{"vulnerability": "CVE-2025-32702", "sightings": [{"uuid": "3f1c245a-2883-426e-aa16-9833f376e836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32702", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "6e9a1295-234e-4f70-ad6f-22075b238574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32702", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16264", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32702\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:59:11.670Z\n\ud83d\udccf Modified: 2025-05-13T21:40:37.364Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702", "creation_timestamp": "2025-05-13T22:30:55.000000Z"}, {"uuid": "5276e0e9-fd59-4a63-b80e-253a2ef8be17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32702", "type": "seen", "source": "https://t.me/ViralCyber/13425", "content": "\u26a0\ufe0f\u0647\u0634\u062f\u0627\u0631 \u0627\u0645\u0646\u06cc\u062a\u06cc | \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u2013 \u0645\u0647 \u06f2\u06f0\u06f2\u06f5\n\u274c \u06f7\u06f5 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f\u060c \u06f5 \u0645\u0648\u0631\u062f \u062f\u0631 \u062d\u0627\u0644 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0641\u0639\u0627\u0644\u060c \u0648 \u06f1\u06f2 \u0645\u0648\u0631\u062f \u00ab\u0628\u062d\u0631\u0627\u0646\u06cc\u00bb!\n\u26a0\ufe0f\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u062f\u0631 Patch Tuesday \u0627\u06cc\u0646 \u0645\u0627\u0647\u060c \u0641\u0647\u0631\u0633\u062a\u06cc \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f \u06a9\u0647 \u0627\u0645\u0646\u06cc\u062a \u0628\u0633\u06cc\u0627\u0631\u06cc \u0627\u0632 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u06a9\u0644\u06cc\u062f\u06cc \u0631\u0627 \u062a\u0647\u062f\u06cc\u062f \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\n\u2757\ufe0f\u2757\ufe0f \u06f5 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 Exploit \u0622\u0646\u0647\u0627 \u0647\u0645 \u0627\u06a9\u0646\u0648\u0646 \u062f\u0631 \u062d\u0627\u0644 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0633\u062a: \n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-30397 \u2013 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0644\u06cc\u0646\u06a9\u200c\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u062f\u0631 IE mode (\u0645\u0631\u0648\u0631\u06af\u0631 Edge)\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-32701 &amp; CVE-2025-32706 \u2013 \u0627\u0631\u062a\u0642\u0627\u0621 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0631 Windows Log File System\u060c \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631\u0647\u0627\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-32709 \u2013 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u062c\u062f\u062f \u0627\u0632 WinSock \n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-30400 \u2013 \u0646\u0642\u0635 \u062e\u0637\u0631\u0646\u0627\u06a9 \u062f\u0631 DWM Core Library\u060c \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u062f\u0631 \u06a9\u0645\u067e\u06cc\u0646\u200c\u0647\u0627\u06cc \u0641\u06cc\u0634\u06cc\u0646\u06af \u0648 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631\n\n\ud83d\udde3 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc Public \u0634\u062f\u0647 (\u0646\u06cc\u0627\u0632 \u0628\u0647 \u0646\u0635\u0628 \u0633\u0631\u06cc\u0639 Patch):\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-26685 \u2013 \u062c\u0639\u0644 \u0647\u0648\u06cc\u062a \u062f\u0631 Microsoft Defender for Identity\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-32702 \u2013 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u062f\u0631 Visual Studio\n\n\u2757\ufe0f\u2757\ufe0f \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc\u0647\u0627\u06cc \u0646\u0645\u0631\u0647 10 !\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-29813 \u2013 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0631\u062a\u0642\u0627\u0621 \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0631 Azure DevOps\n\n\ud83d\udcce \u0644\u06cc\u0633\u062a \u06a9\u0627\u0645\u0644 CVE\u0647\u0627\n\n\u2709\ufe0f@PingChannel\n\u062e\u0628\u0631\u060c \u062a\u062d\u0644\u06cc\u0644\u060c \u0627\u0646\u062a\u0642\u0627\u062f - \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a\n\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b", "creation_timestamp": "2025-05-16T22:31:12.000000Z"}]}