{"vulnerability": "CVE-2025-2648", "sightings": [{"uuid": "4b3a6035-0203-49ea-b5fd-c370f0f12b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26487", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115683138567825457", "content": "", "creation_timestamp": "2025-12-08T09:03:31.405582Z"}, {"uuid": "07ce3f4f-e5fe-416c-99a5-a0526f575e0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26487", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m7hocvq45u24", "content": "", "creation_timestamp": "2025-12-08T09:03:33.458512Z"}, {"uuid": "010f4ed7-1ff7-4121-ba04-8e93d0991b21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26487", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7hukyrtya2q", "content": "", "creation_timestamp": "2025-12-08T10:55:26.589610Z"}, {"uuid": "3500a154-0e21-4899-92a1-9a62cbbdf188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26486", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8093", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26486\n\ud83d\udd25 CVSS Score: 6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Use of a Broken or Risky Cryptographic Algorithm, Use of Password Hash \nWith Insufficient Computational Effort, Use of Weak Hash, Use of a \nOne-Way Hash with a Predictable Salt vulnerability in Beta80 Life 1st \nallows an \nAttacker to Bruteforce User\nPasswords or find a collision to gain access to a target application using BETA80\n\u201cLife 1st Identity Manager\u201d as a service for authentication.This issue affects Life 1st: 1.5.2.14234.\n\ud83d\udccf Published: 2025-03-19T15:46:34.309Z\n\ud83d\udccf Modified: 2025-03-19T15:46:34.309Z\n\ud83d\udd17 References:\n1. https://www.cvcn.gov.it/cvcn/cve/CVE-2025-26486", "creation_timestamp": "2025-03-19T16:18:18.000000Z"}, {"uuid": "522225a4-ebd9-4132-a8d3-a822bff8dbb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26480", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26480\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.0, contains an uncontrolled resource consumption vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service.\n\ud83d\udccf Published: 2025-04-10T02:22:08.401Z\n\ud83d\udccf Modified: 2025-04-10T02:22:08.401Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "creation_timestamp": "2025-04-10T02:49:24.000000Z"}, {"uuid": "0f179f41-8cc1-48dc-bd9f-0302e50b2549", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26485", "type": "seen", "source": "https://t.me/cvedetector/20653", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26485 - Beta80 Life 1st Identity Manager: Authentication Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-26485 \nPublished : March 19, 2025, 4:15 p.m. | 1\u00a0hour, 11\u00a0minutes ago \nDescription : The Exposure of Sensitive Information to an Unauthorized Actor   \nvulnerability impacting Beta80 Life 1st Identity Manager  allows User   \nEnumeration using Authentication Rest APIs. Affected: Life 1st version   \n1.5.2.14234. Different error messages are returned to failed authentication attempts   \nin case of the usage of a wrong password or a non existent user.   \n  \n  \nThis issue affects Life 1st: 1.5.2.14234. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T18:49:30.000000Z"}, {"uuid": "1d8a92fc-faaa-4b0f-9e6b-2311ac117dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2648", "type": "seen", "source": "https://t.me/cvedetector/20900", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2648 - PHPGurukul Art Gallery Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2648 \nPublished : March 23, 2025, 12:15 p.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in PHPGurukul Art Gallery Management System 1.0. This affects an unknown part of the file /admin/view-enquiry-detail.php. The manipulation of the argument viewid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-23T15:38:58.000000Z"}, {"uuid": "9e21c906-f654-4615-9cbe-db8c45e275f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26486", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkqtnd3c3s2w", "content": "", "creation_timestamp": "2025-03-19T18:43:52.700145Z"}, {"uuid": "bdc8bc35-4912-4acc-950d-34336ad54254", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26480", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114314020757340212", "content": "", "creation_timestamp": "2025-04-10T13:58:50.769565Z"}, {"uuid": "8632e5fe-12c7-49f0-a4a8-632adc77caa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26485", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:27.000000Z"}, {"uuid": "24121cc8-56ae-4fc7-b47e-ae7b286813fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26486", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "1e8d57fd-9548-419e-8bf0-ef9d98432d00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26485", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:27.000000Z"}, {"uuid": "d5c8081e-08a5-4720-9f72-de1b6048e607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26486", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:27.000000Z"}, {"uuid": "77c21523-95e1-4974-a674-16e04791a50a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26480", "type": "seen", "source": "https://t.me/cvedetector/22616", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26480 - Dell PowerScale OneFS Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26480 \nPublished : April 10, 2025, 3:15 a.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.0, contains an uncontrolled resource consumption vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T06:59:47.000000Z"}, {"uuid": "630a3a7a-eab9-427b-b8ad-35b977538598", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26486", "type": "seen", "source": "https://t.me/cvedetector/20648", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26486 - Beta80 Life 1st Cryptographic Hashing Weakness\", \n  \"Content\": \"CVE ID : CVE-2025-26486 \nPublished : March 19, 2025, 4:15 p.m. | 1\u00a0hour, 11\u00a0minutes ago \nDescription : Use of a Broken or Risky Cryptographic Algorithm, Use of Password Hash   \nWith Insufficient Computational Effort, Use of Weak Hash, Use of a   \nOne-Way Hash with a Predictable Salt vulnerability in Beta80 Life 1st   \nallows an   \nAttacker to Bruteforce User  \nPasswords or find a collision to gain access to a target application using BETA80  \n\u201cLife 1st Identity Manager\u201d as a service for authentication.This issue affects Life 1st: 1.5.2.14234. \nSeverity: 6.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T18:49:23.000000Z"}, {"uuid": "0aa2ce56-f074-44cf-b38b-b6c6a9ae9e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2648", "type": "published-proof-of-concept", "source": "Telegram/UI7Q2ZYRe6qxjjLr9hlim_JbEp683GzDhX_Bl4Z3PG4KqJo", "content": "", "creation_timestamp": "2025-03-23T13:30:18.000000Z"}, {"uuid": "12e79521-c5b9-483f-8207-49f8dcd13e0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26485", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkqtnbxbgx26", "content": "", "creation_timestamp": "2025-03-19T18:43:46.356534Z"}]}