{"vulnerability": "CVE-2025-2110", "sightings": [{"uuid": "cc9df91e-fec2-44fb-8c8a-c64cd1f5b08d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21104", "type": "seen", "source": "https://t.me/cvedetector/20217", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21104 - Dell NetWorker Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21104 \nPublished : March 13, 2025, 12:15 p.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : Dell NetWorker, 19.11.0.3 and below versions, contain(s) an Open Redirect Vulnerability in NMC. An unauthenticated attacker with remoter access could potentially exploit this vulnerability, leading to a targeted application user being redirected to arbitrary web URLs. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T15:37:14.000000Z"}, {"uuid": "1ef37e02-005e-4b16-b732-98d010950ad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21101", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1702", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21101\n\ud83d\udd39 Description: Dell Display Manager, versions prior to 2.3.2.20, contain a race condition vulnerability.\nA local malicious user could potentially exploit this vulnerability during installation, leading to arbitrary folder or file deletion.\n\ud83d\udccf Published: 2025-01-15T04:36:38.793Z\n\ud83d\udccf Modified: 2025-01-15T04:36:38.793Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000267927/dsa-2025-033", "creation_timestamp": "2025-01-15T05:12:32.000000Z"}, {"uuid": "54ca2d66-4800-4c54-bc8e-4ef60a637f03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21107", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3472", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21107\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-30T10:15:09.100\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000278811/dsa-2025-064-security-update-for-dell-networker-networker-virtual-edition-and-networker-management-console-multiple-component-vulnerabilities", "creation_timestamp": "2025-01-30T11:18:56.000000Z"}, {"uuid": "28d588f2-d866-491a-a62f-f8871c980ccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21107", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3488", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21107\n\ud83d\udd25 CVSS Score: 7.7 (CVSS_V3)\n\ud83d\udd39 Description: Dell NetWorker, version(s) prior to 19.11.0.3, all versions of 19.10 &amp; prior versions contain(s) an Unquoted Search Path or Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.\n\ud83d\udccf Published: 2025-01-30T12:31:17Z\n\ud83d\udccf Modified: 2025-01-30T12:31:17Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-21107\n2. https://www.dell.com/support/kbdoc/en-us/000278811/dsa-2025-064-security-update-for-dell-networker-networker-virtual-edition-and-networker-management-console-multiple-component-vulnerabilities", "creation_timestamp": "2025-01-30T13:11:35.000000Z"}, {"uuid": "1dfe9137-947d-4b58-afcf-3f16b6bf8f8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21104", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7479", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21104\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Dell NetWorker, 19.11.0.3 and below versions, contain(s) an Open Redirect Vulnerability in NMC. An unauthenticated attacker with remoter access could potentially exploit this vulnerability, leading to a targeted application user being redirected to arbitrary web URLs. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.\n\ud83d\udccf Published: 2025-03-13T11:42:22.866Z\n\ud83d\udccf Modified: 2025-03-13T19:32:16.334Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000294392/dsa-2025-124-security-update-for-dell-networker-management-console-for-http-host-header-injection-vulnerability", "creation_timestamp": "2025-03-13T19:42:39.000000Z"}, {"uuid": "e889ebfe-8fe6-4865-b4a5-5ec03a848eec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2110", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8829", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2110\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The WP Compress \u2013 Instant Performance &amp; Speed Optimization plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to missing capability checks on its on its AJAX functions in all versions up to, and including, 6.30.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to compromise the site in various ways depending on the specific function exploited - for example, by retrieving sensitive settings and configuration details, or by altering and deleting them, thereby disclosing sensitive information, disrupting the plugin\u2019s functionality, and potentially impacting overall site performance.\n\ud83d\udccf Published: 2025-03-26T11:22:08.756Z\n\ud83d\udccf Modified: 2025-03-26T11:22:08.756Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/2bb4ead4-b2ad-42b4-92a0-fb7293f6df06?