{"vulnerability": "CVE-2025-41244", "sightings": [{"uuid": "8dae690a-39cf-4042-9114-416c560b948f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/PostgreSQL.activitypub.awakari.com.ap.brid.gy/post/3m27aflm3ank2", "content": "", "creation_timestamp": "2025-10-02T09:27:24.220538Z"}, {"uuid": "6d0c7188-3c0d-48a3-b2eb-469447ac7d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3m4j3hd3xfj2a", "content": "", "creation_timestamp": "2025-10-31T18:15:44.073281Z"}, {"uuid": "10504ff2-c4dd-43c1-bb33-2017287c8d9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3m27lnffr2c2m", "content": "", "creation_timestamp": "2025-10-02T12:48:28.196785Z"}, {"uuid": "e810baeb-21f4-49df-8c50-f53d844447f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-41244", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/115470143307389370", "content": "", "creation_timestamp": "2025-10-31T18:16:16.804470Z"}, {"uuid": "f629019d-6b76-4e88-844c-3580c7f632bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m4jerns2zi2e", "content": "", "creation_timestamp": "2025-10-31T21:02:51.183528Z"}, {"uuid": "beb35e49-9757-4c6d-b932-7ff760eb8735", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;utm_source=rss&amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "2a83fb1c-b28d-41cd-8ba7-31cbc2602086", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3m4krdodjg22v", "content": "", "creation_timestamp": "2025-11-01T10:20:04.219223Z"}, {"uuid": "f26d08fa-8b0c-47cd-92b6-1e312e43f99e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m2ahaqa2hc2i", "content": "", "creation_timestamp": "2025-10-02T21:02:31.164450Z"}, {"uuid": "3bc9adba-5a9d-4549-88da-fc57b1ef2000", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/180vault.bsky.social/post/3m5fdignhrc2d", "content": "", "creation_timestamp": "2025-11-11T23:54:17.676566Z"}, {"uuid": "9a10cc79-0996-4ef8-af32-c433478f253c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;utm_source=rss&amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "f6808bdd-6cab-4ae6-b284-efdad77141ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/mbissey.bsky.social/post/3m2c52bnfn72c", "content": "", "creation_timestamp": "2025-10-03T13:05:12.749008Z"}, {"uuid": "45e8940b-ea64-4d79-8fba-b5f72f0bd185", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://infosec.exchange/users/harrysintonen/statuses/115310556839722676", "content": "", "creation_timestamp": "2025-10-03T13:51:04.679700Z"}, {"uuid": "5ef26245-c449-4fee-ba43-386f76d51cd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3m4lbuxik5527", "content": "", "creation_timestamp": "2025-11-01T15:16:04.326163Z"}, {"uuid": "e55713da-23d7-41f1-884a-73135267b7e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/5017177", "content": "", "creation_timestamp": "2025-10-30T19:33:11.040201Z"}, {"uuid": "9f9939ee-4a2a-4669-97a0-bddefd1e10f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-41244", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-3cf07d5d-2ed66cf466a5d29a", "content": "", "creation_timestamp": "2025-10-03T15:01:14.712390Z"}, {"uuid": "4e1798aa-8470-4e18-ae6a-9b6661677eff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;utm_source=rss&amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "f1576f13-f040-441b-b753-b5d84c9f5231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;utm_source=rss&amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "1965e4bd-d6f2-4614-aaba-4f94eab1a693", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/vmware-security-advisory-av25-629", "content": "", "creation_timestamp": "2025-10-30T18:05:03.000000Z"}, {"uuid": "f93388a9-2dc7-46aa-97d7-845a51b75f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3m4gqwkjvzm23", "content": "", "creation_timestamp": "2025-10-30T20:02:04.505312Z"}, {"uuid": "79e2734b-e5fe-493d-9515-c1a2c6604595", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3m2r55t33wf2z", "content": "", "creation_timestamp": "2025-10-09T12:17:07.452133Z"}, {"uuid": "99f6058f-78a2-44bb-b701-45399e30f15d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/115464907783020839", "content": "", "creation_timestamp": "2025-10-30T20:04:32.528358Z"}, {"uuid": "82612ba3-c5ac-4681-ae3f-85ecae2a95f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3m4gzoo6oev2n", "content": "", "creation_timestamp": "2025-10-30T22:38:43.728914Z"}, {"uuid": "a4222c69-37ae-425d-a8f8-19a04455e4e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "3bf8dda0-414b-40b0-b330-b815ae3fa28a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-10-30T18:10:03.000000Z"}, {"uuid": "10e02635-2907-48d2-bfcd-7bc92d75c061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lzyknlcrjr2f", "content": "", "creation_timestamp": "2025-09-29T17:42:01.330886Z"}, {"uuid": "60879e09-4558-42ab-8b86-bee03082ad66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/tamosan.bsky.social/post/3m4hbfyibkc2f", "content": "", "creation_timestamp": "2025-10-31T00:57:06.420701Z"}, {"uuid": "e2a7c194-7ad6-4b60-8684-d15f425680ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "16637fa1-d588-49dd-b3dc-97cc48a5df97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q3/236", "content": "", "creation_timestamp": "2025-09-29T15:02:45.000000Z"}, {"uuid": "96aeaff0-ed9b-4bad-9371-de803ea05c82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lzyqjfxy6o2b", "content": "", "creation_timestamp": "2025-09-29T19:27:06.603115Z"}, {"uuid": "f2d1e863-8071-4855-ad2e-ecf4f5f2aab9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-10-31T03:56:05.000000Z"}, {"uuid": "c921105b-37d3-4d50-95a9-c2c95ffde46f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3m4i6w6vvpg2m", "content": "", "creation_timestamp": "2025-10-31T09:45:04.491088Z"}, {"uuid": "a2bbed0b-a612-444e-89cc-685455f0fffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "2e099db6-98ac-4dc2-a71f-c01fb6573b64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "e92402ac-b04a-4e73-ad0b-3c8344ca18bd", "vulnerability": "CVE-2025-41244", "type": "exploited", "source": "https://blog.nviso.eu/2025