{"vulnerability": "CVE-2025-3297", "sightings": [{"uuid": "428827e7-94e1-4fd2-9431-1d4fc8d3846f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114736233551699855", "content": "", "creation_timestamp": "2025-06-24T03:33:07.946768Z"}, {"uuid": "c3d96ca7-250b-4088-85e2-c21553b22da6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3297", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm2z2q4wr62c", "content": "", "creation_timestamp": "2025-04-05T13:12:31.494478Z"}, {"uuid": "48ccc9b8-0e7d-4453-bbc0-99d11a08d083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-32975", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114773849144656809", "content": "", "creation_timestamp": "2025-06-30T18:59:14.529930Z"}, {"uuid": "fc0c9073-b00d-4ce7-bc1e-1926ff594d93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-32977", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114773849144656809", "content": "", "creation_timestamp": "2025-06-30T18:59:14.711749Z"}, {"uuid": "67b020bf-72ea-4b64-a8f0-0c764b7edaba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-32976", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114773849144656809", "content": "", "creation_timestamp": "2025-06-30T18:59:14.612381Z"}, {"uuid": "bba74b9d-aebc-4fa9-8f43-27343b338520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-32978", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114773849144656809", "content": "", "creation_timestamp": "2025-06-30T18:59:14.801631Z"}, {"uuid": "0e4d068a-263b-4666-90ab-eb508cf37bc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32976", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114736233573230003", "content": "", "creation_timestamp": "2025-06-24T03:33:08.785154Z"}, {"uuid": "959b411d-a7d7-4a38-ab3d-ec19a4c6979d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32977", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lsd7d4qshu2q", "content": "", "creation_timestamp": "2025-06-24T03:57:04.611582Z"}, {"uuid": "f33c484f-8ef5-4c9f-abc0-a9ecb2fe630a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lsd5rwjf3c22", "content": "", "creation_timestamp": "2025-06-24T03:29:33.491475Z"}, {"uuid": "2c949198-b61f-48e6-87a8-618d3b0fc076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32976", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lsd5sellqp2e", "content": "", "creation_timestamp": "2025-06-24T03:29:50.560927Z"}, {"uuid": "d5af740a-aaac-45dc-9bc5-0b4845e430f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32978", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lsd7dkbzd426", "content": "", "creation_timestamp": "2025-06-24T03:57:18.028157Z"}, {"uuid": "9157be3e-71d4-41d5-b9a9-37db16ff9b8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32977", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114736351451621214", "content": "", "creation_timestamp": "2025-06-24T04:03:05.456888Z"}, {"uuid": "59f6661a-8a82-452f-80ad-9e892b3ea5b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32978", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114736351479215338", "content": "", "creation_timestamp": "2025-06-24T04:03:06.299665Z"}, {"uuid": "b34aa75c-3725-40cf-bf9f-3a6c75a24a95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32977", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lsdf3d4oeg2p", "content": "", "creation_timestamp": "2025-06-24T05:40:06.541372Z"}, {"uuid": "337ac31c-aee5-453f-bebb-53b2aa4e0dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32979", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnoedfju7w2j", "content": "", "creation_timestamp": "2025-04-25T23:20:01.154010Z"}, {"uuid": "0ca4e1b1-d897-4c45-8e1f-f9f3d1c72c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lsdfedigb42y", "content": "", "creation_timestamp": "2025-06-24T05:45:06.359910Z"}, {"uuid": "d44d56d6-d545-40f0-8b05-fbbbb4e98d99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32979", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnvn7bacwc2y", "content": "", "creation_timestamp": "2025-04-28T20:47:24.709920Z"}, {"uuid": "e48f7dea-eef8-4533-88b3-9394edca0050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32978", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lsdfnbx3tq2w", "content": "", "creation_timestamp": "2025-06-24T05:50:06.824472Z"}, {"uuid": "22a896c2-f82d-4dd2-bd25-fe3e2439deb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32976", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lsdfwaehyu26", "content": "", "creation_timestamp": "2025-06-24T05:55:07.174817