{"vulnerability": "CVE-2025-3935", "sightings": [{"uuid": "c2cad28c-d1f9-44cd-87b8-9d17c45fb625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/teemutiainen.bsky.social/post/3lqmxkllegt2f", "content": "", "creation_timestamp": "2025-06-02T14:14:18.555956Z"}, {"uuid": "178b7219-2227-4669-ace0-d1bc471cbdad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lr2eozc3j222", "content": "", "creation_timestamp": "2025-06-07T22:14:06.738063Z"}, {"uuid": "7b955428-5ca2-4755-a7d8-b428156c0f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lr2gwuh7e222", "content": "", "creation_timestamp": "2025-06-07T22:54:17.575571Z"}, {"uuid": "2d9b45d2-502e-4e03-87d2-e25610fe1d0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lqqqlu6mid2s", "content": "", "creation_timestamp": "2025-06-04T02:20:23.438203Z"}, {"uuid": "c5836abc-db66-48f2-919a-bbc4c30a174f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lqnpf52wqc2y", "content": "", "creation_timestamp": "2025-06-02T21:20:45.501284Z"}, {"uuid": "ecc055f7-4f37-4421-9211-d0a3fb2b5dd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lquo7gpxod2f", "content": "", "creation_timestamp": "2025-06-05T15:48:18.696221Z"}, {"uuid": "6b0c6320-7000-4a7d-8c2b-7c6f8dc3934e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lqgojs324f2w", "content": "", "creation_timestamp": "2025-05-31T02:16:49.329166Z"}, {"uuid": "df4be531-c8b2-42d4-aef4-13d5a04c9f19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39355", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpkgzycd3t24", "content": "", "creation_timestamp": "2025-05-19T20:48:11.144329Z"}, {"uuid": "a4aa7924-1113-4fa7-a813-cecdcdee53a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39356", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpkgzynq4d2h", "content": "", "creation_timestamp": "2025-05-19T20:48:12.848029Z"}, {"uuid": "7f78bf13-d080-4be5-b005-dbe4b48e18a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39354", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpkgzyqyt324", "content": "", "creation_timestamp": "2025-05-19T20:48:13.461579Z"}, {"uuid": "0a61b360-2657-416e-a1b4-623b07a06e23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/robwright22.bsky.social/post/3lqfvfmstqc2k", "content": "", "creation_timestamp": "2025-05-30T18:47:09.102757Z"}, {"uuid": "69031327-9465-47aa-87a9-db115dca5627", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4135366", "content": "", "creation_timestamp": "2025-06-02T17:59:20.013237Z"}, {"uuid": "929f74d8-f35c-4eed-a6d8-3cf0b932abc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lqoa53q2yt2a", "content": "", "creation_timestamp": "2025-06-03T02:20:28.666253Z"}, {"uuid": "6bc51376-14b5-4798-bf2b-f7dc9483863c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39352", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpkgzzbsrv2h", "content": "", "creation_timestamp": "2025-05-19T20:48:16.540773Z"}, {"uuid": "5a907ab2-8479-4ae2-ba85-ee4da18d7800", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-3935", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lqs6sfl2gp2v", "content": "", "creation_timestamp": "2025-06-04T16:07:15.504091Z"}, {"uuid": "7a4ebbfa-72be-44f8-8d95-7dccc658b24d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/finnjohn3344.bsky.social/post/3lrg2q5lnb22t", "content": "", "creation_timestamp": "2025-06-12T13:47:44.431321Z"}, {"uuid": "7b61129d-a5a6-43a7-8405-52ecb9647588", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39357", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpkgzzphjk2p", "content": "", "creation_timestamp": "2025-05-19T20:48:18.832738Z"}, {"uuid": "53db55d1-bc4c-4c51-b88a-18dbff8b20fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39350", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpkgzzzghr2l", "content": "", "creation_timestamp": "2025-05-19T20:48:20.501467Z"}, {"uuid": "a36a45f3-af56-41db-b21a-f5c406329572", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114400087294337009", "content": "", "creation_timestamp": "2025-04-25T18:46:41.332845Z"}, {"uuid": "d7c28a6a-7b26-4939-8159-abd9651a035f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lqj7m3wi7j2s", "content": "", "creation_timestamp": "2025-06-01T02:27:39.776699Z"}, {"uuid": "99f44ffd-3793-41b7-bc52-3115886b07d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114