/09/29/you-name-it-vmware-elevates-it-cve-2025-41244/", "content": "", "creation_timestamp": "2025-10-08T06:39:51.147861Z"}, {"uuid": "cb2411db-e0a5-44b7-bf41-b3f8538cd2c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/anthroposamu.mastodon.social.ap.brid.gy/post/3m2nx7mytic22", "content": "", "creation_timestamp": "2025-10-08T05:53:26.054586Z"}, {"uuid": "89b591ef-066f-4233-8c00-895018d93555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;utm_source=rss&amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "8b790e06-c353-4ba2-a246-b0c1200f38df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;utm_source=rss&amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "a03aaa61-5b39-4fdc-828a-f268f964005f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3m22hgtft3s2g", "content": "", "creation_timestamp": "2025-09-30T11:49:54.197053Z"}, {"uuid": "39dbb950-f56c-4fb3-88b8-d665d7ab3a34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3m22sdod6h226", "content": "", "creation_timestamp": "2025-09-30T15:04:58.765806Z"}, {"uuid": "7baa1f01-5a03-460a-a023-1fb3600e1a8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3m22fzjptns2h", "content": "", "creation_timestamp": "2025-09-30T11:24:32.949519Z"}, {"uuid": "83ddd45d-f4fd-46ff-98f1-c6767980960b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://thehackernews.com/2025/10/cisa-flags-vmware-zero-day-exploited-by.html", "content": "", "creation_timestamp": "2025-10-31T06:09:00.000000Z"}, {"uuid": "d2657026-fea7-43ed-96f1-348013e6d40c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3m22sxf7gns2c", "content": "", "creation_timestamp": "2025-09-30T15:16:11.193360Z"}, {"uuid": "9c2ac777-75d3-4ef0-a75d-53ef08be7437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/zakthoreson.bsky.social/post/3m235kqi75c2h", "content": "", "creation_timestamp": "2025-09-30T18:25:49.577092Z"}, {"uuid": "b8f5d2ee-e4bb-44ef-863f-bc587ba98ba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;utm_source=rss&amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "106c4a85-0fec-4dd3-bab4-37ae7bff7c61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;utm_source=rss&amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "1c5ac38f-a0ba-41b0-9667-938fb803961a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m23gd6lzm72p", "content": "", "creation_timestamp": "2025-09-30T21:02:37.382565Z"}, {"uuid": "0b9e4295-fb49-47b0-99af-f2372832d42e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://threatintel.cc/2025/10/31/top-attacks-and-breaches.html", "content": "", "creation_timestamp": "2025-10-31T11:22:52.000000Z"}, {"uuid": "2b3aed82-ac11-4d68-91a2-6bb42cd5a02f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;utm_source=rss&amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "f3a39fdf-7eb2-4a26-8bde-8ce4e505c17c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "61aed9de-707a-484f-841f-70cac7a703c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-41244", "type": "seen", "source": "https://bsky.app/profile/raptor.infosec.exchange.ap.brid.gy/post/3m2iuqkfkscu2", "content": "", "creation_timestamp": "2025-10-06T05:25:17.316764Z"}, {"uuid": "072a3147-067f-41c7-b161-8b31f7a69d59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-41244", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3m23knrlqm62u", "content": "", "creation_timestamp": "2025-09-30T22:20:07.540663Z"}, {"uuid": "64f1bea6-736c-4ad8-9478-4e916f1008fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23ov7qisc2b", "content": "", "creation_timestamp": "2025-09-30T23:35:51.821432Z"}, {"uuid": "3fc01a84-f145-4397-a468-0fa0cf3b666c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://sploitus.com/exploit?id=0CD46310-0F91-5C94-9EDD-9733C68AF3B6&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-10-05T23:35:21.000000Z"}, {"uuid": "5492f258-e0ac-4aaa-814d-ee621a309eb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23slpqph22b", "content": "", "creation_timestamp": "2025-10-01T00:42:11.867982Z"}, {"uuid": "df6852b6-eaea-4e40-9bd0-acecf3633e7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23qvv4huc2b", "content": "", "creation_timestamp": "2025-10-01T00:12:04.936342Z"}, {"uuid": "ba6ed581-36cb-4612-8807-fe51667adc21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m24g6fak5t2f", "content": "", "creation_timestamp": "2025-10-01T06:32:36.193265Z"}, {"uuid": "6f585aa0-88e0-4267-bd5e-cab808d6004d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3m23tvqwvdu27", "content": "", "creation_timestamp": "2025-10-01T01:05:38.456695Z"}, {"uuid": "eb2579cc-84d2-4f2c-b376-3a28f09ce076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-41244", "type": "seen", "source": "https://bsky.app/profile/cyberveille-ch.bsky.social/post/3m4iywcnnvp2m", "content": "", "creation_timestamp": "2025-10-31T17:30:25.734251Z"}, {"uuid": "06084265-d07e-4403-984e-4dee878acf2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/samilaiho.com/post/3m24aneihpk2f", "content": "", "creation_timestamp": "2025-10-01T04:53:38.883552Z"}, {"uuid": "7481c3e7-e6bd-4c69-85f4-064b7fe59dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m4qvv4g7f225", "content": "", "creation_timestamp": "2025-11-03T20:57:24.218714Z"}, {"uuid": "2f5ed88b-7765-4270-82cb-c7abc7292a69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3m24qi3tghp2q", "content": "", "creation_timestamp": "2025-10-01T09:36:58.722272Z"}, {"uuid": "06e85a1b-d2a1-499e-b406-886084505854", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/it-connect.bsky.social/post/3m24vpdliq32a", "content": "", "creation_timestamp": "2025-10-01T11:10:31.090024Z"}, {"uuid": "28d553db-bb00-491d-8f6a-91bf30affc6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3m254jfauss2l", "content": "", "creation_timestamp": "2025-10-01T13:12:27.097149Z"}, {"uuid": "3ddffb5e-7531-44e6-b90f-974ecf882094", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3m24vfryc7s2a", "content": "", "creation_timestamp": "2025-10-01T11:05:10.561008Z"}, {"uuid": "cdbd0128-b133-429a-bb00-7ba5e08f89