Z"}, {"uuid": "974f48c2-e4e2-4c2c-9104-ab8ce275c596", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32973", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114427698608004436", "content": "", "creation_timestamp": "2025-04-30T15:48:37.459162Z"}, {"uuid": "53b10217-9be8-40ad-b167-77899ca0bdf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32974", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114427698650906062", "content": "", "creation_timestamp": "2025-04-30T15:48:37.800633Z"}, {"uuid": "d86d2e6f-35ee-443d-84c4-0d9479890637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32974", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo27ru3j5p2h", "content": "", "creation_timestamp": "2025-04-30T16:30:34.417934Z"}, {"uuid": "266b9475-b686-4198-a768-9388ea879639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32973", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo27ru6vjs2n", "content": "", "creation_timestamp": "2025-04-30T16:30:35.025656Z"}, {"uuid": "07cdd2b7-ac10-4ddc-8028-ff7fbb01f894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32978", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsein6nqjn23", "content": "", "creation_timestamp": "2025-06-24T16:16:24.323318Z"}, {"uuid": "5f46ca6c-8051-4fb3-a03a-6542507bc5fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32977", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lseiv5yzgf2m", "content": "", "creation_timestamp": "2025-06-24T16:20:52.326016Z"}, {"uuid": "604cc26a-da4f-4c0d-93c6-3141a6b3ed44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lsfkwyywd22h", "content": "", "creation_timestamp": "2025-06-25T02:30:21.232923Z"}, {"uuid": "5aa27315-ead9-445d-a2a7-f16bb86db926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsejqqan3p25", "content": "", "creation_timestamp": "2025-06-24T16:36:17.515421Z"}, {"uuid": "07ae9204-ac92-4170-a4ac-7125b450b610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32976", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsejyfs4tw2u", "content": "", "creation_timestamp": "2025-06-24T16:40:34.564201Z"}, {"uuid": "3a1fde22-d739-44f5-a9e4-e925129ba6d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32976", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lsfljjxhuk2h", "content": "", "creation_timestamp": "2025-06-25T02:40:43.227075Z"}, {"uuid": "79950532-dcaa-402a-8afe-166dbfbc263d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32977", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lsfm3yhcuc2h", "content": "", "creation_timestamp": "2025-06-25T02:51:03.018918Z"}, {"uuid": "58e7826d-c4b2-4d54-8ec7-78c49701e407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32978", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lsfmop3ums2h", "content": "", "creation_timestamp": "2025-06-25T03:01:30.041164Z"}, {"uuid": "1a1100a4-ad0a-4074-92a5-a1be7b3f371b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32970", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lxnhuasgya2q", "content": "", "creation_timestamp": "2025-08-30T21:02:28.235813Z"}, {"uuid": "4607d599-c66e-427f-bb2e-8c69ec45949f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32970", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ly734q6rcs2k", "content": "", "creation_timestamp": "2025-09-06T21:02:30.035757Z"}, {"uuid": "dcd434fc-2db0-439b-8b94-eaac4e46c24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3mhhn5tay3f2l", "content": "", "creation_timestamp": "2026-03-20T04:04:21.249798Z"}, {"uuid": "c1d58d16-2934-4e8d-a91f-bbe8eff69308", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32978", "type": "seen", "source": "https://bsky.app/profile/infosecbriefly.bsky.social/post/3maedhrprh72y", "content": "", "creation_timestamp": "2025-12-19T18:36:38.421720Z"}, {"uuid": "14ba75e1-98c1-46b8-9609-2803f7ad15fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116269884350880404", "content": "", "creation_timestamp": "2026-03-22T00:00:42.231724Z"}, {"uuid": "1305107b-1733-4694-b852-5aa29b550535", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mhmahy2jae2m", "content": "", "creation_timestamp": "2026-03-22T00:00:42.577313Z"}, {"uuid": "97f7dd1b-a5b1-4bf2-80bc-f23275af108f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mhqkij6g3g2r", "content": "", "creation_timestamp": "2026-03-23T17:10:36.586846Z"}, {"uuid": "a977a3db-edf1-4109-b6ec-b741e120e09b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32970", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-32970.yaml", "content": "", "creation_timestamp": "2025-08-28T13:40:03.000000Z"}, {"uuid": "d23178b3-b95d-4ef2-b35a-87d64e1d4d54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32978", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/115755565778280680", "content": "", "creation_timestamp": "2025-12-21T04:02:41.344358Z"}, {"uuid": "446c3da3-b62e-4960-9805-0364636aad9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32978", "type": "seen", "source": "https://threatintel.cc/2025/12/20/watchguard-sounds-alarm-as-critical.html", "content": "", "creation_timestamp": "2025-12-21T03:02:57.000000Z"}, {"uuid": "07fb233d-01c3-4c5b-8f5a-2013cb0df10a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/cybersecurity0001.bsky.social/post/3mhpsijkcg725", "content": "", "creation_timestamp": "2026-03-23T10:01:07.426979Z"}, {"uuid": "ad033a15-eb28-4eab-96c7-7d2b0931c31f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/allsafeus.bsky.social/post/3mhl772s3sm2w", "content": "", "creation_timestamp": "2026-03-21T14:05:09.937554Z"}, {"uuid": "34f2dcb7-f30c-43e0-bd0e-ecbccc0fd3d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mhkya35wjo22", "content": "", "creation_timestamp": "2026-03-21T12:00:27.217064Z"}, {"uuid": "8d2eaf7e-ee5c-4630-a549-6cee9c571995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/solomonneas.dev/post/3mibmij4gwi2f", "content": "", "creation_timestamp": "2026-03-30T12:01:39.326101Z"}, {"uuid": "4b49f391-3b6f-4928-b9f8-2e57ecbd3d92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mhqyw5pagk23", "content": "", "creation_timestamp": "2026-03-23T21:28:47.199306Z"}, {"uuid": "1c1772c0-45bc-45b3-985e-f4b0bc3e60de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mhshycqep62x", "content": "", "creation_timestamp": "2026-03-24T11:31:07.438751Z"}, {"uuid": "41d810dd-5cc8-4a44-9d0e-28bdd705472a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/techsentiments.com/post/3mhq3auc6a526", "content": "", "creation_timestamp": "2026-03-23T12:37:53.263902Z"}, {"uuid": "db0831ee-31cb-486d-81ac-d0868059881e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/infosecbriefly.bsky.social/post/3mhkvokekjz2v", "content": "", "creation_timestamp": "2026-03-21T11:14:51.729143Z"}, {"uuid": "8c28908e-e87b-44e9-b643-ee47b0b908b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://thehackernews.com/2026/03/hackers-exploit-cve-2025-32975-cvss-100.html", "content": "", "creation_timestamp": "2026-03-23T05:15:00.000000Z"}, {"uuid": "3a97daeb-cb01-408a-a284-72ea2e6f9e31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-32978", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-vulnerabilities-found-quest-kace-systems-management-appliance-patch", "content": "", "creation_timestamp": "2026-03-20T17:31:58.000000Z"}, {"uuid": "0ee8dcf1-ff35-4b9f-bdf9-c49f6c3d2d50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-vulnerabilities-found-quest-kace-systems-management-appliance-patch", "content": "", "creation_timestamp": "2026-03-20T17:31:58.000000Z"}, {"uuid": "c7bb68cd-479b-4a7f-a109-e37a46702d61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-32976", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-vulnerabilities-found-quest-kace-systems-management-appliance-patch", "content": "", "creation_timestamp": "2026-03-20T17:31:58.000000Z"}, {"uuid": "d0f26a8e-eba4-4bdb-959f-6d7b496464a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-32977", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-vulnerabilities-found-quest-kace-systems-management-appliance-patch", "content": "", "creation_timestamp": "2026-03-20T17:31:58.000000Z"}, {"uuid": "d9e5e463-59e5-4f56-8577-f2f9433f8f08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mhkyznv6mtj2", "content": "", "creation_timestamp": "2026-03-21T12:15:16.571958Z"}, {"uuid": "9c67725b-204c-4504-ac6e-4e1c0fbce2a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mhjg3d66yg2q", "content": "", "creation_timestamp": "2026-03-20T21:03:01.881906Z"}, {"uuid": "442bcdf9-7c15-4274-ae09-e03a5e09f5ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3mhq5yhwjs42k", "content": "", "creation_timestamp": "2026-03-23T13:26:53.478154Z"}, {"uuid": "ff1d1b9c-4a7e-4db9-b2a4-4f35a838922b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/it4intserver.bsky.social/post/3mhpmqnqvk42e", "content": "", "creation_timestamp": "2026-03-23T08:18:18.472065Z"}, {"uuid": "15104937-0805-4506-a232-f2c3c98798a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3mhrzlovtn42g", "content": "", "creation_timestamp": "2026-03-24T07:13:28.726818Z"}, {"uuid": "dbe53618-