{"vulnerability": "CVE-2025-4661", "sightings": [{"uuid": "dce7f042-d665-400c-b2ef-faad55a6b098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/justineo.bsky.social/post/3lsv2okawks2r", "content": "", "creation_timestamp": "2025-07-01T06:21:53.196127Z"}, {"uuid": "e3af06ae-9cb7-416a-beb5-221a80b490fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46617", "type": "seen", "source": "https://bsky.app/profile/justineo.bsky.social/post/3lsv2okawks2r", "content": "", "creation_timestamp": "2025-07-01T06:21:53.318618Z"}, {"uuid": "e59b8c46-aae3-4351-845b-df9e2d13366f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lnx7kxbyys2m", "content": "", "creation_timestamp": "2025-04-29T11:48:43.497787Z"}, {"uuid": "5f3e8e8c-e6b4-41b7-bced-f9acc70bbfab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46614", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnvjzd4tqc2a", "content": "", "creation_timestamp": "2025-04-28T19:50:24.670633Z"}, {"uuid": "1e54d52a-1c3a-440f-926b-93f17b4b9af5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lnw4x3c5os2t", "content": "", "creation_timestamp": "2025-04-29T01:29:09.430782Z"}, {"uuid": "b07ca992-4e3f-4ad3-b7e7-ffa2406446bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46617", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lnw4x3c5os2t", "content": "", "creation_timestamp": "2025-04-29T01:29:09.524915Z"}, {"uuid": "ab1e1e21-6b1d-4d1e-88be-705216712b2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46613", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lnmnxtnpo7z2", "content": "", "creation_timestamp": "2025-04-25T07:07:22.544474Z"}, {"uuid": "c28fa0c4-6e58-4e73-baf2-f5c0145995ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46617", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lnmnxzjsx432", "content": "", "creation_timestamp": "2025-04-25T07:07:24.771883Z"}, {"uuid": "265d3f50-e71e-441e-8c2b-3cf51fe3f8a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lnmobfwqrcz2", "content": "", "creation_timestamp": "2025-04-25T07:12:41.844890Z"}, {"uuid": "23743fae-8e12-475f-953f-8691b4feb7e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnms2m33jg2y", "content": "", "creation_timestamp": "2025-04-25T08:20:18.262254Z"}, {"uuid": "033d48a7-aabd-49fa-be3a-1b557149f9cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46617", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnmvfxvxdt24", "content": "", "creation_timestamp": "2025-04-25T09:20:20.843495Z"}, {"uuid": "3f83439a-5ab4-430b-8a38-46e4bbb3cdc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114397971373382349", "content": "", "creation_timestamp": "2025-04-25T09:48:34.851722Z"}, {"uuid": "91ea6996-d5d7-4057-a75a-874e13595b0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lnnabrq53a25", "content": "", "creation_timestamp": "2025-04-25T12:34:51.200821Z"}, {"uuid": "a56e4804-c385-4b70-bf8f-ede8ee67e341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114398817254860717", "content": "", "creation_timestamp": "2025-04-25T13:23:41.981689Z"}, {"uuid": "941a9a35-e506-495d-bd0a-42b614c6c3b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46613", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnnmtsbwyy2b", "content": "", "creation_timestamp": "2025-04-25T16:19:41.958267Z"}, {"uuid": "afef6687-5442-49ff-87c3-bb3216b5dd73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46618", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnnq763sed24", "content": "", "creation_timestamp": "2025-04-25T17:19:46.247368Z"}, {"uuid": "673478f9-938c-49f0-9461-5af791dadf17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46617", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lnx7kxbyys2m", "content": "", "creation_timestamp": "2025-04-29T11:48:43.591685Z"}, {"uuid": "a9676e2d-fcbf-417f-95df-ac4e6c03f43f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13390", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46616\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Quantum StorNext Web GUI API before 7.2.4 allows potential Arbitrary Remote Code Execution (RCE) via upload of a file. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage.\n\ud83d\udccf Published: 2025-04-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-25T06:36:30.847Z\n\ud83d\udd17 References:\n1. https://www.quantum.com/en/service-support/security-bulletins/stornext-gui-multiple-security-vulnerabilities-stornext-gui-multiple-security-vulnerabilities/", "creation_timestamp": "2025-04-25T07:07:19.000000Z"}, {"uuid": "b69383c5-0d28-4c9c-bde3-1576b8cf5f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46619", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114428315490579118", "content": "", "creation_timestamp": "2025-04-30T18:25:29.406572Z"}, {"uuid": "44f045ba-4cb7-4e26-885b-e5dd724ab897", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46610", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lozb4rzhm42h", "content": "", "creation_timestamp": "2025-05-13T00:47:07.709299Z"}, {"uuid": "51aaecbd-9c59-47d7-bb80-028c8e3e0073", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46619", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lo5vx5oqij23", "content": "", "creation_timestamp": "2025-05-02T03:45:12.854939Z"}, {"uuid": "da6eab15-4ac3-4742-acc5-7f36f290e9b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46618", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-287/", "content": "", "creation_timestamp": "2025-05-13T03:00:00.000000Z"}, {"uuid": "b72b5532-492a-4bef-866f-b3f11388a6d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46614", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13700", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46614\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: In Snowflake ODBC Driver before 3.7.0, in certain code paths, the Driver logged the whole SQL query at the INFO level, aka Insertion of Sensitive Information into a Log File.