{"vulnerability": "CVE-2025-4728", "sightings": [{"uuid": "1bb8e608-d086-4369-a8dc-f26077d92865", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47280", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2yrdltkhr2", "content": "", "creation_timestamp": "2025-05-13T17:44:40.949958Z"}, {"uuid": "4460dc1c-8893-4f10-9df4-f9d9fdad27b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47289", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqmzpeqwn42s", "content": "", "creation_timestamp": "2025-06-02T14:52:46.135251Z"}, {"uuid": "f177f16e-77b5-4f31-b22b-4ffba5e3ba2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47287", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lpwwzwhwg22g", "content": "", "creation_timestamp": "2025-05-24T20:06:27.879321Z"}, {"uuid": "520eccf4-e0a4-45e7-a07e-809e6194899a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47287", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lqczlxq4pc2y", "content": "", "creation_timestamp": "2025-05-29T15:24:17.196409Z"}, {"uuid": "09b5f2e7-3b40-407f-b4f7-b0262aaf982d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47282", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114535847071295088", "content": "", "creation_timestamp": "2025-05-19T18:12:11.327111Z"}, {"uuid": "f2b1b010-8fe9-4b7d-b22a-7520f98c9524", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47288", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqdjbkmksz52", "content": "", "creation_timestamp": "2025-05-29T20:04:57.556842Z"}, {"uuid": "1e4088d2-4d6a-427d-9e76-c9c6b7d543b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47281", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3luodmntkko27", "content": "", "creation_timestamp": "2025-07-24T01:03:38.521346Z"}, {"uuid": "61eb62d7-2a0f-4d01-b9f5-ccc07297298b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47285", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpa7b7pkxn2r", "content": "", "creation_timestamp": "2025-05-15T19:02:29.630638Z"}, {"uuid": "8f959bb2-1285-4bc5-b4f0-27c3a64daa07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47287", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpamomwuhf2n", "content": "", "creation_timestamp": "2025-05-15T23:02:35.166936Z"}, {"uuid": "17bcf37d-407f-47a9-840f-f9f773edb8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47286", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5chngb6zu2x", "content": "", "creation_timestamp": "2025-11-10T20:30:27.527060Z"}, {"uuid": "b510da4d-9984-436c-8cb4-0cc4dac951db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47287", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3me4niaiey32j", "content": "", "creation_timestamp": "2026-02-05T14:55:18.723499Z"}, {"uuid": "ab94c489-ace3-40d4-a7d8-c7247dd6564d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47282", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16971", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47282\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Gardener External DNS Management is an environment to manage external DNS entries for a kubernetes cluster. A security vulnerability was discovered in Gardener's External DNS Management prior to version 0.23.6 that could allow a user with administrative privileges for a Gardener project or a user with administrative privileges for a shoot cluster, including administrative privileges for a single namespace of the shoot cluster, to obtain control over the seed cluster where the shoot cluster is managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. The affected component is `gardener/external-dns-management`. The `external-dns-management` component may also be deployed on the seeds by the `gardener/gardener-extension-shoot-dns-service` extension when the extension is enabled. In this case, all versions of the `shoot-dns-service` extension `&lt;= v1.60.0` are affected by this vulnerability. Version 0.23.6 of Gardener External DNS Management fixes the issue.\n\ud83d\udccf Published: 2025-05-19T17:53:28.412Z\n\ud83d\udccf Modified: 2025-05-20T13:10:56.740Z\n\ud83d\udd17 References:\n1. https://github.com/gardener/external-dns-management/security/advisories/GHSA-xwgg-m7fx-83wx", "creation_timestamp": "2025-05-20T13:40:26.000000Z"}, {"uuid": "9fca3700-59a9-4444-bab5-5ef696ea7ab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47285", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16541", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47285\n\ud83d\udd25 CVSS Score: 2.