47ab-400f-a6f1-970024bdc8ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/reconbee.bsky.social/post/3mhpiikfmwc2b", "content": "", "creation_timestamp": "2026-03-23T07:02:17.312202Z"}, {"uuid": "db071f27-7af2-42cd-b5dc-35ff3ae603fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mhpk6ebvjs2j", "content": "", "creation_timestamp": "2026-03-23T07:32:16.073612Z"}, {"uuid": "3445525c-a9e9-4583-859e-0f87d043406b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/allsafeus.bsky.social/post/3mhpl4pruq72z", "content": "", "creation_timestamp": "2026-03-23T07:49:16.662487Z"}, {"uuid": "07091c74-7799-4abe-847b-c0265783bfd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mhplnh2gdhe2", "content": "", "creation_timestamp": "2026-03-23T07:58:39.259196Z"}, {"uuid": "129cf9a6-1aa7-426c-8110-bb8fc7b87a3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mhplqq5m4q2q", "content": "", "creation_timestamp": "2026-03-23T08:00:26.367935Z"}, {"uuid": "2ed1ff86-915c-491b-bb87-6fd624353342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/danykaswanson.technodon.org.ap.brid.gy/post/3mhqdgaywpek2", "content": "", "creation_timestamp": "2026-03-23T15:04:08.947504Z"}, {"uuid": "73257e74-adf9-43a4-9b8d-0a8f86ca3a42", "vulnerability_lookup_origin": "405284c2-e461-4670-8979-7fd2c9755a60", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-32975", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/e2c5193f-40df-49c6-b591-2e9cb2d4dfeb", "content": "", "creation_timestamp": "2026-04-20T20:00:03.601888Z"}, {"uuid": "9a2b09c0-60ce-4066-9598-9767cf0326e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-32975", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116279164488002845", "content": "", "creation_timestamp": "2026-03-23T15:20:44.175201Z"}, {"uuid": "945f0562-d2a6-4a55-a5a8-b5cf23dc1bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-32975", "type": "seen", "source": "https://gist.github.com/joetustin-cyera/c7d3ab11a87c1c714cd1a843a1a3b91c", "content": "", "creation_timestamp": "2026-03-30T22:31:06.000000Z"}, {"uuid": "e1067791-c3e2-4865-8435-c9fc54b8b9af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/giuliosistilli.bsky.social/post/3mhpsame34p2o", "content": "", "creation_timestamp": "2026-03-23T09:56:41.699385Z"}, {"uuid": "c498ed04-e4ae-433b-a8f5-08d84d26fd03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mhqeeqbful2w", "content": "", "creation_timestamp": "2026-03-23T15:21:06.967965Z"}, {"uuid": "8acba3ef-fd19-433f-93cc-a06baf446083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-32975", "type": "seen", "source": "https://infosec.exchange/users/patrickcmiller/statuses/116329386316184671", "content": "", "creation_timestamp": "2026-04-01T12:12:48.447021Z"}, {"uuid": "0c696f82-5338-4959-9ae9-00c76213d9d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32979", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13541", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32979\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: NETSCOUT nGeniusONE before 6.4.0 b2350 allows Arbitrary File Creation by authenticated users.\n\ud83d\udccf Published: 2025-04-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-25T20:49:58.570Z\n\ud83d\udd17 References:\n1. https://www.netscout.com/securityadvisories", "creation_timestamp": "2025-04-25T21:08:24.000000Z"}, {"uuid": "bedcc3fe-edc1-4fd3-b47d-63b79a9c7099", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "exploited", "source": "https://t.me/thehackernews/8649", "content": "\u26a0\ufe0f Attackers are exploiting a CVSS 10.0 auth bypass in Quest KACE SMA to hijack admin accounts.\n\nArctic Wolf observed attacks on unpatched, internet-exposed systems, with payloads delivered via curl and persistence set through registry changes.\n\n\ud83d\udd17 From initial access to full domain control chain \u2192 https://thehackernews.com/2026/03/hackers-exploit-cve-2025-32975-cvss-100.html", "creation_timestamp": "2026-03-23T06:44:48.000000Z"}, {"uuid": "e2142465-d659-430c-ab72-86f18874d9a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "exploited", "source": "Telegram/obsWFVncZDw2N_JUP8CjvP-2QXqVkQr0tRz9OGb2G1Zqzg", "content": "", "creation_timestamp": "2026-03-23T23:57:55.000000Z"}, {"uuid": "ba799440-3b4f-43b7-aea0-2436eddbec7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "exploited", "source": "https://t.me/cibsecurity/88857", "content": "\ud83d\udd8b\ufe0f Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems \ud83d\udd8b\ufe0f\n\nThreat actors are suspected to be exploiting a maximumseverity security flaw impacting Quest KACE Systems Management Appliance SMA, according to Arctic Wolf. The cybersecurity company said it observed malicious activity starting the week of March 9, 2026, in customer environments that's consistent with the exploitation of CVE202532975 on unpatched SMA systems exposed to the internet. It's.