{"vulnerability": "CVE-2025-48799", "sightings": [{"uuid": "23de4540-9478-4222-a02e-469e62fdb78c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114823372995887246", "content": "", "creation_timestamp": "2025-07-09T12:53:48.488065Z"}, {"uuid": "4a040c91-5808-4d5b-acc1-8efb4bab9b1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "seen", "source": "https://bsky.app/profile/g0rosato.bsky.social/post/3ltugr2n4ks2u", "content": "", "creation_timestamp": "2025-07-13T17:50:36.058888Z"}, {"uuid": "bcafd9b7-41e8-4c8a-999b-a6234d12151a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ltknlaycx72a", "content": "", "creation_timestamp": "2025-07-09T20:25:59.067765Z"}, {"uuid": "7f8c7061-4ebe-47cf-b964-9e7c5b438e20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "seen", "source": "https://infosec.exchange/users/obivan/statuses/114821981896504343", "content": "", "creation_timestamp": "2025-07-09T07:00:02.011626Z"}, {"uuid": "a358daa5-472b-43f3-8918-ba3a11bc523c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "seen", "source": "https://bsky.app/profile/obivan.infosec.exchange.ap.brid.gy/post/3ltjak7k7bij2", "content": "", "creation_timestamp": "2025-07-09T07:00:09.752147Z"}, {"uuid": "5c9dbc31-9fa0-4af6-9a4a-16267b3eb98f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "seen", "source": "https://www.thezdi.com/blog/2025/7/8/the-july-2025-security-update-review", "content": "", "creation_timestamp": "2025-07-08T15:56:31.000000Z"}, {"uuid": "6e72613f-308f-4aea-9787-842dd7c66a05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "seen", "source": "https://infosec.exchange/users/0patch/statuses/115015575129238694", "content": "", "creation_timestamp": "2025-08-12T11:33:21.462179Z"}, {"uuid": "edeb2de5-c279-4d57-838e-302a877f49e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lw7b4izuim2g", "content": "", "creation_timestamp": "2025-08-12T11:59:16.760369Z"}, {"uuid": "ed828db5-45ed-40c1-acb8-2ba1cc923127", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "seen", "source": "https://t.me/GithubRedTeam/52219", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udee0\ufe0f Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.\nURL\uff1ahttps://github.com/mrk336/Header-Havoc-Cracking-CVE-2025-48799-in-Apache-Tomcat\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-19T03:25:49.000000Z"}, {"uuid": "878b37bf-3d79-431a-b148-0f0b72d092fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/269", "content": "PoC for CVE-2025-48799, an elevation of privilege vulnerability in Windows Update service\n\n\u2622\ufe0f https://github.com/Wh04m1001/CVE-2025-48799", "creation_timestamp": "2025-07-24T14:40:29.000000Z"}, {"uuid": "c9496837-8111-47f5-9907-fadbc8c77712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/43681", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis PoC for CVE-2025-48799 demonstrates an elevation of privilege vulnerability in Windows Update service, affecting Windows 10 and 11. \ud83d\udc31\ud83d\udcbb\ud83d\udd12\nURL\uff1ahttps://github.com/KOVmechatronics/CVE-2025-48799\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-11T15:05:17.000000Z"}, {"uuid": "6f646a84-944d-4619-86e3-3620a1f6a5d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/43915", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis PoC for CVE-2025-48799 demonstrates an elevation of privilege vulnerability in Windows Update service, affecting Windows 10 and 11. \ud83d\udc31\ud83d\udcbb\ud83d\udd12\nURL\uff1ahttps://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125-\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-13T16:49:58.000000Z"}, {"uuid": "ac6bab9f-f7fb-46c0-947d-7957593e4526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "Telegram/55J9ZBW3hjxUH6Z8LK9RbqYsk38oMcx5FhUAUPDc7u9zQY4", "content": "", "creation_timestamp": "2025-08-30T09:00:04.000000Z"}, {"uuid": "b04da4b9-d5c5-4f5d-bf4b-b09b5b5ebb5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/52696", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udee1\ufe0f Demonstrate CVE-2025-48799, a Windows Update service vulnerability that allows elevation of privilege via arbitrary folder deletion on multi-drive systems.