{"vulnerability": "CVE-2025-6777", "sightings": [{"uuid": "12d65a36-28ce-42ed-ab2b-c5ab2d4244b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/115715626333380839", "content": "", "creation_timestamp": "2025-12-14T02:45:34.100123Z"}, {"uuid": "402d9e94-28ef-480a-b397-9d70d297adc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6777", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsmwgagxtn2v", "content": "", "creation_timestamp": "2025-06-28T00:44:21.535875Z"}, {"uuid": "9f95a193-17de-4612-b940-e6df9f60cd03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-67779", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115707047280148200", "content": "", "creation_timestamp": "2025-12-12T14:23:48.118591Z"}, {"uuid": "8cd34ed1-0ae3-4303-b733-faa9cd6784af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m7tjyvczmp23", "content": "", "creation_timestamp": "2025-12-13T02:18:18.858991Z"}, {"uuid": "be3e8e3f-6a13-4ab4-b4cd-10919dbc372e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3m7tq2kwvzo2a", "content": "", "creation_timestamp": "2025-12-13T04:06:37.033480Z"}, {"uuid": "b52aa864-9ff5-43a8-b63b-c7a7989d396b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://bsky.app/profile/react.dev/post/3m7qs2rtey22l", "content": "", "creation_timestamp": "2025-12-12T00:04:32.837810Z"}, {"uuid": "a0f30255-d159-442f-9bb3-0c77de5aac99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://bsky.app/profile/hn100.bsky.social/post/3m7qyqjxnus2f", "content": "", "creation_timestamp": "2025-12-12T02:04:06.505183Z"}, {"uuid": "0843eae1-b4fd-41f5-bf89-2f5a3f73fbd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://bsky.app/profile/hnws.bsky.social/post/3m7qyt7zrry2i", "content": "", "creation_timestamp": "2025-12-12T02:05:34.893708Z"}, {"uuid": "41d52434-d429-4edd-9642-790934ebbbed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://bsky.app/profile/cyberkendra.com/post/3m7r4nrbdfc2l", "content": "", "creation_timestamp": "2025-12-12T03:14:11.914693Z"}, {"uuid": "fb89d52a-8eed-422b-ba9c-2378d1fcc6fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7r5chsn6u2q", "content": "", "creation_timestamp": "2025-12-12T03:25:41.819724Z"}, {"uuid": "fa48cfc6-f2cb-4d98-9dc8-723d051578c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://bsky.app/profile/peterrobards.bsky.social/post/3m7rei52ye22f", "content": "", "creation_timestamp": "2025-12-12T05:34:08.061837Z"}, {"uuid": "b4a71813-ca43-493d-878a-d790b16d932f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-c79eab72-2e4a9f98586ddbae", "content": "", "creation_timestamp": "2025-12-12T07:37:29.220492Z"}, {"uuid": "1da447d1-a1ec-4575-ab62-d516300a52a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/276", "content": "", "creation_timestamp": "2025-12-14T18:27:29.000000Z"}, {"uuid": "586c51d6-479c-406b-9cfc-18268f9b86e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://threatintel.cc/2025/12/13/new-react-rsc-vulnerabilities-enable.html", "content": "", "creation_timestamp": "2025-12-14T01:45:43.000000Z"}, {"uuid": "1b0ace7f-62f8-4b56-9da1-78297a6d9f7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/6739b288-995a-4f1a-9f03-5d1ced3a8fbd", "content": "", "creation_timestamp": "2025-12-05T13:54:28.321487Z"}, {"uuid": "79adf98a-f780-4adc-9232-50ab32e6eca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://gist.github.com/cbardin89/4eb81c1bae832e32b05c7475ac33ca2a", "content": "", "creation_timestamp": "2025-12-15T11:59:42.000000Z"}, {"uuid": "29f96552-4edd-41c3-902d-22287bbf1cd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://gist.github.com/casamia918/a23a22296d29116230c41112aec1317e", "content": "", "creation_timestamp": "2025-12-15T14:33:50.000000Z"}, {"uuid": "e8413bb5-c0cc-46f9-89e5-a8b21e9f35a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/react-security-advisory-av25-834", "content": "", "creation_timestamp": "2025-12-15T16:10:44.000000Z"}, {"uuid": "fe0ea31e-020a-45d2-996a-53d4442bebc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://gist.github.com/cbardin89/256e142d3cef52eae89581fd02faff48", "content": "", "creation_timestamp": "2025-12-16T02:23:45.000000Z"}, {"uuid": "a1047c24-bf36-4595-bf5a-e2352c9c4e3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://bsky.app/profile/thecascading.bsky.social/post/3mao7jqj3ix2q", "content": "", "creation_timestamp": "2025-12-23T16:52:45.633086Z"}, {"uuid": "fe15a693-081c-4b2b-b017-6bca1d9333cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6777", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19780", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6777\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in code-projects Food Distributor Site 1.0. This issue affects some unknown processing of the file /admin/process_login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-06-27T20:31:05.431Z\n\ud83d\udccf Modified: 2025-06-27T20:46:34.445Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.314093\n2. https://vuldb.com/?ctiid.314093\n3. https://vuldb.com/?submit.602598\n4. https://github.com/fubxx/CVE/blob/main/Food%20Distributor%20system%20SQL1.md\n5. https://code-projects.org/", "creation_timestamp": "2025-06-27T20:52:26.000000Z"}, {"uuid": "efba2cf7-6124-4cd3-b672-654bfe5a092f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-67779", "type": "seen", "source": "https://gist.github.com/fordeveloper25/1088982fe78acfda3bca94807b35aa77", "content": "", "creation_timestamp": "2026-04-21T13:18:37.000000Z"}]}