{"uuid": "9b88ff8a-7e58-4e93-98c3-4ec17a20a46a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23120", "type": "seen", "source": "https://t.me/thehackernews/6526", "content": "Two major vendors just patched remote code execution flaws\u2014update NOW before attackers exploit them.\n\n\ud83d\udd34 Veeam Backup (CVE-2025-23120, 9.9/10)\n\u27a1\ufe0f Affects v12.3.0.310 &amp; earlier\n\u27a1\ufe0f Allows RCE by authenticated users\n\u27a1\ufe0f Fixed in v12.3.1 (12.3.1.1139)\n\n\ud83d\udd34 IBM AIX (CVE-2024-56346 &amp; CVE-2024-56347, 10/10 &amp; 9.6/10)\n\u27a1\ufe0f Affects AIX 7.2 &amp; 7.3\n\u27a1\ufe0f Exploitable via NIM services\n\n\u26a0\ufe0f No attacks seen yet, but don\u2019t wait\u2014patch immediately.\n\nFull details: https://thehackernews.com/2025/03/veeam-and-ibm-release-patches-for-high.html", "creation_timestamp": "2025-03-20T15:03:48.000000Z"}