400803654576220", "content": "", "creation_timestamp": "2025-04-25T21:48:55.427230Z"}, {"uuid": "1ff4562f-4663-4e83-9064-f55cfc0b0e3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnoaxytxzi2s", "content": "", "creation_timestamp": "2025-04-25T22:19:56.822976Z"}, {"uuid": "b7c3fcd8-0eae-4590-b4a4-9b6ce80e84a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lnouk2v6as2w", "content": "", "creation_timestamp": "2025-04-26T04:10:03.840377Z"}, {"uuid": "0043624f-d245-4ef4-b44c-cfd6667c4407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-3935", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqs6px7yzw62", "content": "", "creation_timestamp": "2025-06-04T16:06:15.282440Z"}, {"uuid": "d92131d9-d099-40c1-9df2-1c4652ccc122", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-3935", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqs6sbkqkeg2", "content": "", "creation_timestamp": "2025-06-04T16:07:14.387781Z"}, {"uuid": "d4718698-63e2-4d03-b28b-c900277057f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/114604529984809125", "content": "", "creation_timestamp": "2025-05-31T21:19:12.749707Z"}, {"uuid": "8cf2fdd2-e2ac-434e-8c98-c28cbfa19eb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lqtazbx3dj2r", "content": "", "creation_timestamp": "2025-06-05T02:19:33.580420Z"}, {"uuid": "aa243043-c729-4122-8ac8-b9015f7a32b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqefiuc7iz2b", "content": "", "creation_timestamp": "2025-05-30T04:29:54.999504Z"}, {"uuid": "ca65b914-b41b-4502-8272-ba81de8224d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqefl4c4mc25", "content": "", "creation_timestamp": "2025-05-30T04:31:10.348956Z"}, {"uuid": "0b22a16a-611d-4e14-af5c-cac4dc4de93c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lqdgssbysh2s", "content": "", "creation_timestamp": "2025-05-29T19:20:42.829217Z"}, {"uuid": "bf39e6cd-5c3f-4acc-bed3-f78085819263", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqekryj2np25", "content": "", "creation_timestamp": "2025-05-30T06:04:29.942660Z"}, {"uuid": "942dc527-f15e-436c-b666-70a01309bec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqefgobnz42o", "content": "", "creation_timestamp": "2025-05-30T04:28:41.424658Z"}, {"uuid": "c64d9763-4505-4ee7-9fdc-18e36b9056a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqekzg5ne72v", "content": "", "creation_timestamp": "2025-05-30T06:08:39.075922Z"}, {"uuid": "a7303277-22a3-450b-b4d1-f642ba9f52ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqel7qilv72b", "content": "", "creation_timestamp": "2025-05-30T06:12:11.165040Z"}, {"uuid": "0756324d-46db-4b8f-918c-6470376ee57e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqekvkzzhj2d", "content": "", "creation_timestamp": "2025-05-30T06:06:30.104684Z"}, {"uuid": "89042e44-3bbf-41cf-8fb1-2abf57a41cce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqelcfijnx25", "content": "", "creation_timestamp": "2025-05-30T06:13:40.435347Z"}, {"uuid": "20c4ae6d-71da-47c2-a46d-391212d6d2f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/shadowserver.bsky.social/post/3lonq2c365s2m", "content": "", "creation_timestamp": "2025-05-08T10:42:15.871212Z"}, {"uuid": "a06e8aee-33a6-4591-87c3-42c250051073", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/shadowserver.bsky.social/post/3lonq2fbz6c2m", "content": "", "creation_timestamp": "2025-05-08T10:42:16.877423Z"}, {"uuid": "d9cb2e7a-1301-46a5-aad4-129ec8e2a23b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-3935", "type": "seen", "source": "https://infosec.exchange/users/shadowserver/statuses/114471798194613527", "content": "", "creation_timestamp": "2025-05-08T10:43:43.745531Z"}, {"uuid": "1691a174-d380-4c83-9b63-3e7b953ed5fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lqlpry5frg2u", "content": "", "creation_timestamp": "2025-06-02T02:22:36.353599Z"}, {"uuid": "e2046e72-1ed5-458f-bcca-25da36cf81f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqf6rc3itx2d", "content": "", "creation_timestamp": "2025-05-30T12:02:01.534613Z"}, {"uuid": "6239bac0-a258-461e-9419-86cb37ac5eed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqf6tvfsvj2b", "content": "", "creation_timestamp": "2025-05-30T12:03:28.473613Z"}, {"uuid": "fad1c740-d8f3-4682-a1c6-4df2065e7ef0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "aa79e035-cff7-4485-bb92-f