{"vulnerability": "CVE-2025-6279", "sightings": [{"uuid": "71c60b00-5c7c-4822-a218-389f61a5497c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-62794", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4c3wlxhnf23", "content": "", "creation_timestamp": "2025-10-28T23:35:38.441539Z"}, {"uuid": "9cc8998e-13b7-423e-a1a9-7e4040c40e46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6279", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lryp5vph2e25", "content": "", "creation_timestamp": "2025-06-19T23:41:11.023960Z"}, {"uuid": "0f616cb8-acbe-4987-8b38-df6b501f99f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-62796", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4c57tsqrn2p", "content": "", "creation_timestamp": "2025-10-28T23:58:42.468204Z"}, {"uuid": "1ee1b50f-16c1-45a2-8ae1-d3c2066c579d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-62798", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4c5rqoabv2b", "content": "", "creation_timestamp": "2025-10-29T00:08:43.195156Z"}, {"uuid": "9d4ae3ef-6497-4e60-b77b-acc1a017cdbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-62799", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116013047108140902", "content": "", "creation_timestamp": "2026-02-04T15:23:34.700645Z"}, {"uuid": "4f8d71df-11ff-420d-85db-8728d18ba0f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-62793", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m47l7tpqzv2p", "content": "", "creation_timestamp": "2025-10-27T23:31:15.452614Z"}, {"uuid": "adc7cc4d-59e1-481b-923c-120b4c360cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-62797", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4efyvjtqt2u", "content": "", "creation_timestamp": "2025-10-29T21:41:12.709505Z"}, {"uuid": "a0a6766a-7aa0-4c00-8053-eb3e5f0b7787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6279", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18884", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6279\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in Upsonic up to 0.55.6. This issue affects the function cloudpickle.loads of the file /tools/add_tool of the component Pickle Handler. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-06-19T21:00:14.350Z\n\ud83d\udccf Modified: 2025-06-19T21:00:14.350Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.313283\n2. https://vuldb.com/?ctiid.313283\n3. https://vuldb.com/?submit.593099\n4. https://github.com/Upsonic/Upsonic/issues/353", "creation_timestamp": "2025-06-19T21:44:52.000000Z"}]}