\nURL\uff1ahttps://github.com/ukisshinaah/CVE-2025-48799\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-22T21:55:49.000000Z"}, {"uuid": "f048700b-79b0-4824-8b95-f7b2e887343e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/43957", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis PoC for CVE-2025-48799 demonstrates an elevation of privilege vulnerability in Windows Update service, affecting Windows 10 and 11. \ud83d\udc31\ud83d\udcbb\ud83d\udd12\nURL\uff1ahttps://github.com/SystemVll/CVE-2025-48827\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-14T02:21:41.000000Z"}, {"uuid": "d3d966fb-d5f5-4624-8879-bccd2621d1b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "Telegram/J-PhafyQf6f3Hij6OUnT0iaYNrRFOs8W10WphbkjXqmho4M", "content": "", "creation_timestamp": "2025-09-23T03:00:07.000000Z"}, {"uuid": "0edc9b6b-19de-449e-b74c-b30db51f6f2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/1226", "content": "\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0633\u0631\u0648\u06cc\u0633 wuauserv \u0645\u0631\u06a9\u0632 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u062a\u0639\u0631\u06cc\u0641 \u0646\u0627\u062f\u0631\u0633\u062a \u067e\u06cc\u0648\u0646\u062f\u0647\u0627\u06cc \u0646\u0645\u0627\u062f\u06cc\u0646 \u062f\u0631 \u062d\u06cc\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0641\u0627\u06cc\u0644 \u0627\u0633\u062a. \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0628\u0627 \u0627\u0646\u062c\u0627\u0645 \u0639\u0645\u0644\u06cc\u0627\u062a \u062d\u0630\u0641/\u062c\u0627\u0628\u062c\u0627\u06cc\u06cc/\u062a\u063a\u06cc\u06cc\u0631 \u0646\u0627\u0645 \u062f\u0627\u06cc\u0631\u06a9\u062a\u0648\u0631\u06cc\u200c\u0647\u0627\u060c \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0633\u0637\u062d \u0633\u06cc\u0633\u062a\u0645 \u0627\u0631\u062a\u0642\u0627 \u062f\u0647\u062f.\n\n\nBDU:2025-08180\nCVE-2025-48799\n\n\u0646\u0635\u0628 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0645\u0639\u062a\u0628\u0631.  \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 \u0648 \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc \u0627\u0632 \u0646\u0641\u0648\u0630 \u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc (\u0634\u0646\u0627\u0633\u0627\u06cc\u06cc\u060c \u062b\u0628\u062a) \u0648 \u067e\u0627\u0633\u062e \u0628\u0647 \u062a\u0644\u0627\u0634\u200c\u0647\u0627\u06cc\u06cc \u0628\u0631\u0627\u06cc \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u061b\n- \u0628\u0647 \u062d\u062f\u0627\u0642\u0644 \u0631\u0633\u0627\u0646\u062f\u0646 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u06a9\u0627\u0631\u0628\u0631\u061b\n- \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646/\u062d\u0630\u0641 \u062d\u0633\u0627\u0628\u200c\u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0646\u0634\u062f\u0647.\n\n\n\u062f\u0633\u062a\u0648\u0631\u0627\u0644\u0639\u0645\u0644\u200c\u0647\u0627\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48799\n\n\n\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ICSCERT_IR\n\u06af\u0631\u0648\u0647 \u0627\u06cc\u062a\u0627:\nhttps://eitaa.com/joinchat/1866007784Cfd023f90b2", "creation_timestamp": "2025-07-09T18:11:35.000000Z"}, {"uuid": "71e5b06c-a62f-4968-a803-fef4154a8536", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "Telegram/blcnSbKe3KoVn6z1Kt6-8AGb9WLxI7WZB7za81y_1yigRSI", "content": "", "creation_timestamp": "2025-09-19T09:00:04.000000Z"}, {"uuid": "e9b02173-4694-4a34-91cd-558fa177610d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/807370", "content": "{\n  \"Source\": \"https://htdark.com/index.php\",\n  \"Content\": \"PoC for CVE-2025-48799 elevation of privilege vulnerability in Windows Update\", \n  \"author\": \" (dEEpEst)\",\n  \"Detection Date\": \"11 Jul 2025\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2025-07-10T23:47:07.000000Z"}, {"uuid": "693f78ad-a8cb-4b40-9b69-0589d4dc6dc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "https://t.me/bhhub/847", "content": "Critical