9cc559518ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqf6wierjn25", "content": "", "creation_timestamp": "2025-05-30T12:04:55.644374Z"}, {"uuid": "629143f1-c2f4-4c07-9271-8f7440b38aac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqf6yzukrw2o", "content": "", "creation_timestamp": "2025-05-30T12:06:21.136368Z"}, {"uuid": "07bac33b-6161-4bbb-9168-b998be44c15e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqf73otf5d2h", "content": "", "creation_timestamp": "2025-05-30T12:07:50.090354Z"}, {"uuid": "c7baca3c-1100-47d0-a1d2-86db648d59b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqf7dgahqb2b", "content": "", "creation_timestamp": "2025-05-30T12:12:09.663070Z"}, {"uuid": "88309e05-34b7-4206-80b2-9ff1cd016bbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqf7fo7md224", "content": "", "creation_timestamp": "2025-05-30T12:13:25.342691Z"}, {"uuid": "bd60afaa-7cf8-4b65-b1d5-c89c16813270", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqf7lejmva25", "content": "", "creation_timestamp": "2025-05-30T12:16:36.652922Z"}, {"uuid": "005f7d6b-13ab-43a9-b89c-6b84ff6532fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqf7otj6vf2v", "content": "", "creation_timestamp": "2025-05-30T12:18:32.795757Z"}, {"uuid": "8e5cb919-ac42-4f74-ae13-9a25a236b509", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lqq6sx6tfd24", "content": "", "creation_timestamp": "2025-06-03T21:02:19.249900Z"}, {"uuid": "d697b989-8700-4e2c-ab5b-0bdf982ba7d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lqf7r2lp4u2e", "content": "", "creation_timestamp": "2025-05-30T12:19:47.030387Z"}, {"uuid": "d72d39e3-bc3e-421f-9fa0-e9389e9f18fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lqfa3kwviq2q", "content": "", "creation_timestamp": "2025-05-30T12:25:39.784720Z"}, {"uuid": "c83a09ea-34e7-4c5b-b8a0-5447ec1d9f56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:18.000000Z"}, {"uuid": "0835acbe-16af-4e10-abfd-50aff1c62088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-3935", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9e9e1dad-6765-40a9-a72e-d33c215eeac1", "content": "", "creation_timestamp": "2026-02-02T12:25:59.938176Z"}, {"uuid": "baba1491-db79-48fd-ad52-1de54c97a1f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39355", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16944", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-39355\n\ud83d\udd25 CVSS Score: 8.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in roninwp FAT Services Booking allows SQL Injection.This issue affects FAT Services Booking: from n/a through 5.6.\n\ud83d\udccf Published: 2025-05-19T19:46:07.807Z\n\ud83d\udccf Modified: 2025-05-19T19:46:07.807Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/fat-services-booking/vulnerability/wordpress-fat-services-booking-plugin-5-6-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-19T20:39:53.000000Z"}, {"uuid": "9ff6701c-e323-4fc4-9767-0ed11a339b07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13499", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3935\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.\u00a0\nIt is important to note that to obtain these machine keys, privileged system level access must be obtained. \n\n\n\nIf these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.\u00a0\n\n\n\nThe risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.\u00a0 This had no direct impact to ScreenConnect Client.\u00a0ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.\n\ud83d\udccf Published: 2025-04-25T18:27:44.244Z\n\ud83d\udccf Modified: 2025-04-25T18:55:55.791Z\n\ud83d\udd17 References:\n1. https://www.connectwise.com/company/trust/security-bulletins/screenconnect-security-patch-2025.4\n2. https://www.connectwise.com/company/trust/advisories", "creation_timestamp": "2025-04-25T19:07:18.000000Z"}, {"uuid": "2671d19c-61c1-4de5-8dfd-82b7f0442030", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39354", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16943", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-39354\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Conference allows Object Injection.This issue affects Grand Conference: from n/a through 5.2.