{"vulnerability": "CVE-2025-4806", "sightings": [{"uuid": "c6069fe7-776c-4239-8832-1abf2dc5a823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48060", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lppjj7tzr42h", "content": "", "creation_timestamp": "2025-05-21T21:15:47.363087Z"}, {"uuid": "c10de8dd-684e-4f7c-8924-1c118575f02e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48064", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lppkgjrka22p", "content": "", "creation_timestamp": "2025-05-21T21:32:10.896414Z"}, {"uuid": "bf1f1c8a-d3de-4ee3-b9fc-7803382672d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48069", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lppjp6wds62l", "content": "", "creation_timestamp": "2025-05-21T21:19:07.606291Z"}, {"uuid": "9ab3ceb9-43f0-45b5-accd-2349524fb4a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48060", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3lqhdrp4hyr2z", "content": "", "creation_timestamp": "2025-05-31T08:37:03.348429Z"}, {"uuid": "97f63cda-edf7-4dc0-97c6-8f08db4ef8e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48063", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpplkdiabf2l", "content": "", "creation_timestamp": "2025-05-21T21:52:12.391378Z"}, {"uuid": "82ee1a7d-9829-4578-a717-e23207ba7a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48067", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrbf4z7oo52q", "content": "", "creation_timestamp": "2025-06-10T17:10:29.703796Z"}, {"uuid": "615938e4-049a-41b6-969e-4a6ec6a465cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48066", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lprub7cdlq2m", "content": "", "creation_timestamp": "2025-05-22T19:33:29.248246Z"}, {"uuid": "07d32734-df6a-486b-95cf-c55e733bf0cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48068", "type": "seen", "source": "https://bsky.app/profile/redmin78.bsky.social/post/3lqcq46gck22x", "content": "", "creation_timestamp": "2025-05-29T12:34:23.285988Z"}, {"uuid": "3eef67d6-0cb4-475f-9389-74b704a2a850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-48068", "type": "seen", "source": "https://bsky.app/profile/azu.bsky.social/post/3lqcuvbhrsb27", "content": "", "creation_timestamp": "2025-05-29T13:59:57.863610Z"}, {"uuid": "a6106f85-e6ab-4a93-b56b-c2da770e6152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48068", "type": "seen", "source": "https://bsky.app/profile/feedbot.unronritaro.net/post/3lqcvoejafb2e", "content": "", "creation_timestamp": "2025-05-29T14:14:00.776569Z"}, {"uuid": "e1c2fb10-8431-42ec-b7ae-3312004028fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48061", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114552716789860574", "content": "", "creation_timestamp": "2025-05-22T17:42:22.692164Z"}, {"uuid": "4bb66ccd-1ccc-49d5-8992-f1f52d1f2901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48062", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114653505710010379", "content": "", "creation_timestamp": "2025-06-09T12:54:19.676204Z"}, {"uuid": "42e7aab4-2397-4013-ab2f-df8e9e04a246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48061", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lprtm466qb2q", "content": "", "creation_timestamp": "2025-05-22T19:21:41.116632Z"}, {"uuid": "a21305da-e9e4-41ed-a5a9-ee257c80548e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48068", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqeeu563ut52", "content": "", "creation_timestamp": "2025-05-30T04:18:31.077186Z"}, {"uuid": "43deb936-44c4-4723-9af6-50623bddd40a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48068", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lqe64gjdrg2z", "content": "", "creation_timestamp": "2025-05-30T02:17:42.113657Z"}, {"uuid": "fe3a42e3-7133-49cb-b04c-6a02a720e2d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48065", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5crgeuop662", "content": "", "creation_timestamp": "2025-11-10T23:25:46.093425Z"}, {"uuid": "e9efae5a-458d-451e-8367-405a4df2b8ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48068", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lqxxscuvzc23", "content": "", "creation_timestamp": "2025-06-06T23:17:58.357979Z"}, {"uuid": "993c0adf-48bd-4cd2-a20d-ca45c11170d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48060", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lvq4ex76m22v", "content": "", "creation_timestamp": "2025-08-06T11:24:38.964540Z"}, {"uuid": "3add2f25-9aa6-47b5-b790-7e32a5604e79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-48068", "type": "seen", "source": "https://bsky.app/profile/rss.y-u-e.workers.dev/post/3lqeulx53wq2z", "content": "", "creation_timestamp": "2025-05-30T09:00:05.193396Z"}, {"uuid": "04924d07-c458-4eb1-a626-523cc88d03b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48060", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lujalmmta32s", "content