{"uuid": "2eeb7f5a-f482-4cb7-944e-cf835485bdeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2903", "type": "seen", "source": "https://t.me/cvedetector/23215", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2903 - Google Cloud Platform OS Login SSH Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-2903 \nPublished : April 17, 2025, 7:15 a.m. | 56\u00a0minutes ago \nDescription : An attacker with knowledge of creating user accounts during VM deployment on Google Cloud Platform (GCP) using the OS Login feature, can login via SSH gaining command-line control of the operating system. This allows an attacker to gain access to sensitive data stored on the VM, install malicious software, and disrupt or disable the functionality of the VM. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T10:28:10.000000Z"}