\n\ud83d\udccf Published: 2025-05-19T19:48:09.530Z\n\ud83d\udccf Modified: 2025-05-19T19:48:09.530Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/grandconference/vulnerability/wordpress-grand-conference-theme-5-2-php-object-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-19T20:39:52.000000Z"}, {"uuid": "8d776b0a-12a9-4084-a5ee-0ec646d669e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39352", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16942", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-39352\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)\n\ud83d\udd39 Description: Missing Authorization vulnerability in ThemeGoods Grand Restaurant WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Grand Restaurant WordPress: from n/a through 7.0.\n\ud83d\udccf Published: 2025-05-19T19:49:17.818Z\n\ud83d\udccf Modified: 2025-05-19T19:49:17.818Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/theme/grandrestaurant/vulnerability/wordpress-grand-restaurant-wordpress-theme-7-0-arbitrary-options-deletion-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-19T20:39:52.000000Z"}, {"uuid": "29b74d5d-968c-4db2-9069-59a0f88e8cd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39350", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16941", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-39350\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)\n\ud83d\udd39 Description: Missing Authorization vulnerability in Rocket Apps wProject.This issue affects wProject: from n/a before 5.8.0.\n\ud83d\udccf Published: 2025-05-19T19:50:15.064Z\n\ud83d\udccf Modified: 2025-05-19T19:50:15.064Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/theme/wproject/vulnerability/wordpress-wproject-theme-5-8-0-unauthenticated-post-comment-attachment-modification-deletion-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-19T20:39:51.000000Z"}, {"uuid": "8b3b6202-957a-49fd-82fb-a036bef77818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39358", "type": "seen", "source": "Telegram/i7_ycyjcFtJ3ktfeH_7GOJEagrL0owek2QcrSXVF3atIap0", "content": "", "creation_timestamp": "2025-06-06T13:03:17.000000Z"}, {"uuid": "19e045fa-888b-4b18-a9e5-74c8ba337eca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://t.me/TheDarkWebInformer/17719", "content": "\ud83d\udea8CVE-2025-3935: ConnectWise ScreenConnect Vulnerability FOFA query\n\nFOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJTY3JlZW5Db25uZWN0LVJlbW90ZS1TdXBwb3J0LVNvZnR3YXJlIg%3D%3D\n\nFOFA Query: app=\"ScreenConnect-Remote-Support-Software\"\n\n445,409 results", "creation_timestamp": "2025-05-31T13:33:36.000000Z"}, {"uuid": "19a2c335-dfbc-419e-9b7e-d69d537e098b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "exploited", "source": "https://t.me/thehackernews/6917", "content": "\ud83d\udea8 ConnectWise confirms a targeted cyberattack on its environment\u2014likely tied to a nation-state actor.\n\nJust weeks after patching CVE-2025-3935, suspicious activity hit a small group of customers.\n\nStay ALERT | Read details: https://thehackernews.com/2025/05/connectwise-hit-by-cyberattack-nation.html", "creation_timestamp": "2025-05-30T08:26:06.000000Z"}, {"uuid": "3912f371-c641-4179-a26d-0b790c3e9ea3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "Telegram/PzhLRNSLKM4xUIMARHS8HCxc2IRdGexvTkXSfiZe3Y9-xhAL", "content": "", "creation_timestamp": "2025-06-08T22:32:15.000000Z"}, {"uuid": "eeabe1f5-2dd7-41d3-82d1-f3a988cb03de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "https://t.me/cvedetector/23781", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3935 - ScreenConnect ASP.NET ViewState Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3935 \nPublished : April 25, 2025, 7:15 p.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.\u00a0  \nIt is important to note that to obtain these machine keys, privileged system level access must be obtained.   \n  \n  \n  \nIf these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.\u00a0  \n  \n  \n  \nThe risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.\u00a0 This had no direct impact to ScreenConnect Client.