf Modified: 2025-05-07T07:05:46.358Z\n\ud83d\udd17 References:\n1. https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32404", "creation_timestamp": "2025-05-07T07:22:00.000000Z"}, {"uuid": "b67ff342-4dd6-45bf-9e05-1c46f0a3a5fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32402", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15273", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32402\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet.\n\ud83d\udccf Published: 2025-05-07T07:05:37.811Z\n\ud83d\udccf Modified: 2025-05-07T07:05:37.811Z\n\ud83d\udd17 References:\n1. https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32402", "creation_timestamp": "2025-05-07T07:22:02.000000Z"}, {"uuid": "a851bca8-e5c2-4c7c-a8a0-59ed98ce52c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32407", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16754", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32407\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Samsung Internet for Galaxy Watch version 5.0.9, available up until Samsung Galaxy Watch 3, does not properly validate TLS certificates, allowing for an attacker to impersonate any and all websites visited by the user. This is a critical misconfiguration in the way the browser validates the identity of the server. It negates the use of HTTPS as a secure channel, allowing for Man-in-the-Middle attacks, stealing sensitive information or modifying incoming and outgoing traffic. NOTE: This vulnerability is in an end-of-life product that is no longer maintained by the vendor.\n\ud83d\udccf Published: 2025-05-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-16T20:17:00.903Z\n\ud83d\udd17 References:\n1. https://github.com/diegovargasj/CVE-2025-32407", "creation_timestamp": "2025-05-16T20:34:58.000000Z"}, {"uuid": "0501b3e4-23f8-486c-a390-9206a3420e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32407", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/36789", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-32407 PoC\nURL\uff1ahttps://github.com/diegovargasj/CVE-2025-32407\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-14T18:55:53.000000Z"}, {"uuid": "7dc9148d-796c-43b4-9e90-4c087e5eabf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32408", "type": "seen", "source": "https://t.me/cvedetector/23436", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32408 - Soffid Console Java Deserialization Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-32408 \nPublished : April 21, 2025, 1:15 p.m. | 25\u00a0minutes ago \nDescription : In Soffid Console 3.5.38 before 3.5.39, necessary checks were not applied to some Java objects. A malicious agent could possibly execute arbitrary code in the Sync Server and compromise security. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-21T16:28:50.000000Z"}, {"uuid": "7a5a643f-d078-4c9e-98be-4a9dd1035b94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "seen", "source": "https://t.me/cvedetector/22357", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32409 - Ratta SuperNote A6 X2 Nomad Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32409 \nPublished : April 7, 2025, 10:15 p.m. | 42\u00a0minutes ago \nDescription : Ratta SuperNote A6 X2 Nomad before December 2024 allows remote code execution because an arbitrary firmware image (signed with debug keys) can be sent to TCP port 60002, and placed into the correct image-update location as a consequence of both directory traversal and unintended handling of concurrency. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T01:26:26.000000Z"}, {"uuid": "456aa85d-e97d-4387-82a7-8ffcbad3f12f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3240", "type": "seen", "source": "https://t.me/cvedetector/22109", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3240 - PHPGurukul Online Fire Reporting System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3240 \nPublished : April 4, 2025, 11:15 a.m. | 40\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in PHPGurukul Online Fire Reporting System 1.2. Affected by this issue is some unknown functionality of the file /admin/search.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T14:40:15.000000Z"}, {"uuid": "220d8242-8e27-4380-8ddb-75612335d25d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32408", "type": "seen", "source": "Telegram/dG9humnXIzOxkHd7zBsDqFqwWHp2pckRdyimEc2p0ZCgBFY", "content": "", "creation_timestamp": "2025-04-21T15:30:24.000000Z"}, {"uuid": "8c6aeb6c-1ebf-48c9-a4a3-a91d434cead9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "published-proof-of-concept", "source": "Telegram/W2TWdoWrUKNmmhGmSV3_goOutk_L4s3sBFcvx9KhQrX6568", "content": "", "creation_timestamp": "2025-04-08T00:30:35.000000Z"}, {"uuid": "6492276c-9a6f-4e3b-bd15-1194ee310dca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32402", "type": "published-proof-of-concept", "source": "Telegram/s1CMES_h8TZrfQEggyegqiEz1ij5IXKbThjcieImZ2BBgVM", "content": "", "creation_timestamp": "2025-05-07T09:32:04.000000Z"}, {"uuid": "4a2c8655-b1a7-4420-b48d-62f1fd7b8ea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32405", "type": "published-proof-of-concept", "source": "Telegram/s1CMES_h8TZrfQEggyegqiEz1ij5IXKbThjcieImZ2BBgVM", "content": "", "creation_timestamp": "2025-05-07T09:32:04.000000Z"}, {"uuid": "05f07429-6b80-45aa-9d61-409a01de59b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32400", "type": "published-proof-of-concept", "source": "Telegram/s1CMES_h8TZrfQEggyegqiEz1ij5IXKbThjcieImZ2BBgVM", "content": "", "creation_timestamp": "2025-05-07T09:32:04.000000Z"}, {"uuid": "8f59c233-922a-4de2-929d-89cd2e7b0be1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32400", "type": "seen", "source": "https://t.me/cvedetector/24686", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32400 - RT-Labs P-Net Heap-based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32400 \nPublished : May 7, 2025, 7:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T10:34:37.000000Z"}, {"uuid": "6dc115d5-4838-4cac-a74c-b449a4db1e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32403", "type": "seen", "source": "https://t.me/cvedetector/24678", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32403 - RT-Labs P-Net OOB Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32403 \nPublished : May 7, 2025, 7:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to corrupt the memory of IO devices that use the library by sending a malicious RPC packet. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T10:34:19.000000Z"}, {"uuid": "a38da99c-9b9c-4565-908f-e6f379deed24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32404", "type": "seen", "source": "https://t.me/cvedetector/24679", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32404 - RT-Labs P-Net OOB Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32404 \nPublished : May 7, 2025, 7:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to corrupt the memory of IO devices that use the library by sending a malicious RPC packet. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T10:34:21.000000Z"}, {"uuid": "7e55f901-a695-4f5f-b131-4b1fef1411a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32405", "type": "seen", "source": "https://t.me/cvedetector/24680", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32405 - RT-Labs P-Net Out-of-bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32405 \nPublished : May 7, 2025, 7:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T10:34:24.000000Z"}, {"uuid": "3b1d24eb-8a5a-47c7-bf84-0849d9a54f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32401", "type": "seen", "source": "https://t.me/cvedetector/24676", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32401 - RT-Labs P-Net Heap-based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-32401 \nPublished : May 7, 2025, 7:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to corrupt the memory of IO devices that use the library by sending a malicious RPC packet. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T10:34:12.000000Z"}, {"uuid": "865d3b35-b49d-48d4-8075-b0f4962a9ae0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32402", "type": "seen", "source": "https://t.me/cvedetector/24677", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32402 - RT-Labs P-Net OOB Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32402 \nPublished : May 7, 2025, 7:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T10:34:15.000000Z"}]}