\n\ud83d\udccf Published: 2025-04-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-28T15:56:23.048Z\n\ud83d\udd17 References:\n1. https://community.snowflake.com/s/article/Snowflake-Connector-for-ODBC-Security-Advisory-CVE-2025-46614", "creation_timestamp": "2025-04-28T16:11:14.000000Z"}, {"uuid": "46afecdb-3902-4683-8f82-f673054ef36f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46617", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13391", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46617\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Quantum StorNext Web GUI API before 7.2.4 grants access to internal StorNext configuration and unauthorized modification of some software configuration parameters via undocumented user credentials. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage.\n\ud83d\udccf Published: 2025-04-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-25T06:34:12.559Z\n\ud83d\udd17 References:\n1. https://www.quantum.com/en/service-support/security-bulletins/stornext-gui-multiple-security-vulnerabilities-stornext-gui-multiple-security-vulnerabilities/", "creation_timestamp": "2025-04-25T07:07:20.000000Z"}, {"uuid": "92a8c62b-37a2-4755-8f3d-e84213b40faa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46610", "type": "seen", "source": "https://t.me/cvedetector/25081", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46610 - Artec EMA Mail CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46610 \nPublished : May 12, 2025, 3:16 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : ARTEC EMA Mail 6.92 allows CSRF. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T18:37:13.000000Z"}, {"uuid": "4fb54ab9-fa4f-4ebd-bc85-fa553e9823b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46619", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14108", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46619\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A security issue has been discovered in Couchbase Server before 7.6.4 and fixed in v.7.6.4 and v.7.2.7 for Windows that could allow unauthorized access to sensitive files. Depending on the level of privileges, this vulnerability may grant access to files such as /etc/passwd or /etc/shadow.\n\ud83d\udccf Published: 2025-04-30T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-30T17:43:34.514Z\n\ud83d\udd17 References:\n1. https://forums.couchbase.com/tags/security\n2. https://docs.couchbase.com/server/current/release-notes/relnotes.html\n3. https://www.couchbase.com/alerts/", "creation_timestamp": "2025-04-30T18:14:14.000000Z"}, {"uuid": "3786d401-9933-44b2-a1e7-3b62a79afd53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46613", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13380", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46613\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H)\n\ud83d\udd39 Description: OpenPLC 3 through 64f9c11 has server.cpp Memory Corruption because a thread may access handleConnections arguments after the parent stack frame becomes unavailable.\n\ud83d\udccf Published: 2025-04-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-25T05:42:40.696Z\n\ud83d\udd17 References:\n1. https://github.com/thiagoralves/OpenPLC_v3/issues/273", "creation_timestamp": "2025-04-25T06:10:50.000000Z"}, {"uuid": "748dc344-4050-46a3-8473-2b276db0cb15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46611", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16058", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46611\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Cross Site Scripting vulnerability in ARTEC EMA Mail v6.92 allows an attacker to execute arbitrary code via a crafted script.\n\ud83d\udccf Published: 2025-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T22:07:18.183Z\n\ud83d\udd17 References:\n1. https://www.artec-it.com/en-us/ema.html\n2. https://www.syss.de/pentest-blog/csrf-und-xss-schwachstelle-in-ema-mail-von-artec-it-solutions-syss-2025-020/-021", "creation_timestamp": "2025-05-12T22:29:08.000000Z"}, {"uuid": "51ea746f-22a4-4bb8-976c-5ab2e0a2d193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46610", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16057", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46610\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ARTEC EMA Mail 6.92 allows CSRF.\n\ud83d\udccf Published: 2025-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T22:07:23.502Z\n\ud83d\udd17 References:\n1. https://www.artec-it.com/en-us/ema.html\n2. https://www.syss.de/pentest-blog/csrf-und-xss-schwachstelle-in-ema-mail-von-artec-it-solutions-syss-2025-020/-021", "creation_timestamp": "2025-05-12T22:29:07.000000Z"}, {"uuid": "f4daa385-ea16-4e33-b7c2-955478eb3c0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46612", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17883", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46612\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Panel Designer dashboard in Airleader Master and Easy before 6.36 allows remote attackers to execute arbitrary commands via a wizard/workspace.jsp unrestricted file upload. To exploit this, the attacker must login to the administrator console (default credentials are weak and easily guessable) and upload a JSP file via the Panel Designer dashboard.\n\ud83d\udccf Published: 2025-06-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-10T14:10:15.120Z\n\ud83d\udd17 References:\n1. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-036.txt", "creation_timestamp": "2025-06-10T14:30:23.000000Z"}, {"uuid": "3276fa16-00e3-46ab-a36c-902205836589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4661", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18830", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4661\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A path transversal vulnerability in \nBrocade Fabric OS 9.1.0 through 9.2.2 could allow a local admin user to \ngain access to files outside the intended directory potentially leading \nto the disclosure of sensitive information.