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-compress-image-optimizer/tags/6.30.15/classes/ajax.class.php\n3. https://wordpress.org/plugins/wp-compress-image-optimizer/#developers\n4. https://plugins.trac.wordpress.org/changeset/3254259/", "creation_timestamp": "2025-03-26T11:25:21.000000Z"}, {"uuid": "b420ac34-452f-4f02-9868-cb17f3c91d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21101", "type": "seen", "source": "https://t.me/cvedetector/15406", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21101 - Dell Display Manager File Deletion Race Condition Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21101 \nPublished : Jan. 15, 2025, 5:15 a.m. | 24\u00a0minutes ago \nDescription : Dell Display Manager, versions prior to 2.3.2.20, contain a race condition vulnerability.  \nA local malicious user could potentially exploit this vulnerability during installation, leading to arbitrary folder or file deletion. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T06:44:47.000000Z"}, {"uuid": "16e4cbf4-117f-4639-b341-cec37df7d4dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2110", "type": "seen", "source": "https://t.me/cvedetector/21169", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2110 - WordPress WP Compress Unauthorized Access and Data Manipulation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2110 \nPublished : March 26, 2025, 12:15 p.m. | 26\u00a0minutes ago \nDescription : The WP Compress \u2013 Instant Performance &amp; Speed Optimization plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to missing capability checks on its on its AJAX functions in all versions up to, and including, 6.30.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to compromise the site in various ways depending on the specific function exploited - for example, by retrieving sensitive settings and configuration details, or by altering and deleting them, thereby disclosing sensitive information, disrupting the plugin\u2019s functionality, and potentially impacting overall site performance. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T13:53:18.000000Z"}, {"uuid": "4cbffcf7-5700-4482-be04-75cf6c7085ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21102", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113792495973782991", "content": "", "creation_timestamp": "2025-01-08T11:28:13.537235Z"}, {"uuid": "ed036d87-ab6e-4ac0-8625-2305832cb3b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21102", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfa5dplwnq25", "content": "", "creation_timestamp": "2025-01-08T12:16:05.722890Z"}, {"uuid": "1c48dad0-9dac-4fb9-be86-dbed289a7dda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21107", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113916587999368700", "content": "", "creation_timestamp": "2025-01-30T09:26:27.608877Z"}, {"uuid": "fcc087a7-da2f-42c9-815e-6012c6b0246b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21103", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114019564630576068", "content": "", "creation_timestamp": "2025-02-17T13:54:47.281282Z"}, {"uuid": "18087d3a-317f-442e-877a-c3d1478d6212", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21103", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3liewnuytar2k", "content": "", "creation_timestamp": "2025-02-17T14:15:23.787416Z"}, {"uuid": "778b657f-4792-4381-9a18-151aec883562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21103", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114019731286658420", "content": "", "creation_timestamp": "2025-02-17T14:37:09.068687Z"}, {"uuid": "87644dab-f2ff-42b6-a7d8-81df32aa5edd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21103", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liezywlwuv26", "content": "", "creation_timestamp": "2025-02-17T15:15:17.646877Z"}, {"uuid": "0071d20c-2184-4394-8e25-7b2292144e6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21107", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:20.000000Z"}, {"uuid": "82eb9e60-5ec9-496d-9cad-de373129539e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21106", "type": "seen", "source": "Telegram/7h3t7Cck5QFt5yxkv-pb8DB98oTT1-0QQa5UEd0kYGoZ-d83", "content": "", "creation_timestamp": "2025-02-20T23:26:54.000000Z"}, {"uuid": "eb4be98d-2401-4747-8635-9161ae483299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21105", "type": "seen", "source": "Telegram/f3fnAM6eg54AkPn_szwgB0yDcxnZcf_O8_OuVAa2felbnozX", "content": "", "creation_timestamp": "2025-02-20T23:26:54.000000Z"}, {"uuid": "9f927491-0ddf-4262-9654-13536c910a11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21106", "type": "seen", "source": "https://t.me/cvedetector/18538", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21106 - Dell Recover Point for Virtual Machines File System Permission Weakness\", \n  \"Content\": \"CVE ID : CVE-2025-21106 \nPublished : Feb. 20, 2025, 12:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Dell Recover Point for Virtual Machines 6.0.X contains a Weak file system permission vulnerability. A low privileged Local attacker could potentially exploit this vulnerability, leading to impacting only non-sensitive resources in the system. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T14:49:29.000000Z"}, {"uuid": "b22dc426-b602-46ff-9ca9-7c19b5da7039", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21105", "type": "seen", "source": "https://t.me/cvedetector/18537", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21105 - Dell RecoverPoint for Virtual Machines Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21105 \nPublished : Feb. 20, 2025, 12:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Dell RecoverPoint for Virtual Machines 6.0.X contains a command execution vulnerability. A Low privileged malicious user with local access could potentially exploit this vulnerability by running the specific binary and perform any administrative action permitted by it resulting in shutting down the server, modifying the configuration leading to gain access to unauthorized data. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T14:49:29.000000Z"}, {"uuid": "851cc67e-ab3c-47b4-8481-aa6332384980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21102", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/690", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21102\n\ud83d\udd39 Description: Dell VxRail, versions 7.0.000 through 7.0.532, contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure.\n\ud83d\udccf Published: 2025-01-08T11:25:48.282Z\n\ud83d\udccf Modified: 2025-01-08T11:25:48.282Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000269793/dsa-2025-027-security-update-for-dell-vxrail-for-multiple-vulnerabilities?ref=emcadvisory_000269793_High_null", "creation_timestamp": "2025-01-08T12:12:35.000000Z"}, {"uuid": "11b62f95-9adf-4007-8840-1ac0742ffdc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21107", "type": "seen", "source": "https://t.me/cvedetector/16749", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21107 - Dell NetWorker Unquoted Search Path Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21107 \nPublished : Jan. 30, 2025, 10:15 a.m. | 37\u00a0minutes ago \nDescription : Dell NetWorker, version(s) prior to 19.11.0.3, all versions of 19.10 &amp; prior versions contain(s) an Unquoted Search Path or Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T12:35:30.000000Z"}, {"uuid": "5eb9db68-8db0-4d95-b43f-8fabdf5b8fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2110", "type": "seen", "source": "Telegram/_TV1T31eHrvyU-flISm4W9ELqZ4evKW9LK1i2AgsxeMw9Ac", "content": "", "creation_timestamp": "2025-03-26T13:00:50.000000Z"}, {"uuid": "d76a64b3-7749-46fe-b002-a1347b7aeed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21103", "type": "seen", "source": "https://t.me/cvedetector/18258", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21103 - Dell NetWorker Management Console Server-Side Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21103 \nPublished : Feb. 17, 2025, 2:15 p.m. | 41\u00a0minutes ago \nDescription : Dell NetWorker Management Console, version(s) 19.11 through 19.11.0.3 &amp; Versions prior to 19.10.0.7 contain(s) an improper neutralization of server-side vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability and run arbitrary code on the server. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T16:32:56.000000Z"}, {"uuid": "44709738-e7d9-4ed8-a50d-67e58a771dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21102", "type": "seen", "source": "https://t.me/cvedetector/14686", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21102 - Dell VxRail Plaintext Storage of a Password Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21102 \nPublished : Jan. 8, 2025, 12:15 p.m. | 42\u00a0minutes ago \nDescription : Dell VxRail, versions 7.0.000 through 7.0.532, contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T14:08:16.000000Z"}, {"uuid": "bddf41d3-d145-43ca-b68c-8e94f5c574f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21103", "type": "seen", "source": "Telegram/n0wPy-igIVC8XfXUFfXxEPTEh31N3sza9u92ih6FhvOTVucE", "content": "", "creation_timestamp": "2025-02-17T15:38:32.000000Z"}, {"uuid": "728010cf-6829-44fd-9e0b-4faac061368f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21102", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfa7fhygc52r", "content": "", "creation_timestamp": "2025-01-08T12:52:52.077081Z"}, {"uuid": "bea86824-bfff-4ca5-b21e-2f332fb09d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21101", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113830526376260653", "content": "", "creation_timestamp": "2025-01-15T04:39:51.389177Z"}]}