da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3m25fz6gbof2x", "content": "", "creation_timestamp": "2025-10-01T16:02:21.342039Z"}, {"uuid": "17faeb93-305a-4fce-b21c-79967a66a960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m256s4vgic2n", "content": "", "creation_timestamp": "2025-10-01T13:53:11.705835Z"}, {"uuid": "89a507c0-3eaf-4960-90b3-8b73f5749a6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3m26mp7rozc2t", "content": "", "creation_timestamp": "2025-10-02T03:34:47.320625Z"}, {"uuid": "b2634a3f-4c5d-4dd4-b726-493cc7327953", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/cesnet-certs.mastodonczech.cz.ap.brid.gy/post/3m25m3zzpccc2", "content": "", "creation_timestamp": "2025-10-01T17:51:36.772040Z"}, {"uuid": "1c79c4e9-6b0f-4af6-9737-345fb6a534da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m25tt2p5ps27", "content": "", "creation_timestamp": "2025-10-01T20:09:31.269366Z"}, {"uuid": "99623af0-b0d7-487b-bd71-22df153c5191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m4rmhag67c26", "content": "", "creation_timestamp": "2025-11-04T03:41:16.114523Z"}, {"uuid": "290ac3a2-b134-43c5-af3b-207fbe6786e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-41244", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-c39acbe0-91886c343547fcce", "content": "", "creation_timestamp": "2025-12-05T12:35:59.363930Z"}, {"uuid": "e58e9721-af56-4052-b1bd-f1b07cb13c2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "exploited", "source": "https://t.me/codeby_sec/9471", "content": "\ud83c\udde8\ud83c\uddf3 \u041a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 Zero-day \u0432 VMware!\n\n\ud83d\udcde \u0421\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u041a\u0438\u0442\u0430\u0435\u043c \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043d\u043e\u0432\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f VMware \u0441 \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2024 \u0433\u043e\u0434\u0430. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c NVISO Labs , \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0430\u044f Broadcom VMware Tools \u0438 VMware Aria Operations, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u043a\u0430\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0441 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u044b \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2024 \u0433\u043e\u0434\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c \u043f\u043e\u0434 \u0438\u043c\u0435\u043d\u0435\u043c UNC5174.\n\n\u2757\ufe0f \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-41244 \u0441 \u043e\u0446\u0435\u043d\u043a\u043e\u0439 CVSS: 7,8, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 get_version(). \u0417\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0442\u0430\u043a\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b, \u043a\u0430\u043a VMware Cloud Foundation, VMware vSphere Foundation, VMware Aria Operations, VMware Telco Cloud Platform \u0438 VMware Telco Cloud Infrastructure. \n\n\ud83d\udd0e \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c NVISO \u041c\u0430\u043a\u0441\u0438\u043c \u0422\u0438\u0431\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b \u043e \u043d\u0435\u0439 19 \u043c\u0430\u044f 2025 \u0433\u043e\u0434\u0430. \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u044f\u0432\u0438\u043b\u0430, \u0447\u0442\u043e VMware Tools 12.4.9, \u0432\u0445\u043e\u0434\u044f\u0449\u0438\u0439 \u0432 \u0441\u043e\u0441\u0442\u0430\u0432 VMware Tools 12.5.4, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u044d\u0442\u0443 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432 32-\u0440\u0430\u0437\u0440\u044f\u0434\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows, \u0430 \u0432\u0435\u0440\u0441\u0438\u044f open-vm-tools, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0430\u044f CVE-2025-41244, \u0431\u0443\u0434\u0435\u0442 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0442\u044c\u0441\u044f \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430\u043c\u0438 Linux. \n\n\ud83d\udcbb \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c NVISO, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0440\u0435\u043d\u0438\u0442\u0441\u044f \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c \u00abget_version()\u00bb, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u0448\u0430\u0431\u043b\u043e\u043d \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e\u0433\u043e \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u044f (regex) \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u043b\u044f \u043a\u0430\u0436\u0434\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u0441 \u043f\u0440\u043e\u0441\u043b\u0443\u0448\u0438\u0432\u0430\u044e\u0449\u0438\u043c \u0441\u043e\u043a\u0435\u0442\u043e\u043c, \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442, \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u043b\u0438 \u0434\u0432\u043e\u0438\u0447\u043d\u044b\u0439 \u0444\u0430\u0439\u043b, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0439 \u0441 \u044d\u0442\u0438\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c, \u0448\u0430\u0431\u043b\u043e\u043d\u0443, \u0438, \u0435\u0441\u043b\u0438 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u0435\u0442, \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u0441\u043b\u0443\u0436\u0431\u044b.