{"vulnerability": "CVE-2025-2450", "sightings": [{"uuid": "53fa0e4d-9364-4e95-ab96-edafe0df1aeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24506", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113918781212390614", "content": "", "creation_timestamp": "2025-01-30T18:44:13.424395Z"}, {"uuid": "71190cac-b6da-4f88-baba-336b6110b227", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24507", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113918781226421747", "content": "", "creation_timestamp": "2025-01-30T18:44:13.701164Z"}, {"uuid": "e6432a32-c16a-496e-9c54-4016a4153530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2450", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-147/", "content": "", "creation_timestamp": "2025-03-17T04:00:00.000000Z"}, {"uuid": "d0a428a6-99ae-4006-8b5a-18fc7b4d37a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2450", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "7c610d8e-69de-4de5-ba87-255016d9d22b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24503", "type": "seen", "source": "https://t.me/cvedetector/16828", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24503 - WordPress PAM clickable link authentication bypass vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24503 \nPublished : Jan. 30, 2025, 7:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : A malicious actor can fix the session of a PAM user by tricking the user to click on a specially crafted link to the PAM server. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T22:38:27.000000Z"}, {"uuid": "93cf61dd-2d6b-4b24-8cce-180806e431de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24505", "type": "seen", "source": "https://t.me/cvedetector/16827", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24505 - Apache PAM Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24505 \nPublished : Jan. 30, 2025, 7:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : This vulnerability allows a high-privileged authenticated PAM user to achieve remote command execution on the affected PAM system by uploading a specially crafted upgrade file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T22:38:26.000000Z"}, {"uuid": "7daecaf1-9879-40b1-97a9-947f9c0b988c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24504", "type": "seen", "source": "https://t.me/cvedetector/16829", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24504 - Apache Struts CSRF Log Injection\", \n  \"Content\": \"CVE ID : CVE-2025-24504 \nPublished : Jan. 30, 2025, 7:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : An improper input validation the CSRF filter results in unsanitized user input written to the application logs. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T22:38:27.000000Z"}, {"uuid": "15ed0dd3-5f7d-424f-a6d3-1dbe95bbc4a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24503", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lhk343rek32v", "content": "", "creation_timestamp": "2025-02-06T21:53:03.325709Z"}, {"uuid": "b4ee01cd-6153-4889-96dc-131211b5d24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24500", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113918699528508889", "content": "", "creation_timestamp": "2025-01-30T18:23:26.915383Z"}, {"uuid": "9fdf091f-35ea-498d-8bb9-0229727e1c55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24501", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113918758527528552", "content": "", "creation_timestamp": "2025-01-30T18:38:27.120887Z"}, {"uuid": "97fed3ff-3c6a-4609-801a-a7c14a7844a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24505", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113918781197257706", "content": "", "creation_timestamp": "2025-01-30T18:44:13.095861Z"}, {"uuid": "362c6954-9142-4630-92f4-7717746a7e6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24503", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lhood2tpk22y", "content": "", "creation_timestamp": "2025-02-08T17:47:37.203904Z"}, {"uuid": "e64b83e5-212c-4025-b921-715578c7be64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24508", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lteatizhkd2l", "content": "", "creation_timestamp": "2025-07-07T07:21:58.391272Z"}, {"uuid": "eee86f01-89c4-4e2a-94e8-e278e7372a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2450", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:28.000000Z"}, {"uuid": "27c928b4-761d-4b73-baaf-fa99f16500c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24507", "type": "seen", "source": "https://t.me/cvedetector/16826", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24507 - Cisco Network Appliance Boot Time Root Access\", \n  \"Content\": \"CVE ID : CVE-2025-24507 \nPublished : Jan. 30, 2025, 7:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : This vulnerability allows appliance compromise at boot time. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T22:38:25.000000Z"}, {"uuid": "d84f28fc-7f62-4689-960a-1cbd4c7ed7f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24506", "type": "seen", "source": "https://t.me/cvedetector/16825", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24506 - Bitdefender PAM Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-24506 \nPublished : Jan. 30, 2025, 7:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : A specific authentication strategy allows to learn ids of PAM users associated with certain authentication types. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T22:38:24.000000Z"}, {"uuid": "6f5a6a85-1516-4744-badd-3803db2c8d16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24500", "type": "seen", "source": "https://t.me/cvedetector/16834", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24500 - Apache Privilege Escalation Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-24500 \nPublished : Jan. 30, 2025, 7:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : The vulnerability allows an unauthenticated attacker to access information in PAM database. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T22:38:34.000000Z"}, {"uuid": "d1fe8346-fc12-4ed0-9d75-88de59ef7373", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24507", "type": "seen", "source": "Telegram/kiUDYoh2MHFDiRi_56BK_w5rrF2X7n2u_oTMCgtXZ63sZjKK", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "64e45aac-6349-413f-8de2-2c12057fb160", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24506", "type": "seen", "source": "Telegram/8kE5fbDq8HNI7lITrdEQck1wFy7hOLsVqS0iQZr7gNJ3IPSI", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "7eb02713-39ee-466d-bdab-c068de20e4c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24505", "type": "seen", "source": "Telegram/bPtflSo-lG7TH9zDqyHbBcEkDh8ILwjfGY20LXsN0jboOBIp", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "82e83608-64dc-4031-8a86-f98689e15871", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24504", "type": "seen", "source": "Telegram/xPp1a9lQYeR1J2dDpkdB6kH6-wK8F5jCJ4bPpgHPwrXjGMsx", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "f4513627-cf74-497c-80fc-1a9d35b875eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24503", "type": "seen", "source": "Telegram/ulz5la_fTUlslDW4yVch3hy2al9cShAA2wXHAY0hPApSFdKL", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "903e3ec7-c1b0-4ea8-bb77-c227c2c7d12c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24502", "type": "seen", "source": "Telegram/_73-3NG9obJ6TURQKCvHbilF0cdodKrhvTllYrVGtkrEjTQd", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "e472fd6f-65e7-46c6-9d41-4cba38d800f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24501", "type": "seen", "source": "Telegram/upv9y0-cFZ-KC9o7sLGkdSFVA_jAHPdQaiwaHNwZ4AhK_7w0", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "55e3a01b-c5a7-43bf-878e-6030ae59b7ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24500", "type": "seen", "source": "Telegram/TGmVteE8-5OoE2m3_pnRQxH1U4DJdv0U4x9qHKU-yV4K7GBI", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "9c1e3b0d-3962-49ff-8629-76e2d057bb3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24503", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lhicblp3hk2o", "content": "", "creation_timestamp": "2025-02-06T04:56:04.158156Z"}, {"uuid": "d0fc126a-f281-41a6-9b3b-b6de742a8f49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24503", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lhuibqmcec2h", "content": "", "creation_timestamp": "2025-02-11T01:15:32.706306Z"}, {"uuid": "e4a3939e-ea36-40c5-b4be-5850fdece174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24507", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lhuibqmcec2h", "content": "", "creation_timestamp": "2025-02-11T01:15:32.760866Z"}]}