\u00a0ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-25T23:22:01.000000Z"}, {"uuid": "ac768687-3184-436b-bd44-13b78b8ed21b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "exploited", "source": "https://t.me/true_secator/7089", "content": "\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f-\u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a \u041f\u041e \u0438\u0437 \u0424\u043b\u043e\u0440\u0438\u0434\u044b ConnectWise \u0441\u0442\u0430\u043b\u0430 \u0436\u0435\u0440\u0442\u0432\u043e\u0439 APT-\u0430\u0442\u0430\u043a\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b\u0430 \u0441\u0440\u0435\u0434\u0443 \u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 ScreenConnect.\n\nConnectWise \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043f\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044e \u0418\u0422, \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0443, \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0445 \u0443\u0441\u043b\u0443\u0433 (MSP) \u0438 \u0418\u0422-\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440.\n\n\u041e\u0434\u043d\u0438\u043c \u0438\u0437 \u0435\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f ScreenConnect - \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0439 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u043c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0430\u0442\u044c\u0441\u044f \u043a \u043a\u043b\u0438\u0435\u043d\u0442\u0441\u043a\u0438\u043c \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043d\u0435\u043f\u043e\u043b\u0430\u0434\u043e\u043a, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0438 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u041a \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044e \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u043b\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432 Mandiant \u0438 \u0441\u0438\u043b\u043e\u0432\u043e\u0439 \u0431\u043b\u043e\u043a.\n\n\u041f\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u044f\u043c, \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u043b\u043e \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u0435 2024 \u0433\u043e\u0434\u0430, \u0430 ConnectWise \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043f\u043e\u0434\u043e\u0437\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0442\u043e\u043b\u044c\u043a\u043e \u0432 \u043c\u0430\u0435 2025 \u0433\u043e\u0434\u0430, \u0430 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430 \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u043b\u0438 \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0435 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u044b ScreenConnect.\n\n\u041f\u043e\u0437\u0436\u0435 \u0414\u0436\u0435\u0439\u0441\u043e\u043d \u0421\u043b\u044d\u0433\u043b, \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c CNWR, \u0437\u0430\u044f\u0432\u0438\u043b, \u0447\u0442\u043e \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u043b\u043e \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0447\u0438\u0441\u043b\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432, \u0447\u0442\u043e \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043d\u0430 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u0443\u044e \u0446\u0435\u043b\u0435\u0432\u0443\u044e \u0430\u0442\u0430\u043a\u0443 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439.\n\n\u041d\u0430 Reddit \u043a\u043b\u0438\u0435\u043d\u0442\u044b \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0435\u0439, \u0437\u0430\u044f\u0432\u043b\u044f\u044f \u043e \u0442\u043e\u043c, \u0447\u0442\u043e \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0441\u0432\u044f\u0437\u0430\u043d \u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e ScreenConnect, \u043e\u0442\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u043a\u0430\u043a CVE-2025-3935, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 24 \u0430\u043f\u0440\u0435\u043b\u044f.\n\nCVE-2025-3935 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 ViewState, \u0432\u044b\u0437\u0432\u0430\u043d\u043d\u0443\u044e \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 ASP.NET ViewState \u0432 ScreenConnect \u0432\u0435\u0440\u0441\u0438\u0438 25.2.3 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e\u043c \u0443\u0440\u043e\u0432\u043d\u0435 \u043c\u043e\u0436\u0435\u0442 \u043a\u0440\u0430\u0441\u0442\u044c \u0441\u0435\u043a\u0440\u0435\u0442\u043d\u044b\u0435 \u043c\u0430\u0448\u0438\u043d\u043d\u044b\u0435 \u043a\u043b\u044e\u0447\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c ScreenConnect, \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0438\u0445 \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0445 \u043d\u0430\u0433\u0440\u0443\u0437\u043e\u043a, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u044e\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435.