\n\n\ud83d\udcbb \u041a\u0430\u043a \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442 \u044d\u043a\u0441\u043f\u0435\u0440\u0442, \u0448\u0438\u0440\u043e\u043a\u0430\u044f \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0430 \u0438\u043c\u0438\u0442\u0430\u0446\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u0434\u0432\u043e\u0438\u0447\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, httpd) \u043f\u043e\u0434\u0447\u0435\u0440\u043a\u0438\u0432\u0430\u0435\u0442 \u0440\u0435\u0430\u043b\u044c\u043d\u0443\u044e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u0440\u0443\u0433\u0438\u0445 \u0432\u0438\u0434\u043e\u0432 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043c\u043d\u043e\u0433\u0438\u0445 \u043b\u0435\u0442 \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u043e \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u043b\u0438 \u0432\u044b\u0433\u043e\u0434\u0443 \u0438\u0437 \u043d\u0435\u043f\u0440\u0435\u0434\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439\n\n\u2757\ufe0f \u0422\u0430\u043a \u0447\u0442\u043e, \u0435\u0441\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0435 \u0432 \u0441\u0432\u043e\u0438\u0445 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b VMware, \u0442\u043e \u0431\u0443\u0434\u044c\u0442\u0435 \u0432\u043d\u0438\u043c\u0430\u0442\u0435\u043b\u044c\u043d\u044b!", "creation_timestamp": "2025-10-09T15:04:13.000000Z"}, {"uuid": "6bc99e0d-330e-4c0b-9c0d-a133d8594ed7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mebea22iw22o", "content": "", "creation_timestamp": "2026-02-07T11:53:00.904119Z"}, {"uuid": "6bbc82e7-8886-4666-8e84-ec4eb025251d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3md4hxjaju22d", "content": "", "creation_timestamp": "2026-01-23T19:51:27.991168Z"}, {"uuid": "6b50e0f9-b151-4fa2-93e4-476ceb41609b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1763", "content": "", "creation_timestamp": "2026-02-13T04:00:00.000000Z"}, {"uuid": "a421d7e4-8345-4058-b04e-ba074fedfef0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-41244", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9fd4b32e-9fdc-4ef0-9be1-835efead37fb", "content": "", "creation_timestamp": "2026-02-02T12:25:47.152033Z"}, {"uuid": "e28081e0-ee7b-4f12-a71a-ce9a338d1a1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "exploited", "source": "https://t.me/notlukatsky/6864", "content": "\u041b\u043e\u0432\u0438\u0442\u0435 \u0432\u043a\u0443\u0441\u043d\u044b\u0435 \u0431\u0430\u0433\u0438 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u0439 \u043d\u0435\u0434\u0435\u043b\u0438 + PoC\n#CVE #Redis #Oracle #\u043f\u043e\u0434\u0431\u043e\u0440\u043a\u0430\n\n\u27a1\ufe0fRedis \u2014 RediShell (CVE-2025-49844, CVSS 10.0)\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 use-after-free \u0432 Lua-\u0434\u0432\u0438\u0436\u043a\u0435 Redis, \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u043e\u0432\u0430\u0432\u0448\u0438\u0439 \u0432 \u043a\u043e\u0434\u043e\u0432\u043e\u0439 \u0431\u0430\u0437\u0435 13 \u043b\u0435\u0442. \u041f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c Lua-\u0441\u043a\u0440\u0438\u043f\u0442\u044b (EVAL/EVALSHA) \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0440\u0430\u0437\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0437\u043e\u043b\u044f\u0446\u0438\u044e Lua VM \u0438 \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f RCE \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 redis-server. \u0412 \u0441\u0435\u0442\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u043f\u043e\u0440\u044f\u0434\u043a\u0430 330\u043a \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0445 \u0438\u043d\u0441\u0442\u0430\u043d\u0441\u043e\u0432 Redis, \u0438\u0437 \u043d\u0438\u0445 60\u043a \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u27a1\ufe0fVMware Aria Operations / VMware Tools (CVE-2025-41244, CVSS 7.8) \n\nLPE \u0432 \u0433\u043e\u0441\u0442\u0435\u0432\u043e\u0439 \u041e\u0421. \u041f\u0440\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u043c VMware Tools \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 Aria Operations \u0441 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c Service Discovery Management Pack (SDMP) \u043c\u043e\u0436\u043d\u043e \u0434\u0430\u0436\u0435 \u0441 \u043d\u0435\u043f\u043e\u043b\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 \u0432 \u0433\u043e\u0441\u0442\u0435\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0434\u043e root/Administrator. \u0417\u0430\u043c\u0435\u0447\u0435\u043d\u044b \u0441\u043b\u0443\u0447\u0430\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 in-the-wild.\n\n\u27a1\ufe0fOpenSSH \u2014 ProxyCommand newline injection (CVE-2025-61984, CVSS 7.8)\n\nCommand injection \u043f\u0440\u0438 \u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0438 ProxyCommand. \u0415\u0441\u043b\u0438 \u0432 \u0438\u043c\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0438/\u0438\u043b\u0438 \u0432\u043d\u0435\u0448\u043d\u0438\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u043f\u0430\u0434\u0430\u044e\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0435 \u0441\u0438\u043c\u0432\u043e\u043b\u044b, \u0438\u0442\u043e\u0433\u043e\u0432\u0430\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u0434\u043b\u044f ProxyCommand \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 shell-\u043e\u043c \u0442\u0430\u043a, \u0447\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 \u043d\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u0435. \u0422\u043e \u0435\u0441\u0442\u044c \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0441\u0430\u043d\u0438\u0442\u0438\u0437\u0430\u0446\u0438\u044f \u0438 \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0442\u043e\u043a\u0435\u043d\u043e\u0432 \u043f\u0440\u0438 \u043f\u043e\u0434\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0435 \u0432 \u0448\u0430\u0431\u043b\u043e\u043d\u044b.\n\n\u27a1\ufe0f Zimbra Collaboration \u2014 Classic Web Client XSS \u0447\u0435\u0440\u0435\u0437 .ICS (CVE-2025-27915, CVSS 6.1). \n\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u0441\u0430\u043d\u0430\u0446\u0438\u044f HTML \u0432\u043d\u0443\u0442\u0440\u0438 iCalendar (.ICS). \u0412\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u043d\u0438\u0435 HTML/JS (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, ) \u0432 \u0441\u043e\u0431\u044b\u0442\u0438\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0441\u043a\u0440\u0438\u043f\u0442\u0430 \u043f\u0440\u0438 \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0435 \u0432 \u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0432\u0435\u0431-\u043a\u043b\u0438\u0435\u043d\u0442\u0435. \u041f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u043a\u0440\u0430\u0441\u0442\u044c \u043a\u0443\u043a\u0438/\u0442\u043e\u043a\u0435\u043d\u044b, \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u0430\u0442\u044c \u043f\u0438\u0441\u044c\u043c\u0430, \u043c\u0435\u043d\u044f\u0442\u044c \u0444\u0438\u043b\u044c\u0442\u0440\u044b, \u0447\u0438\u0442\u0430\u0442\u044c \u043f\u043e\u0447\u0442\u0443.