{"vulnerability": "CVE-2025-3651", "sightings": [{"uuid": "f0bd8bf3-dac9-424d-8475-b059d987e427", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36512", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lumq4uylav2x", "content": "", "creation_timestamp": "2025-07-23T09:42:09.099654Z"}, {"uuid": "91f148e1-6b34-44ec-9fe4-6dc5cb9025f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36519", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsdgoveqnr2a", "content": "", "creation_timestamp": "2025-06-24T06:08:54.468444Z"}, {"uuid": "267a81ce-adce-4330-b3d4-5ff9f1eeed2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36513", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqwioqvnlc2e", "content": "", "creation_timestamp": "2025-06-06T09:14:49.038927Z"}, {"uuid": "f2ad00b0-872a-4ba2-9b29-fa3c3bdfe790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36512", "type": "seen", "source": "https://infosec.place/objects/6985761d-6e65-4e48-872e-512a64d4b2ff", "content": "", "creation_timestamp": "2025-07-22T15:30:22.800513Z"}, {"uuid": "e0260823-cc13-460c-b518-9d3dd4e22c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36512", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lul2tjmeh32i", "content": "", "creation_timestamp": "2025-07-22T17:48:26.252503Z"}, {"uuid": "683dacdb-5afa-46bf-abf2-5350e4815a51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36519", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19315", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-36519\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Unrestricted upload of file with dangerous type issue exists in WRC-2533GST2 and WRC-1167GST2. If a specially crafted file is uploaded by a remote authenticated attacker, arbitrary code may be executed on the product.\n\ud83d\udccf Published: 2025-06-24T04:36:57.179Z\n\ud83d\udccf Modified: 2025-06-24T04:36:57.179Z\n\ud83d\udd17 References:\n1. https://www.elecom.co.jp/news/security/20250624-01/\n2. https://jvn.jp/en/jp/JVN39435597/", "creation_timestamp": "2025-06-24T05:49:06.000000Z"}, {"uuid": "4fc50f3c-59ea-4f76-9a7e-859c31556de5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3651", "type": "seen", "source": "https://t.me/cvedetector/23234", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3651 - \"Apple Work Desktop for Mac Command Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-3651 \nPublished : April 17, 2025, 3:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : Improper Verification of Source of a Communication Channel in Work Desktop for Mac versions below 10.8.2.33 allows attackers to execute arbitrary commands via unauthorized access to the Agent service. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T18:49:48.000000Z"}]}