{"vulnerability": "CVE-2025-2641", "sightings": [{"uuid": "acc4918c-1ee7-4f38-80c6-577392e82fac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2641", "type": "seen", "source": "https://t.me/cvedetector/20889", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2641 - PHPGurukul Art Gallery Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2641 \nPublished : March 23, 2025, 5:15 a.m. | 40\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in PHPGurukul Art Gallery Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/edit-artist-detail.php?editid=1. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-23T07:17:14.000000Z"}, {"uuid": "f13b7bd6-e18c-4f1d-8726-35c7b3205988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2641", "type": "published-proof-of-concept", "source": "Telegram/WIfjWCnk-An9HH4I-P8JcEMFZfcLKZQVCMzrzzJ921G1UtQ", "content": "", "creation_timestamp": "2025-03-23T06:30:35.000000Z"}, {"uuid": "cdb0780c-1a1d-495e-8782-621cecd4db57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26410", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984541147655364", "content": "", "creation_timestamp": "2025-02-11T09:27:50.312886Z"}, {"uuid": "f0c5bacd-fb0e-4c9c-8067-abaec7f74d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26411", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984541162452285", "content": "", "creation_timestamp": "2025-02-11T09:27:50.556136Z"}, {"uuid": "3404b0ec-0dd7-45ec-88b4-00a69604b306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26410", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhvgijtaeh2v", "content": "", "creation_timestamp": "2025-02-11T10:16:08.612060Z"}, {"uuid": "95cfbf6d-6f8c-4b9d-bc6c-ae7592a1e798", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26411", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhvgimlhwp2x", "content": "", "creation_timestamp": "2025-02-11T10:16:11.278965Z"}, {"uuid": "22a65136-ac20-4c89-8604-e932235f6426", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26410", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986273834234915", "content": "", "creation_timestamp": "2025-02-11T16:48:29.537417Z"}, {"uuid": "2b7565f0-f65f-4a65-9a1c-b55e35b52552", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26411", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986273862453656", "content": "", "creation_timestamp": "2025-02-11T16:48:30.721981Z"}, {"uuid": "08704025-791a-484d-8450-b1b696969067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26411", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhw5dxr4ui2h", "content": "", "creation_timestamp": "2025-02-11T17:05:11.304532Z"}, {"uuid": "17847601-757b-477b-94b1-9aaa83c3611b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26410", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhw5dyrzqe2t", "content": "", "creation_timestamp": "2025-02-11T17:05:15.159434Z"}, {"uuid": "891f4600-bd25-4a8b-8c3f-732bcc9dc3f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2641", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkzri2yas52k", "content": "", "creation_timestamp": "2025-03-23T07:58:58.117167Z"}, {"uuid": "b5e068e6-3a9c-480d-84d4-6b5f05b237cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26413", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lnf5fbk2n52h", "content": "", "creation_timestamp": "2025-04-22T07:21:49.379679Z"}, {"uuid": "d928e3bb-c9e3-4756-870f-fd0c1cdcfd6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26413", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lnf7nhiw7x27", "content": "", "creation_timestamp": "2025-04-22T08:02:11.459095Z"}, {"uuid": "905515be-84e9-4d4c-b2cf-c84b65d91c4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26412", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrdbdbae6h2k", "content": "", "creation_timestamp": "2025-06-11T11:07:44.158828Z"}, {"uuid": "539a5b65-ba75-4c60-ada2-9b2c636c0c24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26412", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114664800663722475", "content": "", "creation_timestamp": "2025-06-11T12:46:46.883972Z"}, {"uuid": "8839220a-0b29-4d35-9686-cc131898e188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26416", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lxvdc4lspz2u", "content": "", "creation_timestamp": "2025-09-03T00:02:00.018062Z"}, {"uuid": "294254aa-d640-4015-bdec-2ee6c29c557b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26416", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxvnt3rvxt2j", "content": "", "creation_timestamp": "2025-09-03T03:10:25.084595Z"}, {"uuid": "f6b6b8c9-beac-472b-ad77-c4cbdc35ef47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26411", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7616", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26411\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An authenticated attacker is able to use the Plugin Manager of the web interface of the Wattsense Bridge devices to upload malicious Python files to the device. This enables an attacker to gain remote root access to the device. An attacker needs a valid user account on the Wattsense web interface\u00a0to be able to conduct this attack. This issue is fixed in recent firmware versions BSP &gt;= 6.1.0.\n\ud83d\udccf Published: 2025-02-11T09:21:16.571Z\n\ud83d\udccf Modified: 2025-03-14T17:16:02.468Z\n\ud83d\udd17 References:\n1. https://r.sec-consult.com/wattsense\n2. https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes", "creation_timestamp": "2025-03-14T17:49:03.000000Z"}, {"uuid": "4e36d96f-e484-4f16-9786-9feec6a2cd92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26413", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12810", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26413\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Input Validation vulnerability in Apache Kvrocks.\n\nThe SETRANGE command didn't check if the `offset` input is a positive integer and use it as an index\nof a string. So it will cause the server to crash due to its index is\u00a0 out of range.\nThis issue affects Apache Kvrocks: through 2.11.1.\n\nUsers are recommended to upgrade to version 2.12.0, which fixes the issue.\n\ud83d\udccf Published: 2025-04-22T07:07:49.985Z\n\ud83d\udccf Modified: 2025-04-22T07:07:49.985Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/388743qrr8yq8qm0go8tls6rf1kog8dw", "creation_timestamp": "2025-04-22T08:03:52.000000Z"}, {"uuid": "d77237fe-e72c-4587-ae06-1676d0af279c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26413", "type": "seen", "source": "https://t.me/cvedetector/23490", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26413 - Apache Kvrocks Out-of-Range Index Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-26413 \nPublished : April 22, 2025, 8:15 a.m. | 1\u00a0hour, 40\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in Apache Kvrocks.  \n  \nThe SETRANGE command didn't check if the `offset` input is a positive integer and use it as an index  \nof a string. So it will cause the server to crash due to its index is\u00a0 out of range.  \nThis issue affects Apache Kvrocks: through 2.11.1.  \n  \nUsers are recommended to upgrade to version 2.12.0, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T12:33:01.000000Z"}, {"uuid": "505b0b53-881b-41a0-93a5-29d997d79710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26412", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18063", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26412\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands with root permission on the modem. An attacker needs either physical access or remote shell access to a device that interacts directly with the modem via AT commands.\n\ud83d\udccf Published: 2025-06-11T08:21:31.679Z\n\ud83d\udccf Modified: 2025-06-11T08:21:31.679Z\n\ud83d\udd17 References:\n1. https://r.sec-consult.com/simcom", "creation_timestamp": "2025-06-11T09:33:58.000000Z"}, {"uuid": "11ecf6d4-1509-4d02-96dc-6fb4990847f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26411", "type": "seen", "source": "Telegram/89qgtfeC9_sxWBo-3Prgl-iAHbWjqkIIrbGMrLoWao3jDjzk", "content": "", "creation_timestamp": "2025-02-14T10:01:39.000000Z"}, {"uuid": "b737800c-92b7-4498-90db-62732f0961f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26410", "type": "seen", "source": "Telegram/Zihnv_qpRVMNpyNWGU6xdr1MaImjB_FEtzX8iPsNtRwDlcQ0", "content": "", "creation_timestamp": "2025-02-14T10:01:39.000000Z"}]}