": "", "creation_timestamp": "2025-07-22T00:26:04.414860Z"}, {"uuid": "ed81fd29-338d-49eb-b3f8-74de81d52bb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48065", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5cntcskwo52", "content": "", "creation_timestamp": "2025-11-10T22:22:39.682991Z"}, {"uuid": "a479056e-da0b-4f5c-85b5-18e675a1f133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48062", "type": "published-proof-of-concept", "source": "Telegram/AvRPE1FYyApk1Jln3Af0piOZ09oDjaUbhCE1oirCL83hBqc", "content": "", "creation_timestamp": "2025-06-09T13:02:03.000000Z"}, {"uuid": "cf4557a2-1cc1-41a7-ab0f-b99d2ede1aa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48060", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3lyfe5nspsbd2", "content": "", "creation_timestamp": "2025-09-09T09:01:22.755961Z"}, {"uuid": "c97916b3-5ccb-4b77-a616-e5522a9491db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-48060", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "e0bc28cd-1ea0-4f44-8620-7fe0ee6395d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48065", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5cmd4fe4l2k", "content": "", "creation_timestamp": "2025-11-10T21:54:09.981860Z"}, {"uuid": "8b0aa28d-7607-426f-a4cf-b0c1b9d9f686", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48060", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lww7uuzyes2e", "content": "", "creation_timestamp": "2025-08-21T15:08:22.652735Z"}, {"uuid": "af94466a-b9ef-4cbc-8f2f-2baaa3dfbd16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48060", "type": "published-proof-of-concept", "source": "Telegram/Ns295Xx0Xp8KaiaZ06G73Mj8cXFKczW4UsqP7II1El4numc", "content": "", "creation_timestamp": "2025-11-16T15:00:07.000000Z"}, {"uuid": "48b874e7-9f80-4cc7-99c1-36efb03a0acf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48060", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/59876", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aBackported the upstream fix for CVE-2025-48060 (heap buffer overflow in jv_string_empty) to jq 1.6.\nURL\uff1ahttps://github.com/leorivass/jq-els-backport-cve-2025-48060\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-16T07:12:47.000000Z"}, {"uuid": "da45f26b-ae91-4be5-b91d-7ce8610c7e72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4806", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16736", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4806\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in SourceCodester/oretnom23 Stock Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/?page=back_order/view_bo. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-16T19:00:06.184Z\n\ud83d\udccf Modified: 2025-05-16T19:16:33.473Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309260\n2. https://vuldb.com/?ctiid.309260\n3. https://vuldb.com/?submit.572219\n4. https://github.com/th3w0lf-1337/Vulnerabilities/blob/main/SMS-PHP/SQLi/Back-Order/info.md", "creation_timestamp": "2025-05-16T19:34:34.000000Z"}, {"uuid": "85673e40-000b-4ff8-80bd-79c9bf990bf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48061", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17337", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48061\n\ud83d\udd25 CVSS Score: 5.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: wire-webapp is the web application for the open-source messaging service Wire. A change caused a regression resulting in sessions not being properly invalidated. A user that logged out of the Wire webapp, could have been automatically logged in again after re-opening the application. This does not happen when the user is logged in as a temporary user by selecting \"This is a public computer\" during login or the user selects \"Delete all your personal information and conversations on this device\" upon logout. The underlying issue has been fixed with wire-webapp version 2025-05-20-production.0. As a workaround, this behavior can be prevented by either deleting all information upon logout as well as logging in as a temporary client.\n\ud83d\udccf Published: 2025-05-22T17:04:42.918Z\n\ud83d\udccf Modified: 2025-05-22T17:32:16.333Z\n\ud83d\udd17 References:\n1. https://github.com/wireapp/wire-webapp/security/advisories/GHSA-7r6m-qjwm-w44q", "creation_timestamp": "2025-05-22T17:43:38.000000Z"}, {"uuid": "bec7905f-294b-42ce-8a7e-c4f97ab8d43b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48067", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17895", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48067\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L)\n\ud83d\udd39 Description: OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2.\n\ud83d\udccf Published: 2025-06-10T15:19:44.186Z\n\ud83d\udccf Modified: 2025-06-10T15:19:44.186Z\n\ud83d\udd17 References:\n1. https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-m9jh-jf9h-x3h2", "creation_timestamp": "2025-06-10T15:30:50.000000Z"}]}