\n\n\u27a1\ufe0f3DEXPERIENCE (CVE-2025-9976, CVSS 9.0)\n\n\u0418\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f PLM-\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 \u043e\u0442 Dassault Systemes, \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u044f\u044e\u0449\u0430\u044f CAD, CAE, CAM \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u043d\u044b\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u0432 \u0435\u0434\u0438\u043d\u0443\u044e \u0441\u0440\u0435\u0434\u0443 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438. \u0411\u0430\u0433 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 OS command injection \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 Station Launcher. \u0421\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0439 \u0432\u044b\u0437\u043e\u0432 \u0438 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 \u043d\u0430 \u043c\u0430\u0448\u0438\u043d\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f. \u0411\u0435\u0437 PoC, \u0437\u0430\u0442\u043e \u0441\u0432\u0435\u0436\u0430\u043a.\n\nP.s. \u043a\u0430\u043a \u0432\u0430\u043c \u0442\u0430\u043a\u043e\u0439 \u0444\u043e\u0440\u043c\u0430\u0442 \u043f\u043e\u0441\u0442\u043e\u0432? \ud83d\ude2c - \u0435\u0441\u043b\u0438 \u043a\u0430\u0439\u0444, \ud83d\udd25 - \u0435\u0441\u043b\u0438 \u043d\u0430\u0434\u043e \u0435\u0449\u0435 \u0434\u043e\u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c. \u0422\u0430\u043a\u043e\u0439 \u0444\u043e\u0440\u043c\u0430\u0442 \u0431\u0443\u0434\u0435\u0442 \u0432\u044b\u0445\u043e\u0434\u0438\u0442\u044c \u043f\u043e \u043f\u043d\n\n\ud83c\udf1a @poxek | \ud83d\udcf2 MAX |\ud83c\udf1a \u0411\u043b\u043e\u0433 | \ud83d\udcfa YT | \ud83d\udcfa RT | \ud83d\udcfa VK | \u2764\ufe0f \u041c\u0435\u0440\u0447", "creation_timestamp": "2025-10-15T14:56:30.000000Z"}, {"uuid": "8837269b-55ba-49de-8007-e8851259d8db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/59288", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-41244 is a critical local privilege escalation vulnerability in VMware Aria Operations and VMware Tools\nURL\uff1ahttps://github.com/IBO-ATTACKS/CVE-2025-41244\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-11T15:57:03.000000Z"}, {"uuid": "bd8fd0a7-2654-458e-a20e-5cf314f2a9cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "published-proof-of-concept", "source": "Telegram/u5yzdlTNRMSYoIGHk1Ki73SNjmsacr_63wfexMDM4b3zIA", "content": "", "creation_timestamp": "2025-11-11T19:47:03.000000Z"}, {"uuid": "7e199be0-13c7-437d-a580-9ab1482b78e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "published-proof-of-concept", "source": "Telegram/sh_Wj4yVZfYZ8SMMOaybmV9yApMn3mNDIaTU298AM_pVdB8", "content": "", "creation_timestamp": "2025-11-11T21:00:05.000000Z"}, {"uuid": "c6ac2ac5-4d5e-4e3e-8c9a-bd7353541368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "exploited", "source": "Telegram/HOFtqqwK_HExeB8WLgUdBxKhax1cjVAegWwJAxYsMXDCwQ", "content": "", "creation_timestamp": "2025-10-31T07:45:59.000000Z"}, {"uuid": "5ffdad8c-b9c4-45af-a9fb-9ca73a9511e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "exploited", "source": "https://t.me/information_security_channel/54386", "content": "CISA Adds Exploited XWiki, VMware Flaws to KEV Catalog\nhttps://www.securityweek.com/cisa-adds-exploited-xwiki-vmware-flaws-to-kev-catalog/\n\nBroadcom has updated its advisory on CVE-2025-41244 to mention the vulnerability\u2019s in-the-wild exploitation.\nThe post CISA Adds Exploited XWiki, VMware Flaws to KEV Catalog (https://www.securityweek.com/cisa-adds-exploited-xwiki-vmware-flaws-to-kev-catalog/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2025-10-31T12:04:48.000000Z"}, {"uuid": "0bc86cbe-252e-481c-b47f-1b54e891c64a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "published-proof-of-concept", "source": "Telegram/cPtN8zT2SnIpst_mCQq3aWBw8_Qfv87fHZTqq98UoI4vu1g", "content": "", "creation_timestamp": "2025-10-06T09:00:04.000000Z"}, {"uuid": "e8eb176e-fb21-452f-bd2b-b976c52a9e1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "published-proof-of-concept", "source": "Telegram/DvK5Zd99vmNqswWfv0673pzr_yxwiZ5knCvMzZjk6DiVCn8", "content": "", "creation_timestamp": "2025-10-06T03:00:10.000000Z"}, {"uuid": "17fdee53-4565-42f8-bb0f-e142d59bbcab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "exploited", "source": "Telegram/f4BoAopdku9Dj6RZAvyxQmhrUgDBruEQHJrVzyfJG5EHf8GA", "content": "", "creation_timestamp": "2025-10-07T11:10:28.000000Z"}, {"uuid": "a16a514c-a493-4203-878e-a2aab31d6acd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "exploited", "source": "https://t.me/thehackernews/7817", "content": "CISA added a new VMware zero-day to its KEV list.\n\nCVE-2025-41244 (CVSS 7.8) lets local users on VMs with VMware Tools + Aria Operations gain root access.\n\nExploited since Oct 2024 by China-linked UNC5174.\n\nPatch released last month \u2193 https://thehackernews.com/2025/10/cisa-flags-vmware-zero-day-exploited-by.html", "creation_timestamp": "2025-10-31T07:51:16.000000Z"}, {"uuid": "94813822-a421-4dcd-8fd9-0c671785b7c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "seen", "source": "https://t.me/NinjaSec/424", "content": "Security Advisories &amp; Proof-of-Concept Brief (Educational &amp; Research Use)\n\nThis brief outlines recently disclosed vulnerabilities, their proof-of-concept (PoC) exploits, and related security tools. This information is intended for defensive research, penetration testing in authorized environments, and strengthening security postures.