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2026-03-23T12:34:22.000000Z"}, {"uuid": "a9cd7b9f-a341-4aeb-9a82-8c471af2c5a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "exploited", "source": "https://t.me/TengkorakCyberCrewzz/9168", "content": "Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems \u2013 thehackernews.com\n\nMon, 23 Mar 2026 14:15:00", "creation_timestamp": "2026-03-23T08:03:33.000000Z"}, {"uuid": "47e18b4a-aa29-4771-92f4-2a34348dc060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "exploited", "source": "https://t.me/TengkorakCyberCrewzz/39029", "content": "Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems \u2013 thehackernews.com\n\nMon, 23 Mar 2026 14:15:00", "creation_timestamp": "2026-03-23T08:03:33.000000Z"}, {"uuid": "f214bbc0-5578-429e-9be2-7261d6e3593b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "exploited", "source": "https://t.me/ctinow/247554", "content": "Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems\nhttps://ift.tt/yHXoQC2", "creation_timestamp": "2026-03-23T07:04:07.000000Z"}, {"uuid": "e532ea9b-46eb-4adc-8b32-89d36dee52c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32977", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19351", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32978\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to replace system licenses through a web interface intended for license renewal. Attackers can exploit this to replace valid licenses with expired or trial licenses, causing denial of service.\n\ud83d\udccf Published: 2025-06-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-24T14:24:10.819Z\n\ud83d\udd17 References:\n1. https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978\n2. https://seralys.com/research/CVE-2025-32978.txt\n3. https://seclists.org/fulldisclosure/2025/Jun/25", "creation_timestamp": "2025-06-24T14:46:39.000000Z"}, {"uuid": "8ef6cd3f-93d5-4016-acbe-a4844dc5ff85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32976", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19351", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32978\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to replace system licenses through a web interface intended for license renewal. Attackers can exploit this to replace valid licenses with expired or trial licenses, causing denial of service.\n\ud83d\udccf Published: 2025-06-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-24T14:24:10.819Z\n\ud83d\udd17 References:\n1. https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978\n2. https://seralys.com/research/CVE-2025-32978.txt\n3. https://seclists.org/fulldisclosure/2025/Jun/25", "creation_timestamp": "2025-06-24T14:46:39.000000Z"}, {"uuid": "ba22839e-0e94-4d64-a1a0-4024000fe86f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "exploited", "source": "https://t.me/information_security_channel/55028", "content": "Critical Quest KACE Vulnerability Potentially Exploited in Attacks\nhttps://www.securityweek.com/critical-quest-kace-vulnerability-potentially-exploited-in-attacks/\n\nThe vulnerability is tracked as CVE-2025-32975 and it may have been exploited in attacks against the education sector.\nThe post Critical Quest KACE Vulnerability Potentially Exploited in Attacks (https://www.securityweek.com/critical-quest-kace-vulnerability-potentially-exploited-in-attacks/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2026-03-22T01:56:00.000000Z"}, {"uuid": "ba6e5660-8bab-4d36-ba38-9bd0ca15399c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3297", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10600", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3297\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as problematic, was found in SourceCodester Online Eyewear Shop 1.0. Affected is an unknown function of the file /classes/Master.php?f=save_product. The manipulation of the argument brand leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.