{"uuid": "2eabe3e6-a1c7-410e-9a55-202f3b991e96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32395", "type": "exploited", "source": "https://t.me/jj_8tl/205", "content": "\u26a1\ufe0fThe vulnerability details are now available: https://t.co/g8DwnUIc32\n\n\ud83d\udea8\ud83d\udea8CVE-2025-32395: Vite Arbitrary File Read Vulnerability\nVite\u2019s URL parsing chokes on specific query params, letting attackers bypass security checks with a carefully crafted request. They can read ANY file on the server\u2014think config files, API keys, or other sensitive goodies.\n\ud83d\udd25PoC:  https://t.co/lDnhDsNUBQ\n\nZoomEye Dork\ud83d\udc49app=\"Vite\"\nUncovers 9K+ exposed instances!\nZoomEye Link: https://t.co/T7DDcc2RKs\n\nRefer: https://t.co/mLQfmeGv0n\n\n#ZoomEye #NetSecMapping #cybersecurity #CyberSpaceInsights2025\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-11T12:07:51.000000Z"}