\n\n#exploit #poc - Recent Vulnerability Exploits\n\nCVE-2025-57529 - CPAS SQL Injection\n\n\u00b7 Brief: SQL Injection vulnerability in CPAS audit management information system.\n\u00b7 Educational Purpose: Understanding and testing for SQLi flaws in management systems.\n\u00b7 Link: https://github.com/songqb-xx/CVE-2025-57529\n\nCVE-2025-56383 - Proof-of-Concept\n\n\u00b7 Brief: A general proof-of-concept exploit for the specified CVE.\n\u00b7 Educational Purpose: Analysis of exploit development and vulnerability verification.\n\u00b7 Link: https://github.com/zer0t0/CVE-2025-56383-Proof-of-Concept\n\nCVE-2025-20281 - Cisco ISE RCE Checker\n\n\u00b7 Brief: A vulnerability checker for a Remote Code Execution flaw in Cisco Identity Services Engine (ISE).\n\u00b7 Educational Purpose: Network security monitoring and identifying vulnerable critical infrastructure.\n\u00b7 Link: https://github.com/grupooruss/CVE-2025-20281-Cisco\n\nCVE-2025-7775 - PoC\n\n\u00b7 Brief: Proof-of-concept for the specified CVE.\n\u00b7 Educational Purpose: Vulnerability research and testing detection capabilities.\n\u00b7 Link: https://github.com/rxerium/CVE-2025-7775\n\nCVE-2025-60880 - Bagisto Stored XSS\n\n\u00b7 Brief: Stored Cross-Site Scripting vulnerability in the Bagisto e-commerce platform's admin panel.\n\u00b7 Educational Purpose: Studying XSS impacts in web applications, especially in privileged panels.\n\u00b7 Link: https://github.com/Shenal01/CVE-2025-60880\n\n#analysis - In-Depth Vulnerability Analysis\n\nCVE-2025-61882 - Oracle E-Business Suite Pre-Auth RCE\n\n\u00b7 Brief: A technical analysis of a pre-authentication Remote Code Execution vulnerability chain in Oracle E-Business Suite.\n\u00b7 Educational Purpose: Understanding complex attack chains against enterprise ERP systems.\n\u00b7 Link: https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882\n\nCVE-2025-3600 - Progress Telerik Unsafe Reflection\n\n\u00b7 Brief: Analysis of an unsafe reflection vulnerability in Progress Telerik UI for ASP.NET AJAX, leading to more than just Denial-of-Service.\n\u00b7 Educational Purpose: Research into exploitation techniques in third-party .NET components.\n\u00b7 Link: https://labs.watchtowr.com/more-than-dos-progress-telerik-ui-for-asp-net-ajax-unsafe-reflection-cve-2025-3600\n\n#tools - Detection &amp; Security Tools\n\nCVE-2025-41244 - Detection Script\n\n\u00b7 Brief: A detection script for identifying systems affected by CVE-2025-41244.\n\u00b7 Educational Purpose: Blue team exercises for building and deploying vulnerability detection.\n\u00b7 Link: https://github.com/rxerium/CVE-2025-41244\n\nCVE-2025-49844 - Redis Lua Parser Use-After-Free\n\n\u00b7 Brief: Proof-of-concept for a Use-After-Free vulnerability in the Redis Lua parser.\n\u00b7 Educational Purpose: Memory corruption research and understanding database server security.\n\u00b7 Link: https://github.com/dwisiswant0/CVE-2025-49844\n\n#maldev #redteam - Red Team Tooling\n\nCrystal-Kit - Cobalt Strike Evasion Kit\n\n\u00b7 Brief: An evasion kit designed to assist with hiding Cobalt Strike team servers.\n\u00b7 Educational Purpose: Researching Command &amp; Control (C2) tradecraft, detection methods, and defensive countermeasures.\n\u00b7 Warning: For authorized red team exercises and malware development research only.\n\u00b7 Blog: https://rastamouse.me/crystal-kit/\n\u00b7 Tool: https://github.com/rasta-mouse/Crystal-Kit\n\nDisclaimer: All resources are for educational and authorized security research only. Use these tools and techniques only on systems you own or have explicit written permission to test. Understanding these threats is crucial for building effective defenses.", "creation_timestamp": "2025-10-18T09:50:45.000000Z"}, {"uuid": "eeaf2a0d-cb44-4f2b-bdd2-9523efb6a458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/53653", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aDetection for CVE-2025-41244\nURL\uff1ahttps://github.com/rxerium/CVE-2025-41244\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-30T11:41:29.000000Z"}, {"uuid": "f2f7cd04-41d6-4357-b558-e19c4c7662fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "exploited", "source": "https://t.me/true_secator/7475", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 NVISO Labs \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442, \u0447\u0442\u043e \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Broadcom VMware Tools \u0438 VMware Aria Operations, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u043a\u0430\u043a 0-day \u0441 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u044b \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2024 \u0433\u043e\u0434\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a UNC5174.\n\nCVE-2025-41244\u00a0(CVSS: 7,8) \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442: Cloud Foundation 4.x \u0438 5.x, 9.xxx, 13.xxx (Windows, Linux), vSphere Foundation 9.xxx, 13.xxx (Windows, Linux), Aria Operations 8.x, Tools 11.xx, 12.xx \u0438 13.xx (Windows, Linux), Telco Cloud Platform 4.x \u0438 5.x \u0438 Telco Cloud Infrastructure 2.x \u0438 3.x.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044e VMware, \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0441 \u043d\u0435\u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438, \u0438\u043c\u0435\u044e\u0449\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u0435 \u0441 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u043c\u0438 Aria Operations \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u043c\u0438 VMware \u0441 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c SDMP, \u043c\u043e\u0436\u0435\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e root \u043d\u0430 \u0442\u043e\u0439 \u0436\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u0435.