{"vulnerability": "CVE-2025-2604", "sightings": [{"uuid": "0c1ba9a2-872f-4878-846b-b159617495ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26047", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljax4rql2x2w", "content": "", "creation_timestamp": "2025-02-28T17:38:16.325297Z"}, {"uuid": "533e7a7e-bde6-42a9-9d5d-a1c5b8b1fd41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2604", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:48.000000Z"}, {"uuid": "6a762b9d-2863-4c6d-8c75-152dd4d81579", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26047", "type": "seen", "source": "https://t.me/cvedetector/19172", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26047 - Loggrove SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-26047 \nPublished : Feb. 28, 2025, 4:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Loggrove v1.0 is vulnerable to SQL Injection in the read.py file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T19:32:26.000000Z"}, {"uuid": "df974c0a-74ed-43c1-aba2-0395d3d48d95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2604", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8682", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2604\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been classified as critical. Affected is an unknown function of the file edit_act.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-21T20:31:05.576Z\n\ud83d\udccf Modified: 2025-03-25T15:13:51.486Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300588\n2. https://vuldb.com/?ctiid.300588\n3. https://vuldb.com/?submit.517965\n4. https://github.com/Hefei-Coffee/cve/issues/14\n5. https://www.sourcecodester.com/", "creation_timestamp": "2025-03-25T15:23:59.000000Z"}, {"uuid": "3518fa2b-277c-45f8-b79a-78bf9ad9f17b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26042", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkm5q7magi26", "content": "", "creation_timestamp": "2025-03-17T22:01:04.022226Z"}, {"uuid": "cdadcbbe-3700-4031-956e-7e8ffc80dd88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2604", "type": "seen", "source": "https://gist.github.com/jetpham/9f14e01194616e9edc90152ea6c83c05", "content": "", "creation_timestamp": "2025-08-09T07:11:22.000000Z"}, {"uuid": "92756ef5-a3f2-454d-a550-db9ebff364c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26047", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5920", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26047\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Loggrove v1.0 is vulnerable to SQL Injection in the read.py file.\n\ud83d\udccf Published: 2025-02-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T15:31:43.395Z\n\ud83d\udd17 References:\n1. https://gitee.com/olajowon/loggrove/issues/IBJXG8", "creation_timestamp": "2025-02-28T16:27:07.000000Z"}, {"uuid": "5c058b8f-f58e-454e-88a7-be411c06d2c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2604", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8455", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2604\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been classified as critical. Affected is an unknown function of the file edit_act.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-21T20:31:05.576Z\n\ud83d\udccf Modified: 2025-03-21T20:31:05.576Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300588\n2. https://vuldb.com/?ctiid.300588\n3. https://vuldb.com/?submit.517965\n4. https://github.com/Hefei-Coffee/cve/issues/14\n5. https://www.sourcecodester.com/", "creation_timestamp": "2025-03-21T21:22:19.000000Z"}, {"uuid": "d5a2ef10-48b2-4f04-8865-aec3cd1d0558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26042", "type": "seen", "source": "https://t.me/cvedetector/20503", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26042 - Uptime Kuma Regular Expression Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26042 \nPublished : March 17, 2025, 7:15 p.m. | 49\u00a0minutes ago \nDescription : Uptime Kuma &gt;== 1.23.0 has a ReDoS vulnerability, specifically when an administrator creates a notification through the web service. If a string is provided it triggers catastrophic backtracking in the regular expression, leading to a ReDoS attack. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T21:39:28.000000Z"}, {"uuid": "eb040554-5725-41be-9808-57a5312efa4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2604", "type": "seen", "source": "https://t.me/cvedetector/20842", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2604 - SourceCodester Kortex Lite Advocate Office Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-2604 \nPublished : March 21, 2025, 9:15 p.m. | 1\u00a0hour, 37\u00a0minutes ago \nDescription : A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been classified as critical. Affected is an unknown function of the file edit_act.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-22T00:20:15.000000Z"}]}