\n\n\nNote: Admin level privilege is required on the switch in order to exploit\n\ud83d\udccf Published: 2025-06-19T02:27:04.559Z\n\ud83d\udccf Modified: 2025-06-19T02:27:04.559Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35814", "creation_timestamp": "2025-06-19T02:40:14.000000Z"}, {"uuid": "7596bdea-513d-4ebd-934d-059d8ae29f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46611", "type": "seen", "source": "https://t.me/cvedetector/25083", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46611 - ARTEC EMA Mail Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46611 \nPublished : May 12, 2025, 3:16 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Cross Site Scripting vulnerability in ARTEC EMA Mail v6.92 allows an attacker to execute arbitrary code via a crafted script. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T18:37:14.000000Z"}, {"uuid": "816a2965-29c7-4f91-a0fb-f25926a7604a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46613", "type": "seen", "source": "https://t.me/cvedetector/23729", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46613 - OpenPLC Server Memory Corruption\", \n  \"Content\": \"CVE ID : CVE-2025-46613 \nPublished : April 25, 2025, 6:15 a.m. | 32\u00a0minutes ago \nDescription : OpenPLC 3 through 64f9c11 has server.cpp Memory Corruption because a thread may access handleConnections arguments after the parent stack frame becomes unavailable. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-25T09:09:10.000000Z"}, {"uuid": "4f3ffa54-6129-4231-99d9-876f28777922", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46617", "type": "seen", "source": "https://t.me/cvedetector/23743", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46617 - Quantum StorNext Web GUI API Unauthorized Configuration Access and Modification\", \n  \"Content\": \"CVE ID : CVE-2025-46617 \nPublished : April 25, 2025, 7:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Quantum StorNext Web GUI API before 7.2.4 grants access to internal StorNext configuration and unauthorized modification of some software configuration parameters via undocumented user credentials. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-25T10:49:38.000000Z"}, {"uuid": "f355ab1f-2c37-4a5d-846c-368e0691b0c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46614", "type": "seen", "source": "https://t.me/cvedetector/23919", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46614 - Snowflake ODBC Driver Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-46614 \nPublished : April 28, 2025, 4:15 p.m. | 1\u00a0hour, 14\u00a0minutes ago \nDescription : In Snowflake ODBC Driver before 3.7.0, in certain code paths, the Driver logged the whole SQL query at the INFO level, aka Insertion of Sensitive Information into a Log File. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-28T19:54:58.000000Z"}, {"uuid": "715b4cc7-d43f-482a-add2-a2b5d04cce3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://t.me/cvedetector/23742", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46616 - Quantum StorNext Web GUI API RCE\", \n  \"Content\": \"CVE ID : CVE-2025-46616 \nPublished : April 25, 2025, 7:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Quantum StorNext Web GUI API before 7.2.4 allows potential Arbitrary Remote Code Execution (RCE) via upload of a file. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-25T10:49:37.000000Z"}, {"uuid": "660171a3-659d-458a-9490-c41ecd9ffe36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46619", "type": "seen", "source": "https://t.me/cvedetector/24140", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46619 - Couchbase Server File Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46619 \nPublished : April 30, 2025, 6:15 p.m. | 1\u00a0hour, 37\u00a0minutes ago \nDescription : A security issue has been discovered in Couchbase Server before 7.6.4 and fixed in v.7.6.4 and v.7.2.7 for Windows that could allow unauthorized access to sensitive files. Depending on the level of privileges, this vulnerability may grant access to files such as /etc/passwd or /etc/shadow. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T22:06:10.000000Z"}, {"uuid": "8063b406-ab77-41ad-bb5e-f750a88a44c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46618", "type": "seen", "source": "https://t.me/cvedetector/23766", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46618 - JetBrains TeamCity Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46618 \nPublished : April 25, 2025, 3:15 p.m. | 1\u00a0hour, 44\u00a0minutes ago \nDescription : In JetBrains TeamCity before 2025.03.1 stored XSS was possible on Data Directory tab \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-25T19:11:11.000000Z"}, {"uuid": "46366d66-5df2-4007-9775-2482c32aac90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "published-proof-of-concept", "source": "Telegram/h03BTlMVhsmhX6D7e2vIwa5HqRH7sazB1QZ_U1Au3scT3K4", "content": "", "creation_timestamp": "2025-04-25T10:01:15.000000Z"}, {"uuid": "4a7ba73e-aa84-480c-bf4b-34612fdd1db1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46617", "type": "published-proof-of-concept", "source": "Telegram/h03BTlMVhsmhX6D7e2vIwa5HqRH7sazB1QZ_U1Au3scT3K4", "content": "", "creation_timestamp": "2025-04-25T10:01:15.000000Z"}, {"uuid": "7a4df783-356d-40c7-b66b-6ad96b2fa24e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46613", "type": "published-proof-of-concept", "source": "Telegram/8IwoWhZiAKbxjTlupBuXAluwjHl4CX-wAHfegaA8FtN0PbQ", "content": "", "creation_timestamp": "2025-04-25T09:00:38.000000Z"}]}