\n\nNVISO \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430 \u043e \u043d\u0435\u0439 19 \u043c\u0430\u044f 2025 \u0433\u043e\u0434\u0430 \u0432 \u0445\u043e\u0434\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u043f\u043e \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044e \u043d\u0430 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u044f\u0432\u0438\u043b\u0430, \u0447\u0442\u043e VMware Tools 12.4.9, \u0432\u0445\u043e\u0434\u044f\u0449\u0438\u0439 \u0432 \u0441\u043e\u0441\u0442\u0430\u0432 VMware Tools 12.5.4, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u044d\u0442\u0443 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432 32-\u0440\u0430\u0437\u0440\u044f\u0434\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows, \u0430 \u0432\u0435\u0440\u0441\u0438\u044f open-vm-tools, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0430\u044f CVE-2025-41244, \u0431\u0443\u0434\u0435\u0442 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0442\u044c\u0441\u044f \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430\u043c\u0438 Linux.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e Broadcom \u043d\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442 \u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, NVISO Labs \u043f\u0440\u0438\u043f\u0438\u0441\u0430\u043b\u0430 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u0443\u044e \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u043e\u0439 \u0441 \u041a\u0438\u0442\u0430\u0435\u043c \u0433\u0440\u0443\u043f\u043f\u0435, \u043a\u043e\u0442\u043e\u0440\u0443\u044e Google Mandiant \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442 \u043a\u0430\u043a UNC5174 (Uteus \u0438\u043b\u0438 Uetus).\n\n\u041a\u0430\u043a \u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438, \u0433\u0440\u0443\u043f\u043f\u0430 \u0438\u043c\u0435\u0435\u0442 \u0431\u043e\u0433\u0430\u0442\u044b\u0439 \u043e\u043f\u044b\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445\u00a0\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f SAP NetWeaver, \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0446\u0435\u043b\u0435\u0432\u044b\u043c \u0441\u0440\u0435\u0434\u0430\u043c.\n\n\u0412 \u0441\u043b\u0443\u0447\u0430\u0435 \u0443\u0441\u043f\u0435\u0445\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u044e\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u0432 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root). \n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0432 NVISO \u043d\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043a\u0430 \u043e\u0446\u0435\u043d\u0438\u0442\u044c, \u0431\u044b\u043b \u043b\u0438 \u044d\u0442\u043e\u0442 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0447\u0430\u0441\u0442\u044c\u044e \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0435\u0439 UNC5174 \u0438\u043b\u0438 \u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0443\u043b\u044f \u043d\u043e\u0441\u0438\u043b\u043e \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u044b\u0439 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440 \u0432 \u0432\u0438\u0434\u0443 \u0435\u0451 \u043d\u0435\u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c NVISO, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u044e \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c get_version(), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u0448\u0430\u0431\u043b\u043e\u043d \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e\u0433\u043e \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u044f (regex) \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u043b\u044f \u043a\u0430\u0436\u0434\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u0441 \u043f\u0440\u043e\u0441\u043b\u0443\u0448\u0438\u0432\u0430\u044e\u0449\u0438\u043c \u0441\u043e\u043a\u0435\u0442\u043e\u043c, \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442, \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u043b\u0438 \u0434\u0432\u043e\u0438\u0447\u043d\u044b\u0439 \u0444\u0430\u0439\u043b, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0439 \u0441 \u044d\u0442\u0438\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c, \u0448\u0430\u0431\u043b\u043e\u043d\u0443, \u0438, \u0435\u0441\u043b\u0438 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u0435\u0442, \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u0441\u043b\u0443\u0436\u0431\u044b.\n\n\u0425\u043e\u0442\u044f \u044d\u0442\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043e\u0436\u0438\u0434\u0430\u0435\u043c\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, /usr/bin/httpd), \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043a\u043b\u0430\u0441\u0441\u0430 \u0441\u0438\u043c\u0432\u043e\u043b\u043e\u0432 \\S \u0441 \u0448\u0438\u0440\u043e\u043a\u0438\u043c \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u0435\u043c (\u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u0435 \u0441\u0438\u043c\u0432\u043e\u043b\u0430\u043c, \u043e\u0442\u043b\u0438\u0447\u043d\u044b\u043c \u043e\u0442 \u043f\u0440\u043e\u0431\u0435\u043b\u043e\u0432) \u0432 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0448\u0430\u0431\u043b\u043e\u043d\u0430\u0445 \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u0439 \u0442\u0430\u043a\u0436\u0435 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u043d\u0435\u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u043c \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u043c \u0444\u0430\u0439\u043b\u0430\u043c (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, /tmp/httpd).\n\n\u042d\u0442\u0438 \u043d\u0435\u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430\u0445 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, /tmp), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0434\u043b\u044f \u0437\u0430\u043f\u0438\u0441\u0438 \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c.