Vulnerabilities &amp; API Exploits\n\n\u2728 CVE-2025-48799 Proof of Concept on GitHub  \nA new PoC for **CVE-2025-48799** has surfaced, highlighting potential exploitation vectors. While details are scarce, such early leaks often precede widespread attacks\u2014monitor patches closely. The repo suggests a serious flaw, possibly impacting enterprise systems. Read more  \n\n\u2728 REST API Serialization Attacks: A Hidden Threat  \nManipulating serialization formats (JSON/XML) can bypass API auth and trigger RCE. This technique exploits parsers\u2019 lax validation\u2014prioritize input sanitization and strict schema enforcement. A must-read for devs hardening microservices. Read more  \n\n\u2728 Microsoft\u2019s Physical Security Fail: PII Exposure  \nA researcher breached Microsoft\u2019s guest check-in system, exposing **employee/visitor PII** via flawed access controls. Real-world impact: social engineering, physical intrusions. Highlights risks in merging digital and physical security. Read more", "creation_timestamp": "2025-07-19T13:37:16.000000Z"}, {"uuid": "d9d2ec67-78b8-43a8-987b-f927f3a762ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "https://t.me/bhhub/840", "content": "Top Cybersecurity Insights: CVE, Linux Evasion &amp; Bug Bounty  \n\n\u2728 GitHub - Wh04m1001/CVE-2025-48799  \nA new CVE-2025-48799 PoC has surfaced on GitHub, likely involving a critical vulnerability. Given the early disclosure (future dated CVE), this may be a placeholder or a speculative exploit. Red teams should monitor for validation while blue teams should check for potential patch progress. Read more  \n\n\u2728 Red Team Tactics: Evading EDR on Linux with io_uring  \nThis technical write-up details how attackers abuse Linux's io_uring subsystem to bypass EDR solutions\u2014a growing threat as cloud workloads shift to Linux. The technique highlights the need for behavioral monitoring beyond signature-based detection. Read more  \n\n\u2728 How I Found an IDOR and Got Paid  \nA real-world bug bounty case study where an Insecure Direct Object Reference (IDOR) flaw was exploited. The article underscores the importance of thorough access control testing, even in seemingly minor API endpoints. Read more", "creation_timestamp": "2025-07-18T13:37:18.000000Z"}, {"uuid": "8875d005-1996-4243-82b9-424837e46fa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "https://t.me/P0x3k_1N73LL1G3NC3/128", "content": "PoC for CVE-2025-48799, an elevation of privilege vulnerability in Windows Update service.\n\nhttps://github.com/Wh04m1001/CVE-2025-48799/", "creation_timestamp": "2025-07-08T21:14:59.000000Z"}, {"uuid": "c6fa1437-8a10-4351-a780-da9902d6d98f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "Telegram/eFRuzzeN1-jML4rbF1fHOQO9PKhaLan2-GVo0BiqDnLALA0", "content": "", "creation_timestamp": "2025-07-11T21:00:04.000000Z"}, {"uuid": "af2cf54f-0800-44d8-9d41-ff3bc47a6abd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "Telegram/2xXhGPgo5lMDuKCT2CQCO0nDS34WF8BNrQrYZsghIk6k2wk", "content": "", "creation_timestamp": "2025-07-12T03:00:10.000000Z"}, {"uuid": "05636601-4a79-430d-80a5-6e177cca361f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "Telegram/dhQS4aSRkzBP2xNhTxgWl93oTI3lydcQezpn91ZDL8rkFTo", "content": "", "creation_timestamp": "2025-07-11T15:00:06.000000Z"}, {"uuid": "d9fdb760-f388-4b3e-a6d3-a6813833f087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "published-proof-of-concept", "source": "Telegram/I0LEvQBF77v1Chv5gS_SpWpueIU2t9JgQ9nnvbseDSK9WMg", "content": "", "creation_timestamp": "2025-07-09T03:00:10.000000Z"}, {"uuid": "e0ed8c8c-df45-4fd4-9f71-1b0ff66ca87f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48799", "type": "seen", "source": "https://t.me/proxy_bar/2668", "content": "CVE-2025-48799\n*\nLPE - Windows Update service\n\n\u0421 \u0437\u0430\u043c\u0435\u043d\u043e\u0439 \u0445\u0430\u0440\u0434\u043e\u0432 \u044d\u0442\u043e \u043a\u043e\u043d\u0435\u0447\u043d\u043e \u043a\u0440\u0443\u0442\u043e\nWinUpdateEOP\n\n#win #lpe", "creation_timestamp": "2025-07-08T20:37:25.000000Z"}]}