{"vulnerability": "CVE-2025-41426", "sightings": [{"uuid": "892158f7-e300-49b6-bbe3-549793bb6163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41426", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lppn2mguue2j", "content": "", "creation_timestamp": "2025-05-21T22:19:12.215301Z"}, {"uuid": "06a0f1c7-ff8b-42ed-80ad-a895d5ccac88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41426", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lpoxtdwhvk26", "content": "", "creation_timestamp": "2025-05-21T15:59:20.358236Z"}, {"uuid": "d31cf8fc-1a4f-450f-ac43-99e3437d1a0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41426", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-140-10", "content": "", "creation_timestamp": "2025-05-20T10:00:00.000000Z"}, {"uuid": "b8c37c0e-51ee-49e7-920f-0b047b33a497", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41426", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lpoxtdwsnc26", "content": "", "creation_timestamp": "2025-05-21T15:59:20.967795Z"}, {"uuid": "0a9c60c4-a286-4b5c-bf74-7c4ca9a723a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41426", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17178", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41426\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Affected Vertiv products contain a stack based buffer overflow vulnerability. An attacker could exploit this vulnerability to gain code execution on the device.\n\ud83d\udccf Published: 2025-05-21T19:22:29.596Z\n\ud83d\udccf Modified: 2025-05-21T19:22:29.596Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-140-10\n2. https://www.vertiv.com/en-us/support/security-support-center/", "creation_timestamp": "2025-05-21T19:42:48.000000Z"}]}