\n\nConnectWise \u043d\u0435 \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u043b\u0430 \u043d\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0438\u043c\u0435\u043d\u043d\u043e\u0439 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0434\u043d\u0430\u043a\u043e \u043f\u0440\u0438\u0441\u0432\u043e\u0438\u043b\u0430 \u0435\u0439 \u00ab\u0432\u044b\u0441\u043e\u043a\u0438\u0439\u00bb \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442, \u0447\u0442\u043e \u0441\u0432\u0438\u0434\u0435\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0443\u0435\u0442 \u043e \u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438, \u043b\u0438\u0431\u043e \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0440\u0438\u0441\u043a\u0430\u0445 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u043d\u0430 \u0435\u0435 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u0445 ScreenConnect \u043f\u043e \u0430\u0434\u0440\u0435\u0441\u0430\u043c \u00abscreenconnect.com\u00bb \u0438 \u00abhostedrmm.com\u00bb \u0434\u043e \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u043e\u043d\u0430 \u0431\u044b\u043b\u0430 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u043c.\n\n\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u043d\u044b\u0435 \u0432 \u043e\u0431\u043b\u0430\u043a\u0435 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u044b ScreenConnect, \u0432\u043f\u043e\u043b\u043d\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u0432\u0437\u043b\u043e\u043c\u0430\u043b\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b ConnectWise \u0438 \u043f\u043e\u0445\u0438\u0442\u0438\u043b\u0438 \u043a\u043b\u044e\u0447\u0438 \u043c\u0430\u0448\u0438\u043d\u044b.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0438\u0445, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441\u043c\u043e\u0433\u043b\u0438 \u0431\u044b \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 ScreenConnect \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0440\u0435\u0434\u0430\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432.\n\n\u041e\u0434\u043d\u0430\u043a\u043e ConnectWise \u043d\u0435 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0430, \u0431\u044b\u043b\u0438 \u043b\u0438 \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u044b \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u044b \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0438\u043c\u0435\u043d\u043d\u043e \u0442\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c.\n\n\u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0434\u0430\u0436\u0435 \u043d\u0435 \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0430\u0441\u044c IOC \u0438 \u043b\u044e\u0431\u043e\u0439 \u0434\u0440\u0443\u0433\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0435\u0439 \u043e \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0435\u0434\u0448\u0435\u043c.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u0432 \u043f\u0440\u043e\u0448\u043b\u044b\u0439 \u0440\u0430\u0437 \u0433\u043e\u0434\u043e\u043c \u0440\u0430\u043d\u0435\u0435 \u0434\u0440\u0443\u0433\u0430\u044f CVE-2024-1709 \u0432 ScreenConnect \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0431\u0430\u043d\u0434\u0430\u043c\u0438 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439\u00a0\u0438\u00a0\u0441\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u043e\u0439 APT \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e.\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0431\u0443\u0434\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c \u0437\u0430 \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435\u043c \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u0438.", "creation_timestamp": "2025-05-30T17:40:05.000000Z"}, {"uuid": "499b22ce-9d0f-4096-a47e-d893e6008659", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3935", "type": "seen", "source": "Telegram/Ezw1ONBU2CtiO3E5BNctwsqB09u_hPyxqcCRo5DefAKZfW4", "content": "", "creation_timestamp": "2025-04-25T21:30:14.000000Z"}]}