{"vulnerability": "CVE-2025-2503", "sightings": [{"uuid": "4b441406-f9c2-411e-b70a-6c3d176e0bf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25039", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lherfv2s7g2p", "content": "", "creation_timestamp": "2025-02-04T19:16:15.062067Z"}, {"uuid": "2312f001-24a0-4b64-aae1-b7be760eb99f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lsbofib5d22b", "content": "", "creation_timestamp": "2025-06-23T13:21:30.360499Z"}, {"uuid": "bbd9cc9a-c670-42f8-bf5a-9e195dcec0d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25038", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ls32l37jep23", "content": "", "creation_timestamp": "2025-06-20T22:10:43.740957Z"}, {"uuid": "42cebb3c-b93a-4512-844f-5318c2252691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ls5h7ne2wa2k", "content": "", "creation_timestamp": "2025-06-21T21:02:18.253743Z"}, {"uuid": "ddb66748-1100-49b5-9532-a34ae5d2939b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25037", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ls5h7ngo6k2u", "content": "", "creation_timestamp": "2025-06-21T21:02:18.808277Z"}, {"uuid": "ffe22b54-2d83-416b-83a0-4e2e0a476878", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25038", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ls5h7njjy22u", "content": "", "creation_timestamp": "2025-06-21T21:02:19.319483Z"}, {"uuid": "0be87849-8384-4a22-a19a-3e2284f440a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "4366f2b7-cc88-4956-ae37-e365e7d1d53f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25035", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}, {"uuid": "33bfbe3d-c597-4322-9247-431e184178c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-25034.yaml", "content": "", "creation_timestamp": "2025-10-15T07:37:31.000000Z"}, {"uuid": "7a579c46-f900-47b6-85d3-df9db638e7ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "c7066b33-779e-409c-9536-b2fa080e7945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-23)", "content": "", "creation_timestamp": "2025-11-23T00:00:00.000000Z"}, {"uuid": "3052d1bd-b7d1-4c25-aa1e-5f0e18921ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-03)", "content": "", "creation_timestamp": "2026-01-03T00:00:00.000000Z"}, {"uuid": "49bbea0c-32fa-4d0c-bd60-ec1eb7b39ad4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-03)", "content": "", "creation_timestamp": "2026-04-03T00:00:00.000000Z"}, {"uuid": "3896b422-5a18-42f5-9174-d5f4e75f84b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-03)", "content": "", "creation_timestamp": "2026-04-03T00:00:00.000000Z"}, {"uuid": "0099a3a7-b531-47b2-8679-965e32c74aea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-08)", "content": "", "creation_timestamp": "2026-02-08T00:00:00.000000Z"}, {"uuid": "81783674-712a-45fd-ac5b-aefd049d6294", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25037", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-22)", "content": "", "creation_timestamp": "2026-04-22T00:00:00.000000Z"}, {"uuid": "e720d988-b40c-4704-8800-3ad0a4bf6f4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25035", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8411", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25035\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in Jalios JPlatform 10 allows for Reflected XSS and Stored XSS.This issue affects JPlatform 10: before 10.0.8 (SP8), before 10.0.7 (SP7), before 10.0.6 (SP6) and Jalios Workplace 6.2, Jalios Workplace 6.1, Jalios Workplace 6.0, and Jalios Workplace 5.3 to 5.5\n\ud83d\udccf Published: 2025-03-21T19:02:39.718Z\n\ud83d\udccf Modified: 2025-03-21T19:02:39.718Z\n\ud83d\udd17 References:\n1. https://community.jalios.com/jcms/jc1_893720/en/security-alert-2025-02-19\n2. https://issues.jalios.com/browse/JCMS-11259\n3. https://issues.jalios.com/browse/JCMS-11246\n4. https://issues.jalios.com/browse/JCMS-11248\n5. https://vulncheck.com/advisories/jalios-jplatform-xss", "creation_timestamp": "2025-03-21T19:19:41.000000Z"}, {"uuid": "b43df0da-d081-4a0e-ae60-d8b1ef480138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25036", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8428", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25036\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Improper Restriction of XML External Entity Reference vulnerability in Jalios JPlatform allows XML Injection.This issue affects all versions of JPlatform 10 before 10.0.8 (SP8).