{"vulnerability": "CVE-2025-4773", "sightings": [{"uuid": "53197c79-74db-44c5-a4a3-ce3197e7b2ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4773", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpciznz5g22n", "content": "", "creation_timestamp": "2025-05-16T17:02:31.911157Z"}, {"uuid": "f98483ce-c93e-490d-a983-0229c695c9fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47732", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3looy6d4ntx2n", "content": "", "creation_timestamp": "2025-05-08T22:40:16.495033Z"}, {"uuid": "be7a7af5-d21f-4cfc-8d4a-3213b4201320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47733", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114474625505155153", "content": "", "creation_timestamp": "2025-05-08T22:42:44.630278Z"}, {"uuid": "959b6df1-3d9c-45d3-8c3d-f7bee3df963b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47732", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114474625505155153", "content": "", "creation_timestamp": "2025-05-08T22:42:44.718443Z"}, {"uuid": "8f22f6e4-8a35-4686-a929-f1f0d9e47c94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47732", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3looxx5aur5h2", "content": "", "creation_timestamp": "2025-05-08T23:15:37.403561Z"}, {"uuid": "daf0a98b-f50d-47f9-8a50-1cc6274bed48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47733", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3looxx5igsay2", "content": "", "creation_timestamp": "2025-05-08T23:15:38.011670Z"}, {"uuid": "a79c9a31-49d7-4f27-b9fb-abfa425404d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47732", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lop6wwbobc24", "content": "", "creation_timestamp": "2025-05-09T00:41:27.664730Z"}, {"uuid": "4abe7f05-eaf3-4a7a-a64f-625c3fcdb55c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47733", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lop6wwiets2t", "content": "", "creation_timestamp": "2025-05-09T00:41:28.896688Z"}, {"uuid": "706ad442-23fe-43d9-b07c-a315e0fc29a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47730", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lord65rmib27", "content": "", "creation_timestamp": "2025-05-09T21:02:22.926179Z"}, {"uuid": "2d9f5eef-d574-40f3-96aa-65e2cf70f24c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47730", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loo2kdexbxg2", "content": "", "creation_timestamp": "2025-05-08T14:05:35.928423Z"}, {"uuid": "0ee6ebdc-f768-4f03-b0bc-97dbde9c04da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47730", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114472660231562952", "content": "", "creation_timestamp": "2025-05-08T14:22:56.469868Z"}, {"uuid": "8a0226bf-8fc9-49b8-a5ab-7da209d8bb25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47730", "type": "seen", "source": "https://bsky.app/profile/todb2.hugesuccess.org/post/3loo5xjgi2452", "content": "", "creation_timestamp": "2025-05-08T14:51:21.974580Z"}, {"uuid": "aaf88f4d-6b08-4ad3-b99f-b28be1a5399f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47730", "type": "seen", "source": "https://infosec.exchange/users/todb/statuses/114472771122739056", "content": "", "creation_timestamp": "2025-05-08T14:52:10.118726Z"}, {"uuid": "2f9aff73-20d5-4b77-8d6f-4f54dee9b654", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47732", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15629", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47732\n\ud83d\udd25 CVSS Score: 8.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Dataverse Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2025-05-08T22:17:27.315Z\n\ud83d\udccf Modified: 2025-05-08T22:17:27.315Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47732", "creation_timestamp": "2025-05-08T22:24:57.000000Z"}, {"uuid": "77114682-2475-404e-9f5b-36df16be0b4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47733", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0156", "content": "", "creation_timestamp": "2025-05-13T17:10:10.000000Z"}, {"uuid": "f0d72f73-befd-4b08-a142-55a0ed04e52b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-477339", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0156", "content": "", "creation_timestamp": "2025-05-13T17:10:10.000000Z"}, {"uuid": "7ac9bd63-b289-4b8d-8059-fd3a687986da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47732", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0154", "content": "", "creation_timestamp": "2025-05-13T16:44:03.000000Z"}, {"uuid": "bfb8de48-9bbc-410c-a0fe-2df619e42e6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47732", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "d856856f-35d1-4405-97bb-74b42f1b39e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47733", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "d8ad5578-b8f8-4b59-8570-c1f338927e49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47730", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15519", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47730\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The TeleMessage archiving backend through 2025-05-05 accepts API calls (to request an authentication token) from the TM SGNL (aka Archive Signal) app with the credentials of logfile for the user and enRR8UVVywXYbFkqU#QDPRkO for the password.\n\ud83d\udccf Published: 2025-05-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-08T13:16:24.374Z\n\ud83d\udd17 References:\n1. https://news.ycombinator.com/item?id=43909220\n2. https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-stops-operations-after-report-it-was-hacked/\n3. https://www.theregister.com/2025/05/05/telemessage_investigating/\n4. https://github.com/micahflee/TM-SGNL-Android/blob/bd7ccbb8bc79193fc4c57cae7cc1051e6250fa89/app/src/tm/java/org/archiver/ArchiveConstants.kt#L45-:L46", "creation_timestamp": "2025-05-08T13:24:36.000000Z"}, {"uuid": "7270ab89-8889-492c-86e4-141b25324d5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47733", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15630", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47733\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network\n\ud83d\udccf Published: 2025-05-08T22:17:26.608Z\n\ud83d\udccf Modified: 2025-05-08T22:17:26.608Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733", "creation_timestamp": "2025-05-08T22:24:59.000000Z"}, {"uuid": "e499a768-5c77-492a-bc5e-80b53f96581c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47733", "type": "seen", "source": "https://t.me/cvedetector/24873", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47733 - Microsoft Power Apps SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-47733 \nPublished : May 8, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T01:59:26.000000Z"}, {"uuid": "90e84102-2733-4781-b961-50b1e17f9d0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47737", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15769", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47737\n\ud83d\udd25 CVSS Score: 2.