{"vulnerability": "CVE-2025-3599", "sightings": [{"uuid": "d80c31fc-80cc-45cb-86c9-4409635689a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35996", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-121-01", "content": "", "creation_timestamp": "2025-05-01T10:00:00.000000Z"}, {"uuid": "79d5f0d5-a46b-433a-9a22-d1bf28ff25b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3599", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2esvzxd424", "content": "", "creation_timestamp": "2025-04-30T18:00:37.813396Z"}, {"uuid": "23db8e67-f4e2-49fe-8f10-c35d54533882", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35996", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo55xlnnhr2t", "content": "", "creation_timestamp": "2025-05-01T20:35:58.636549Z"}, {"uuid": "4e562477-540f-45f0-93e6-6904e337476b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35996", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3lssy4b6g2mb2", "content": "", "creation_timestamp": "2025-06-30T10:30:58.132784Z"}, {"uuid": "74c07f83-0a31-40ba-ab11-979bee5a214c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35995", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lomkcyqinak2", "content": "", "creation_timestamp": "2025-05-07T23:30:26.685370Z"}, {"uuid": "0a3ce8a7-1b15-4c76-9cbf-6b8c0791b37e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35995", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lomnomqszo2o", "content": "", "creation_timestamp": "2025-05-08T00:27:12.792440Z"}, {"uuid": "828712a8-da6b-4d6f-9347-9369d24317cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35996", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114771847976520425", "content": "", "creation_timestamp": "2025-06-30T10:30:19.203160Z"}, {"uuid": "cee4fb01-9fac-4013-91b7-74e054961d8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3599", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14090", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3599\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Symantec Endpoint Protection Windows Agent, running an ERASER Engine prior to 119.1.7.8, may be susceptible to an Elevation of Privilege vulnerability, which may allow an attacker to delete resources that are normally protected from an application or user.\n\ud83d\udccf Published: 2025-04-30T16:49:18.064Z\n\ud83d\udccf Modified: 2025-04-30T16:49:18.064Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25659", "creation_timestamp": "2025-04-30T17:13:05.000000Z"}, {"uuid": "3b5a29aa-d17b-49b0-801a-d21a733bc323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35998", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3meji7jhvne2g", "content": "", "creation_timestamp": "2026-02-10T17:25:36.311184Z"}, {"uuid": "d8745b0d-8ef0-45ad-afba-6028b4a385a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35996", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14473", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-35996\n\ud83d\udd25 CVSS Score: 9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: KUNBUS PiCtory version 2.11.1 and earlier are vulnerable when an authenticated remote attacker crafts a special filename that can be stored by API endpoints. That filename is later transmitted to the client in order to show a list of configuration files. Due to a missing escape or sanitization, the filename could be executed as HTML script tag resulting in a cross-site-scripting attack.\n\ud83d\udccf Published: 2025-05-01T18:42:50.035Z\n\ud83d\udccf Modified: 2025-05-02T13:01:19.096Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-121-01\n2. http://packages.revolutionpi.de/pool/main/p/pictory/", "creation_timestamp": "2025-05-02T13:15:43.000000Z"}, {"uuid": "978f8d26-ecc6-48c1-9d85-2c6977d82c20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3599", "type": "seen", "source": "https://t.me/cvedetector/24129", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3599 - Symantec Endpoint Protection ERASER Engine Elevation of Privilege Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3599 \nPublished : April 30, 2025, 5:15 p.m. | 37\u00a0minutes ago \nDescription : Symantec Endpoint Protection Windows Agent, running an ERASER Engine prior to 119.1.7.8, may be susceptible to an Elevation of Privilege vulnerability, which may allow an attacker to delete resources that are normally protected from an application or user. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T20:25:46.000000Z"}, {"uuid": "c2207f53-06bd-41b5-ab6f-808a62a7c199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35995", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15444", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-35995\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: When a BIG-IP PEM system is licensed with URL categorization, and the URL categorization policy or an iRule with the urlcat\u00a0command is enabled on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\ud83d\udccf Published: 2025-05-07T22:04:10.575Z\n\ud83d\udccf Modified: 2025-05-07T22:04:10.575Z\n\ud83d\udd17 References:\n1. https://my.f5.com/manage/s/article/K000149952", "creation_timestamp": "2025-05-07T22:23:01.000000Z"}, {"uuid": "25ee1e7c-5e97-4a24-8367-e95009998405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35996", "type": "seen", "source": "https://t.me/cvedetector/24277", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-35996 - KUNBUS PiCtory Stored Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-35996 \nPublished : May 1, 2025, 7:15 p.m. | 1\u00a0hour, 20\u00a0minutes ago \nDescription : KUNBUS PiCtory version 2.11.1 and earlier are vulnerable when an authenticated remote attacker crafts a special filename that can be stored by API endpoints. That filename is later transmitted to the client in order to show a list of configuration files. Due to a missing escape or sanitization, the filename could be executed as HTML script tag resulting in a cross-site-scripting attack. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T23:12:46.000000Z"}, {"uuid": "50136d5d-3280-481d-95da-fcff7956a225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35996", "type": "published-proof-of-concept", "source": "Telegram/0EwG4WR3r_yD8YYpC8nymf37rvRJ9lNf57cFzRcn8wtN8JQ", "content": "", "creation_timestamp": "2025-05-01T22:01:57.000000Z"}, {"uuid": "5a36fc6e-84a0-446f-9aaf-108b8888eb84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35995", "type": "seen", "source": "https://t.me/cvedetector/24775", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-35995 - BIG-IP PEM Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-35995 \nPublished : May 7, 2025, 10:15 p.m. | 29\u00a0minutes ago \nDescription : When a BIG-IP PEM system is licensed with URL categorization, and the URL categorization policy or an iRule with the urlcat\u00a0command is enabled on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T00:52:51.000000Z"}]}