\n\ud83d\udccf Published: 2025-03-21T19:27:12.472Z\n\ud83d\udccf Modified: 2025-03-21T19:50:06.001Z\n\ud83d\udd17 References:\n1. https://community.jalios.com/jcms/jc1_893720/en/security-alert-2025-02-19\n2. https://issues.jalios.com/browse/JCMS-11250\n3. https://vulncheck.com/advisories/jalios-jplatform-xxe", "creation_timestamp": "2025-03-21T20:24:51.000000Z"}, {"uuid": "cac9ea07-1edb-4dcc-b730-7131b5ce6f13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-25)", "content": "", "creation_timestamp": "2026-04-25T00:00:00.000000Z"}, {"uuid": "767b6416-8740-4a4b-b04a-8fcd8cb9d13b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25039", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhf3uuucpc2k", "content": "", "creation_timestamp": "2025-02-04T22:23:35.929548Z"}, {"uuid": "76053d3a-2977-42ed-a656-f4dc23efc722", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2503", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqg25k5cxjp2", "content": "", "creation_timestamp": "2025-05-30T20:15:26.658766Z"}, {"uuid": "1ee4f7c4-c04a-407b-99a1-1447f164ec6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2503", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgcedvgnz2q", "content": "", "creation_timestamp": "2025-05-30T22:39:01.570403Z"}, {"uuid": "fc8a75a3-3d13-4d52-974c-4bfdec99f8fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "https://gist.github.com/nguyentin1136-ops/f5bea0e7ad800547c3e9b5e241e2d65c", "content": "", "creation_timestamp": "2025-10-20T04:01:23.000000Z"}, {"uuid": "e804b228-988e-4505-9a5d-fad441024111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "22bb7f8a-d78e-4f34-a799-815e64de7456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/sugarcrm_rest_unserialize_exec.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "c1b86b9e-7735-428d-a0d5-02fe1b66c964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-29)", "content": "", "creation_timestamp": "2025-12-29T00:00:00.000000Z"}, {"uuid": "9a3155b3-ad42-4775-bf9a-fa0f83d2c6f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-02)", "content": "", "creation_timestamp": "2026-04-02T00:00:00.000000Z"}, {"uuid": "ebecee2a-ab54-47f0-b485-5194118be276", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-15)", "content": "", "creation_timestamp": "2026-02-15T00:00:00.000000Z"}, {"uuid": "f19d74f0-8262-4e68-9675-73c4ea9ff3d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-09)", "content": "", "creation_timestamp": "2026-03-09T00:00:00.000000Z"}, {"uuid": "4dc05994-ecfc-4f68-8394-6f3bfd0add96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-12)", "content": "", "creation_timestamp": "2026-03-12T00:00:00.000000Z"}, {"uuid": "8f2c25b2-6e6a-4d31-bc01-ed0deffad480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25032", "type": "seen", "source": "Telegram/d4nUwsOBOdQROW01SEnvl_Ro6E92wcWw7AWRntwHKYeAQB4", "content": "", "creation_timestamp": "2025-06-11T20:16:15.000000Z"}, {"uuid": "cb17d832-4eb8-4376-958c-63b90a131d0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-20)", "content": "", "creation_timestamp": "2026-04-20T00:00:00.000000Z"}, {"uuid": "4510e0a5-291b-4f0d-9f5e-cfdb30cb793b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-20)", "content": "", "creation_timestamp": "2026-04-20T00:00:00.000000Z"}, {"uuid": "ef5b2d6f-d141-4efc-a004-bb58b8395766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25038", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19262", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25038\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: An OS command injection vulnerability exists in MiniDVBLinux version 5.4 and earlier. The system\u2019s web-based management interface fails to properly sanitize user-supplied input before passing it to operating system commands. A remote unauthenticated attacker can exploit this vulnerability to execute arbitrary commands as the root user, potentially compromising the entire device.\n\ud83d\udccf Published: 2025-06-20T18:36:09.946Z\n\ud83d\udccf Modified: 2025-06-23T20:34:31.585Z\n\ud83d\udd17 References:\n1. https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5717.php\n2. https://www.exploit-db.com/exploits/51096\n3. https://www.fortiguard.com/encyclopedia/ips/52454\n4. https://cxsecurity.com/issue/WLB-2022100039\n5. https://packetstormsecurity.com/files/168744/\n6. https://www.minidvblinux.de\n7. https://vulncheck.com/advisories/minidvblinux-command-injection", "creation_timestamp": "2025-06-23T20:47:20.000000Z"}, {"uuid": "56c87348-5fd2-4138-af0c-28b9d2d844e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25037", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19263", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25037\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: An information disclosure vulnerability exists in Aquatronica Controller System firmware versions &lt;= 5.1.6 and web interface versions &lt;= 2.0. The tcp.php endpoint fails to restrict unauthenticated access, allowing remote attackers to issue crafted POST requests and retrieve sensitive configuration data, including plaintext administrative credentials. Exploitation of this flaw can lead to full compromise of the system, enabling unauthorized manipulation of connected devices and aquarium parameters.