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: lib.rs in the trailer crate through 0.1.2 for Rust mishandles allocating with a size of zero.\n\ud83d\udccf Published: 2025-05-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-09T15:54:31.213Z\n\ud83d\udd17 References:\n1. https://github.com/Geal/trailer/issues/2\n2. https://crates.io/crates/trailer", "creation_timestamp": "2025-05-09T16:25:08.000000Z"}, {"uuid": "178663d3-b5fe-4756-b4e8-5f48b2274c9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4773", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16684", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4773\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in PHPGurukul Online Course Registration 3.1 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/level.php. The manipulation of the argument level leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-16T12:31:05.977Z\n\ud83d\udccf Modified: 2025-05-16T13:02:12.346Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309074\n2. https://vuldb.com/?ctiid.309074\n3. https://vuldb.com/?submit.572144\n4. https://github.com/FLYFISH567/CVE/issues/6\n5. https://phpgurukul.com/", "creation_timestamp": "2025-05-16T13:35:48.000000Z"}, {"uuid": "b69f7bfa-3de1-4def-b70f-3878d89ea944", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47730", "type": "seen", "source": "https://t.me/cvedetector/24824", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47730 - TeleMessage API Authentication Token Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-47730 \nPublished : May 8, 2025, 2:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : The TeleMessage archiving backend through 2025-05-05 accepts API calls (to request an authentication token) from the TM SGNL (aka Archive Signal) app with the credentials of logfile for the user and enRR8UVVywXYbFkqU#QDPRkO for the password. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T17:36:59.000000Z"}, {"uuid": "c2fb7dd8-5bd2-418a-9006-83599c007d9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47737", "type": "seen", "source": "https://t.me/cvedetector/24908", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47737 - Trailer lib.rs Zero-Sized Allocation Mishandle\", \n  \"Content\": \"CVE ID : CVE-2025-47737 \nPublished : May 9, 2025, 5:15 a.m. | 40\u00a0minutes ago \nDescription : lib.rs in the trailer crate through 0.1.2 for Rust mishandles allocating with a size of zero. \nSeverity: 2.9 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T08:41:09.000000Z"}, {"uuid": "2e50ec43-a571-477b-a8b0-a36bbadb6f90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47735", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15676", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47735\n\ud83d\udd25 CVSS Score: 2.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: inner::drop in inner.rs in the wgp crate through 0.2.0 for Rust lacks drop_slow thread synchronization.\n\ud83d\udccf Published: 2025-05-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-09T04:49:30.938Z\n\ud83d\udd17 References:\n1. https://github.com/Nugine/wgp/issues/1\n2. https://crates.io/crates/wgp", "creation_timestamp": "2025-05-09T05:24:31.000000Z"}, {"uuid": "4a0268f0-f8f0-4a0b-9a1a-99c8576cb826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47736", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15675", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47736\n\ud83d\udd25 CVSS Score: 2.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: dialect/mod.rs in the libsql-sqlite3-parser crate through 0.13.0 before 14f422a for Rust can crash if the input is not valid UTF-8.\n\ud83d\udccf Published: 2025-05-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-09T04:53:05.873Z\n\ud83d\udd17 References:\n1. https://github.com/tursodatabase/libsql/issues/2052\n2. https://github.com/gwenn/lemon-rs/issues/86\n3. https://github.com/gwenn/lemon-rs/pull/8\n4. https://crates.io/crates/libsql-sqlite3-parser", "creation_timestamp": "2025-05-09T05:24:31.000000Z"}, {"uuid": "43a12116-a407-4d39-a0e6-7f30b37a9d44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47732", "type": "seen", "source": "https://t.me/cvedetector/24882", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47732 - Microsoft Dataverse Remote Code Execution (RCE)\", \n  \"Content\": \"CVE ID : CVE-2025-47732 \nPublished : May 8, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Microsoft Dataverse Remote Code Execution Vulnerability \nSeverity: 8.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T01:59:35.000000Z"}, {"uuid": "4afcb988-d7ba-4a10-a7d1-175d13853bca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47736", "type": "seen", "source": "https://t.me/cvedetector/24907", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47736 - SQLite3 Parser Invalid UTF-8 Input Crash\", \n  \"Content\": \"CVE ID : CVE-2025-47736 \nPublished : May 9, 2025, 5:15 a.m. | 40\u00a0minutes ago \nDescription : dialect/mod.rs in the libsql-sqlite3-parser crate through 0.13.0 before 14f422a for Rust can crash if the input is not valid UTF-8. \nSeverity: 2.9 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T08:41:05.000000Z"}, {"uuid": "ec85701f-1da4-4293-8dec-efbd745dee10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47735", "type": "seen", "source": "https://t.me/cvedetector/24906", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47735 - Wgp Rust Lack of Drop Slow Thread Synchronization\", \n  \"Content\": \"CVE ID : CVE-2025-47735 \nPublished : May 9, 2025, 5:15 a.m. | 40\u00a0minutes ago \nDescription : inner::drop in inner.rs in the wgp crate through 0.2.0 for Rust lacks drop_slow thread synchronization. \nSeverity: 2.9 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T08:41:04.000000Z"}]}