\n\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u044d\u0442\u043e \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044f \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u0435\u0442 \u0440\u0430\u0437\u043c\u0435\u0441\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0439 \u0444\u0430\u0439\u043b \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0435 /tmp/httpd, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a EoP \u043f\u0440\u0438 \u0441\u0431\u043e\u0440\u0435 \u043c\u0435\u0442\u0440\u0438\u043a VMware.\n\n\u0412\u0441\u0451, \u0447\u0442\u043e \u043d\u0443\u0436\u043d\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u0447\u0442\u043e\u0431\u044b \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e, - \u044d\u0442\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0442\u044c \u0437\u0430\u043f\u0443\u0441\u043a \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0438 \u043e\u043d \u043e\u0442\u043a\u0440\u043e\u0435\u0442 \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u044b\u0439 \u043f\u0440\u043e\u0441\u043b\u0443\u0448\u0438\u0432\u0430\u044e\u0449\u0438\u0439 \u0441\u043e\u043a\u0435\u0442.\n\nUNC5174 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 /tmp/httpd \u0434\u043b\u044f \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0434\u0432\u043e\u0438\u0447\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430, \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438 \u0441 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430. \u0422\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u0438\u0440\u043e\u0434\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u043e\u0439 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u044d\u0442\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0430, \u043d\u0430 \u0434\u0430\u043d\u043d\u043e\u043c \u044d\u0442\u0430\u043f\u0435 \u043d\u0435\u044f\u0441\u043d\u0430.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438, \u0447\u0442\u043e \u0448\u0438\u0440\u043e\u043a\u0430\u044f \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0430 \u0438\u043c\u0438\u0442\u0430\u0446\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u0434\u0432\u043e\u0438\u0447\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, httpd) \u043f\u043e\u0434\u0447\u0435\u0440\u043a\u0438\u0432\u0430\u0435\u0442 \u0440\u0435\u0430\u043b\u044c\u043d\u0443\u044e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0440\u044f\u0434 \u0434\u0440\u0443\u0433\u0438\u0445 \u0448\u0442\u0430\u043c\u043c\u043e\u0432 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043c\u043d\u043e\u0433\u0438\u0445 \u043b\u0435\u0442 \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u0434\u043e\u0441\u0442\u0438\u0433\u0430\u043b\u0438 \u043d\u0435\u043f\u0440\u0435\u0434\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439.", "creation_timestamp": "2025-09-30T14:20:05.000000Z"}, {"uuid": "985b474f-468c-4547-8c13-1441d392de7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "exploited", "source": "https://t.me/thehackernews/7623", "content": "\ud83d\udd25 [New] VMware zero-day (CVE-2025-41244) exploited in the wild!\n\nUNC5174 popped root by abusing a regex bug in get_version() \u2014 drop /tmp/httpd, open a socket, and you\u2019re root.\n\nAlready active since Oct \u201924.\n\nDetails \u2192 https://thehackernews.com/2025/09/urgent-china-linked-hackers-exploit-new.html", "creation_timestamp": "2025-09-30T11:00:29.000000Z"}, {"uuid": "2344c643-0adf-49b8-8c43-83afadb53a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/623", "content": "Top Security News for Today\n\nKlopatra: exposing a new Android banking trojan operation with roots in Turkey | Cleafy LABS  \nhttps://arxiv.org/abs/2509.22662\n\nAn In-depth research-based walk-through of an Uninitialized Local Variable Static Analyzer  \nhttps://www.reddit.com/r/netsec/comments/1nu7f3y/an_indepth_researchbased_walkthrough_of_an/\n\nYou name it, VMware elevates it (CVE-2025-41244)  \nhttps://www.reddit.com/r/netsec/comments/1nu9q24/you_name_it_vmware_elevates_it_cve202541244/\n\nDetails of a Scam  \nhttps://www.schneier.com/blog/archives/2025/09/details-of-a-scam.html\n\nEmpowering defenders in the era of agentic AI with Microsoft Sentinel  \nhttps://www.microsoft.com/en-us/security/blog/2025/09/30/empowering-defenders-in-the-era-of-agentic-ai-with-microsoft-sentinel/\n\nCyberattack on Japanese beer giant Asahi limits shipping, call center operations  \nhttps://therecord.media/asahi-japan-cyberattack-limits-shipping-call-centers\n\nAfghanistan plunged into nationwide internet blackout, disrupting air travel, medical care  \nhttps://therecord.media/afghanistan-plunged-into-nationwide-internet-blackout\n\nFTC alleges messaging app violated child privacy law, duped users into subscriptions  \nhttps://therecord.media/ftc-alleges-sendit-app-violated-children-privacy-rule\n\nCISA orders federal gov to patch critical Fortra file transfer bug  \nhttps://therecord.media/cisa-orders-federal-gov-patch-fortra-bug\n\nCPPA fines Tractor Supply Company $1.4 million for privacy violations  \nhttps://therecord.media/ccpa-tractor-supply-privacy-fine\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-10-01T09:30:21.000000Z"}, {"uuid": "b58babe2-0dde-4e95-ae63-5221c0eed12d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "published-proof-of-concept", "source": "Telegram/XvvVwUULX3YkFEyHnmgA8eVCcK9lzb3EeuXV3OdiSV_sClo", "content": "", "creation_timestamp": "2025-09-30T15:00:11.000000Z"}, {"uuid": "bf359fc6-2002-48df-92f3-eaa64f1d20da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "published-proof-of-concept", "source": "Telegram/ssqYqqdccEip6ZeushdrbISheIp6PDi_KXhzzvikRF8zVys", "content": "", "creation_timestamp": "2025-09-30T15:00:06.000000Z"}, {"uuid": "67a10394-db9c-469b-8f9b-18552d08d335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41244", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/10264", "content": "You name it, VMware elevates it (CVE-2025-41244)\n\nhttps://blog.nviso.eu/2025/09/29/you-name-it-vmware-elevates-it-cve-2025-41244/", "creation_timestamp": "2025-09-30T20:17:50.000000Z"}]}