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: Vyper is the Pythonic Programming Language for the Ethereum Virtual Machine. In versions up to and including 0.4.2rc1, `concat()` may skip evaluation of side effects when the length of an argument is zero. This is due to a fastpath in the implementation which skips evaluation of argument expressions when their length is zero. In practice, it would be very unusual in user code to construct zero-length bytestrings using an expression with side-effects, since zero-length bytestrings are typically constructed with the empty literal `b\"\"`; the only way to construct an empty bytestring which has side effects would be with the ternary operator introduced in v0.3.8, e.g. `b\"\" if self.do_some_side_effect() else b\"\"`. The fix is available in pull request 4644 and expected to be part of the 0.4.2 release. As a workaround, don't have side effects in expressions which construct zero-length bytestrings.\n\ud83d\udccf Published: 2025-05-15T17:24:03.442Z\n\ud83d\udccf Modified: 2025-05-15T17:24:03.442Z\n\ud83d\udd17 References:\n1. https://github.com/vyperlang/vyper/security/advisories/GHSA-qhr6-mgqr-mchm\n2. https://github.com/vyperlang/vyper/pull/4644\n3. https://github.com/vyperlang/vyper/blob/68b68c4b30c5ef2f312b4674676170b8a6eaa316/vyper/builtins/functions.py#L560-L562", "creation_timestamp": "2025-05-15T17:34:32.000000Z"}, {"uuid": "d77e1e31-5297-4712-93b4-aa6b73e8b421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47287", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16573", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47287\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.\n\ud83d\udccf Published: 2025-05-15T21:17:55.188Z\n\ud83d\udccf Modified: 2025-05-15T21:17:55.188Z\n\ud83d\udd17 References:\n1. https://github.com/tornadoweb/tornado/security/advisories/GHSA-7cx3-6m66-7c5m\n2. https://github.com/tornadoweb/tornado/commit/b39b892bf78fe8fea01dd45199aa88307e7162f3", "creation_timestamp": "2025-05-15T21:33:28.000000Z"}, {"uuid": "8d759010-250b-4102-8fd2-9f1aed0b9586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4728", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16586", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4728\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in SourceCodester Best Online News Portal 1.0. It has been classified as critical. Affected is an unknown function of the file /search.php. The manipulation of the argument searchtitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-15T23:00:11.133Z\n\ud83d\udccf Modified: 2025-05-15T23:00:11.133Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309030\n2. https://vuldb.com/?ctiid.309030\n3. https://vuldb.com/?submit.570677\n4. https://github.com/Lena-lyy/SQL/issues/4\n5. https://www.sourcecodester.com/", "creation_timestamp": "2025-05-15T23:36:29.000000Z"}, {"uuid": "d7d8c654-7470-4f89-b0f8-fc994c2711af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47283", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16973", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47283\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Gardener implements the automated management and operation of Kubernetes clusters as a service. A security vulnerability was discovered in Gardener prior to versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 that could allow a user with administrative privileges for a Gardener project to obtain control over the seed cluster(s) where their shoot clusters are managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. `gardener/gardener` (`gardenlet`) is the affected component. Versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 fix the issue.\n\ud83d\udccf Published: 2025-05-19T18:46:11.863Z\n\ud83d\udccf Modified: 2025-05-20T13:10:08.239Z\n\ud83d\udd17 References:\n1. https://github.com/gardener/gardener/security/advisories/GHSA-3hw7-qj9h-r835", "creation_timestamp": "2025-05-20T13:40:27.000000Z"}, {"uuid": "cf62a5df-cb0b-47cf-8f8a-a210ac829eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47280", "type": "published-proof-of-concept", "source": "https://t.me/cvedetector/25238", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47280 - Umbraco Forms Email Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-47280 \nPublished : May 13, 2025, 5:16 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : Umbraco Forms is a form builder that integrates with the Umbraco content management system. Starting in the 7.x branch and prior to versions 13.4.2 and 15.1.2, the 'Send email' workflow does not HTML encode the user-provided field values in the sent email message, making any form with this workflow configured vulnerable, as it allows sending the message from a trusted system and address, potentially bypassing spam and email client security systems. This issue affects all (supported) versions Umbraco Forms and is patched in 13.4.2 and 15.1.2. Unpatched or unsupported versions can workaround this issue by using the `Send email with template (Razor)` workflow instead or writing a custom workflow type. To avoid accidentally using the vulnerable workflow again, the `SendEmail` workflow type can be removed using a composer available in the GitHub Security Advisory for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:48.000000Z"}]}