\n\ud83d\udccf Published: 2025-06-20T18:35:19.243Z\n\ud83d\udccf Modified: 2025-06-23T20:33:15.219Z\n\ud83d\udd17 References:\n1. https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5824.php\n2. https://www.exploit-db.com/exploits/52028\n3. https://fortiguard.fortinet.com/encyclopedia/ips/56008\n4. https://www.aquatronica.com\n5. https://vulncheck.com/advisories/aquatronica-controller-system-credential-leak", "creation_timestamp": "2025-06-23T20:47:21.000000Z"}, {"uuid": "9428f02d-e8bc-4a49-9fae-8c3e7c41209d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25035", "type": "seen", "source": "https://t.me/cvedetector/20839", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25035 - Jalios JPlatform Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-25035 \nPublished : March 21, 2025, 7:15 p.m. | 1\u00a0hour, 34\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in Jalios JPlatform 10 allows for Reflected XSS and Stored XSS.This issue affects JPlatform 10: before 10.0.8 (SP8), before 10.0.7 (SP7), before 10.0.6 (SP6) and Jalios Workplace 6.2, Jalios Workplace 6.1, Jalios Workplace 6.0, and Jalios Workplace 5.3 to 5.5 \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T22:39:54.000000Z"}, {"uuid": "565a41a3-e6d6-4b4b-9039-b5869a888554", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25036", "type": "seen", "source": "https://t.me/cvedetector/20836", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25036 - Jalios JPlatform XML External Entity Reference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25036 \nPublished : March 21, 2025, 8:15 p.m. | 35\u00a0minutes ago \nDescription : Improper Restriction of XML External Entity Reference vulnerability in Jalios JPlatform allows XML Injection.This issue affects all versions of JPlatform 10 before 10.0.8 (SP8). \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T22:39:52.000000Z"}, {"uuid": "4ab74f7b-78a4-4b1b-9a60-4fa7f26ab2d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25032", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lreebrdies2s", "content": "", "creation_timestamp": "2025-06-11T21:33:14.735448Z"}, {"uuid": "afbac79b-1f7f-4836-a205-878d624909fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ls2zk7zhpo2q", "content": "", "creation_timestamp": "2025-06-20T21:52:21.288997Z"}, {"uuid": "8d962d99-4518-40c4-9f5a-a34e1b712916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25037", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ls324ddez72m", "content": "", "creation_timestamp": "2025-06-20T22:02:28.760436Z"}, {"uuid": "f7fb5976-048d-48a2-b174-b9f830590c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-21)", "content": "", "creation_timestamp": "2025-11-21T00:00:00.000000Z"}, {"uuid": "714a181d-13cc-47c9-8636-7271999fa9ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "https://gist.github.com/nguyentin1136-ops/937b4359948bbce2e6e7cefbf97e8766", "content": "", "creation_timestamp": "2025-10-20T05:01:51.000000Z"}, {"uuid": "ea8554a3-4409-44b7-aacd-89236acaa121", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25036", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:48.000000Z"}, {"uuid": "4e443a9c-ce90-466c-bed9-b269338a3b86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "04a78e8d-1a8e-4f7e-a641-d095b7e363c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-07)", "content": "", "creation_timestamp": "2026-01-07T00:00:00.000000Z"}, {"uuid": "699c596e-42e0-4efe-ac09-5f417918f0b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25037", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-24)", "content": "", "creation_timestamp": "2026-03-24T00:00:00.000000Z"}, {"uuid": "1b8ecf16-db9b-4a97-8565-0433b4960d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25034", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-13)", "content": "", "creation_timestamp": "2026-03-13T00:00:00.000000Z"}, {"uuid": "e86701a5-2c9f-4723-9607-97416f71fd2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25032", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18122", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25032\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 could allow an authenticated user to cause a denial of service by sending a specially crafted request that would exhaust memory resources.\n\ud83d\udccf Published: 2025-06-11T17:26:35.867Z\n\ud83d\udccf Modified: 2025-06-11T17:48:54.567Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7234674", "creation_timestamp": "2025-06-11T18:35:13.000000Z"}, {"uuid": "f3d2ad61-dfe7-471b-860b-6a57f098a62c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25039", "type": "seen", "source": "https://t.me/cvedetector/17237", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25039 - Aruba Networking ClearPass Policy Manager Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25039 \nPublished : Feb. 4, 2025, 7:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of HPE Aruba Networking ClearPass Policy Manager (CPPM) allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T22:15:24.000000Z"}]}