\n\ud83d\udccf Published: 2025-04-05T08:31:09.055Z\n\ud83d\udccf Modified: 2025-04-05T08:31:09.055Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303492\n2. https://vuldb.com/?ctiid.303492\n3. https://vuldb.com/?submit.549982\n4. https://github.com/foreverfeifei/cve/blob/main/xss.md\n5. https://www.sourcecodester.com/", "creation_timestamp": "2025-04-05T08:37:13.000000Z"}, {"uuid": "6915da72-1c35-412a-9e75-467f62a6e2c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32975", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19351", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32978\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to replace system licenses through a web interface intended for license renewal. Attackers can exploit this to replace valid licenses with expired or trial licenses, causing denial of service.\n\ud83d\udccf Published: 2025-06-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-24T14:24:10.819Z\n\ud83d\udd17 References:\n1. https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978\n2. https://seralys.com/research/CVE-2025-32978.txt\n3. https://seclists.org/fulldisclosure/2025/Jun/25", "creation_timestamp": "2025-06-24T14:46:39.000000Z"}, {"uuid": "9397b6eb-0515-4742-a48d-3a90144eeb35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32978", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19351", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32978\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to replace system licenses through a web interface intended for license renewal. Attackers can exploit this to replace valid licenses with expired or trial licenses, causing denial of service.\n\ud83d\udccf Published: 2025-06-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-24T14:24:10.819Z\n\ud83d\udd17 References:\n1. https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978\n2. https://seralys.com/research/CVE-2025-32978.txt\n3. https://seclists.org/fulldisclosure/2025/Jun/25", "creation_timestamp": "2025-06-24T14:46:39.000000Z"}, {"uuid": "da40b807-b069-4755-8d08-016279e715d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3297", "type": "seen", "source": "https://t.me/cvedetector/22188", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3297 - SourceCodester Online Eyewear Shop Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3297 \nPublished : April 5, 2025, 9:15 a.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in SourceCodester Online Eyewear Shop 1.0. Affected is an unknown function of the file /classes/Master.php?f=save_product. The manipulation of the argument brand leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-05T13:14:52.000000Z"}, {"uuid": "7fd4387f-6785-454c-98b2-bda8278c94a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32979", "type": "seen", "source": "https://t.me/cvedetector/23789", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32979 - NETSCOUT nGeniusONE Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32979 \nPublished : April 25, 2025, 9:15 p.m. | 2\u00a0hours, 6\u00a0minutes ago \nDescription : NETSCOUT nGeniusONE before 6.4.0 b2350 allows Arbitrary File Creation by authenticated users. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-26T01:52:35.000000Z"}, {"uuid": "12299b6b-c88b-4d85-9d67-18d690dde010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32974", "type": "seen", "source": "https://t.me/cvedetector/24116", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32974 - XWiki Cross-Site Scripting (XSS) and Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32974 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : XWiki is a generic wiki platform. In versions starting from 15.9-rc-1 to before 15.10.8 and from 16.0.0-rc-1 to before 16.2.0, the required rights analysis doesn't consider TextAreas with default content type. When editing a page, XWiki warns since version 15.9 when there is content on the page like a script macro that would gain more rights due to the editing. This analysis doesn't consider certain kinds of properties, allowing a user to put malicious scripts in there that will be executed after a user with script, admin, or programming rights edited the page. Such a malicious script could impact the confidentiality, integrity and availability of the whole XWiki installation. This issue has been patched in versions 15.10.8 and 16.2.0. