{"vulnerability": "CVE-2025-4658", "sightings": [{"uuid": "99cefcbe-717b-45d1-9f81-2b598954b6e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46580", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnrd323bfz2b", "content": "", "creation_timestamp": "2025-04-27T03:35:28.625223Z"}, {"uuid": "e750a759-a480-4ce8-81d2-4ee856849491", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46580", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lnrgaqi5i4k2", "content": "", "creation_timestamp": "2025-04-27T04:40:03.949946Z"}, {"uuid": "8fffe967-491e-4f17-9d46-da013f71edd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4658", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114501563358261613", "content": "", "creation_timestamp": "2025-05-13T16:53:23.214837Z"}, {"uuid": "4829acb0-749d-46cd-b1df-38ba62c5b6e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46581", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115373273536030404", "content": "", "creation_timestamp": "2025-10-14T15:40:47.902051Z"}, {"uuid": "db6c420e-cb40-407d-aee3-ada69673120b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-46582", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m462n2kjhy2o", "content": "", "creation_timestamp": "2025-10-27T09:01:46.111941Z"}, {"uuid": "4ca77278-fb13-48e7-ba80-d9307545cc39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46582", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115446447915141841", "content": "", "creation_timestamp": "2025-10-27T13:50:00.000455Z"}, {"uuid": "c4f7fedb-2b88-4c4c-8010-a1514881bbe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46582", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m46axfwzac2o", "content": "", "creation_timestamp": "2025-10-27T10:54:55.492754Z"}, {"uuid": "26152f72-2da4-4b56-aefb-54ebd7c7bd31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46583", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m46bstu6hd2f", "content": "", "creation_timestamp": "2025-10-27T11:10:16.302653Z"}, {"uuid": "a0c20afc-f7a6-4668-98c0-ada4fe8f539f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46583", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115446447915141841", "content": "", "creation_timestamp": "2025-10-27T13:50:00.105272Z"}, {"uuid": "12a0e70a-25da-44f7-8cb8-83b2278dbcf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46586", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15064", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46586\n\ud83d\udd25 CVSS Score: 5.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Permission control vulnerability in the contacts module\nImpact: Successful exploitation of this vulnerability may affect availability.\n\ud83d\udccf Published: 2025-05-06T07:05:19.066Z\n\ud83d\udccf Modified: 2025-05-06T07:05:19.066Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/5/", "creation_timestamp": "2025-05-06T07:20:25.000000Z"}, {"uuid": "01aba0eb-02cc-4d67-a146-99db6330bf8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46587", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15121", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46587\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Permission control vulnerability in the media library module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality.\n\ud83d\udccf Published: 2025-05-06T07:14:30.179Z\n\ud83d\udccf Modified: 2025-05-06T14:03:05.411Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/5/", "creation_timestamp": "2025-05-06T14:21:30.000000Z"}, {"uuid": "82ac130c-a742-4a09-8247-74e24947ca37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46589", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15125", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46589\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Vulnerability of unauthorized access in the app lock module\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality.\n\ud83d\udccf Published: 2025-05-06T07:17:29.134Z\n\ud83d\udccf Modified: 2025-05-06T13:56:39.446Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/5/", "creation_timestamp": "2025-05-06T14:21:34.000000Z"}, {"uuid": "d4f79962-7002-4e6d-9101-4ddbb2fdf199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46584", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15066", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46584\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Vulnerability of improper authentication logic implementation in the file system module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality.\n\ud83d\udccf Published: 2025-05-06T07:00:54.166Z\n\ud83d\udccf Modified: 2025-05-06T07:00:54.166Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/5/", "creation_timestamp": "2025-05-06T07:20:27.000000Z"}, {"uuid": "9c83adef-334f-4a1d-83ec-b320f42bc83e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46585", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15065", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46585\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Out-of-bounds array read/write vulnerability in the kernel module\nImpact: Successful exploitation of this vulnerability may affect availability.\n\ud83d\udccf Published: 2025-05-06T07:04:03.588Z\n\ud83d\udccf Modified: 2025-05-06T07:04:03.588Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/5/", "creation_timestamp": "2025-05-06T07:20:26.000000Z"}, {"uuid": "4a181c04-62b0-4bc6-85df-62df612928b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46580", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13600", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46580\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: There is a code-related vulnerability in the GoldenDB database product. Attackers can access system tables to disrupt the normal operation of business SQL.\n\ud83d\udccf Published: 2025-04-27T01:49:16.856Z\n\ud83d\udccf Modified: 2025-04-27T01:49:16.856Z\n\ud83d\udd17 References:\n1. https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/4828497866583347285", "creation_timestamp": "2025-04-27T03:08:58.000000Z"}, {"uuid": "9e7518be-192e-4c09-902c-c0bf8d9aca38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46588", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15123", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46588\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Vulnerability of unauthorized access in the app lock module\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality.\n\ud83d\udccf Published: 2025-05-06T07:16:28.523Z\n\ud83d\udccf Modified: 2025-05-06T14:01:59.835Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/5/", "creation_timestamp": "2025-05-06T14:21:32.000000Z"}, {"uuid": "d310e646-2c16-4804-a639-73402330aae2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46584", "type": "seen", "source": "https://t.me/cvedetector/24559", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46584 - Apache File System Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-46584 \nPublished : May 6, 2025, 7:15 a.m. | 34\u00a0minutes ago \nDescription : Vulnerability of improper authentication logic implementation in the file system module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T10:17:44.000000Z"}, {"uuid": "a1c32c90-e9ff-4c61-b4c7-6e9a02f9eb6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46580", "type": "seen", "source": "https://t.me/cvedetector/23818", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46580 - GoldenDB Database Information Disclosure and Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46580 \nPublished : April 27, 2025, 3:15 a.m. | 57\u00a0minutes ago \nDescription : There is a code-related vulnerability in the GoldenDB database product. Attackers can access system tables to disrupt the normal operation of business SQL. \nSeverity: 7.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-27T06:17:32.000000Z"}, {"uuid": "67b844a7-0cf8-4863-81d7-29aa4f321b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46584", "type": "published-proof-of-concept", "source": "Telegram/7zFVzqZFuQiG3D865QjZIIAAiukuTilZCAkXDIpVrxeZZHI", "content": "", "creation_timestamp": "2025-05-06T10:45:49.000000Z"}, {"uuid": "fa0ccd00-c5ad-4acc-af2f-f9720feddbbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46580", "type": "seen", "source": "Telegram/GpkMenJKORMRTyGn__tovnUC1GugUYF1oUM8Jfs6Z_XnWoI", "content": "", "creation_timestamp": "2025-04-27T04:30:49.000000Z"}, {"uuid": "d00305aa-fd37-4ada-9531-9de51d418f8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46585", "type": "seen", "source": "https://t.me/cvedetector/24560", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46585 - Linux Kernel Out-of-bounds Array Read/Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46585 \nPublished : May 6, 2025, 7:15 a.m. | 34\u00a0minutes ago \nDescription : Out-of-bounds array read/write vulnerability in the kernel module  \nImpact: Successful exploitation of this vulnerability may affect availability. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T10:17:45.000000Z"}, {"uuid": "c1c10841-48d8-44a3-9b84-25da4356bfc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46586", "type": "seen", "source": "https://t.me/cvedetector/24561", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46586 - \"Apache Contacts Module Permission Control Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-46586 \nPublished : May 6, 2025, 7:15 a.m. | 34\u00a0minutes ago \nDescription : Permission control vulnerability in the contacts module  \nImpact: Successful exploitation of this vulnerability may affect availability. \nSeverity: 5.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T10:17:46.000000Z"}]}