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:16.000000Z"}, {"uuid": "b53b8adb-5369-487f-9f39-cbe84d4baa0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32973", "type": "seen", "source": "https://t.me/cvedetector/24115", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32973 - XWiki Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32973 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : XWiki is a generic wiki platform. In versions starting from 15.9-rc-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-1, when a user with programming rights edits a document in XWiki that was last edited by a user without programming rights and contains an XWiki.ComponentClass, there is no warning that this will grant programming rights to this object. An attacker who created such a malicious object could use this to gain programming rights on the wiki. For this, the attacker needs to have edit rights on at least one page to place this object and then get an admin user to edit that document. This issue has been patched in versions 15.10.12, 16.4.3, and 16.8.0-rc-1. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:15.000000Z"}, {"uuid": "3732f8e9-2743-4f9d-99af-1444356ef628", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32972", "type": "seen", "source": "https://t.me/cvedetector/24114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32972 - XWiki LESS Compiler Script Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32972 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : XWiki is a generic wiki platform. In versions starting from 6.1-milestone-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-1, the script API of the LESS compiler in XWiki is incorrectly checking for rights when calling the cache cleaning API, making it possible to clean the cache without having programming right. The only impact of this is a slowdown in XWiki execution as the caches are re-filled. As this vulnerability requires script right to exploit, and script right already allows unlimited execution of scripts, the additional impact due to this vulnerability is low. This issue has been patched in versions 15.10.12, 16.4.3, and 16.8.0-rc-1. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:15.000000Z"}, {"uuid": "1cb5c33d-2a56-46b0-aaac-904e6c4a5dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32971", "type": "seen", "source": "https://t.me/cvedetector/24113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32971 - XWiki Solr Script Service Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-32971 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : XWiki is a generic wiki platform. In versions starting from 4.5.1 to before 15.10.13, from 16.0.0-rc-1 to before 16.4.4, and from 16.5.0-rc-1 to before 16.8.0-rc-1, the Solr script service doesn't take dropped programming rights into account. The Solr script service that is accessible in XWiki's scripting API normally requires programming rights to be called. Due to using the wrong API for checking rights, it doesn't take the fact into account that programming rights might have been dropped by calling `$xcontext.dropPermissions()`. If some code relies on this for the safety of executing Velocity code with the wrong author context, this could allow a user with script rights to either cause a high load by indexing documents or to temporarily remove documents from the search index. This issue has been patched in versions 15.10.13, 16.4.4, and 16.8.0-rc-1. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:14.000000Z"}, {"uuid": "a8453f48-37b2-4448-89ff-bda9ec548d36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32970", "type": "seen", "source": "https://t.me/cvedetector/24112", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32970 - XWiki Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32970 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : XWiki is a generic wiki platform. In versions starting from 13.5-rc-1 to before 15.10.13, from 16.0.0-rc-1 to before 16.4.4, and from 16.5.0-rc-1 to before 16.8.0, an open redirect vulnerability in the HTML conversion request filter allows attackers to construct URLs on an XWiki instance that redirects to any URL. This issue has been patched in versions 15.10.13, 16.4.4, and 16.8.0. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:10.000000Z"}, {"uuid": "079c8fbc-1e39-4a73-a467-07647459e3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32973", "type": "seen", "source": "Telegram/Gwvh-n-ygZ7AZvt4Z14lI64V1AihU4WxZxoYYl7z1l7jTPI", "content": "", "creation_timestamp": "2025-04-30T17:32:01.000000Z"}, {"uuid": "e79507bd-8dae-4916-baa3-c491002a73e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32974", "type": "seen", "source": "Telegram/Gwvh-n-ygZ7AZvt4Z14lI64V1AihU4WxZxoYYl7z1l7jTPI", "content": "", "creation_timestamp": "2025-04-30T17:32:01.000000Z"}]}