{"vulnerability": "CVE-2025-2675", "sightings": [{"uuid": "c3f0146a-f647-4272-a1b3-e908c1d11a26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26758", "type": "seen", "source": "https://t.me/cvedetector/18250", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26758 - RebelCode Spotlight Social Media Feeds Sensitive System Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-26758 \nPublished : Feb. 17, 2025, 12:15 p.m. | 30\u00a0minutes ago \nDescription : Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RebelCode Spotlight Social Media Feeds allows Retrieve Embedded Sensitive Data. This issue affects Spotlight Social Media Feeds: from n/a through 1.7.1. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T14:02:15.000000Z"}, {"uuid": "12091a93-ded2-4e2b-a225-5be63664e3f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26754", "type": "seen", "source": "https://t.me/cvedetector/18249", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26754 - bPlugins Timeline Block Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26754 \nPublished : Feb. 17, 2025, 12:15 p.m. | 30\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins Timeline Block allows Stored XSS. This issue affects Timeline Block: from n/a through 1.1.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T14:02:11.000000Z"}, {"uuid": "37630df8-674c-4b86-a31a-77985e45cc25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26757", "type": "seen", "source": "https://t.me/cvedetector/18727", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26757 - Full Services Full Customer PHP Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26757 \nPublished : Feb. 22, 2025, 4:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FULL SERVICES FULL Customer allows PHP Local File Inclusion. This issue affects FULL Customer: from n/a through 3.1.26. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T19:10:16.000000Z"}, {"uuid": "8bd8078a-e1b4-46dd-a698-f611d34c33d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26756", "type": "seen", "source": "https://t.me/cvedetector/18726", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26756 - Grimdonkey Magic the Gathering Card Tooltips Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-26756 \nPublished : Feb. 22, 2025, 4:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in grimdonkey Magic the Gathering Card Tooltips allows Stored XSS. This issue affects Magic the Gathering Card Tooltips: from n/a through 3.5.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T19:10:15.000000Z"}, {"uuid": "5e21852e-18f3-4e16-b142-d2bc59603d2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26750", "type": "seen", "source": "https://t.me/cvedetector/18725", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26750 - Vitepos Appsbd Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26750 \nPublished : Feb. 22, 2025, 4:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : Missing Authorization vulnerability in appsbd Vitepos allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Vitepos: from n/a through 3.1.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T19:10:11.000000Z"}, {"uuid": "cc824696-ccf5-45fa-8722-416426175d06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26755", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4712", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26755\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-17T00:40:30.000000Z"}, {"uuid": "fc21806d-8bb6-41a8-baaa-edf2c8a4c6e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26759", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4711", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26759\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-17T00:40:26.000000Z"}, {"uuid": "90c6edb4-65f3-461a-b0c7-6408e85c095b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2675", "type": "published-proof-of-concept", "source": "Telegram/TxYF2rNxgao0QlSERqOAIAGczvgtgedogrr1QU2ew4YiRfY", "content": "", "creation_timestamp": "2025-03-24T02:31:04.000000Z"}, {"uuid": "9b2417fc-dfd5-45e0-a57a-dd0df5b243df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2675", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll3vwklrbk2l", "content": "", "creation_timestamp": "2025-03-24T04:23:58.794982Z"}, {"uuid": "82cb7790-ecc4-450e-b560-b65d2a2bdfa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26755", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114016043193338995", "content": "", "creation_timestamp": "2025-02-16T22:59:13.532437Z"}, {"uuid": "9591229b-4cdf-4410-b397-30f57dfd87b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26759", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114016043207735683", "content": "", "creation_timestamp": "2025-02-16T22:59:13.707459Z"}, {"uuid": "ae24ae8f-1a8d-492f-98e7-ed975e06ea76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26755", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lidefxfb7u2g", "content": "", "creation_timestamp": "2025-02-16T23:16:10.811325Z"}, {"uuid": "db28c16a-69ec-497b-a400-4d77a1c05e7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26759", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lidefzsguh2t", "content": "", "creation_timestamp": "2025-02-16T23:16:13.302325Z"}, {"uuid": "1b96af7a-4504-4826-86b5-ca2374388b48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26755", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lidq4jza3z2e", "content": "", "creation_timestamp": "2025-02-17T02:45:41.485410Z"}, {"uuid": "45646ac6-d83b-444f-a80e-704b1dbc5d7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26759", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lidq4kn3wq2a", "content": "", "creation_timestamp": "2025-02-17T02:45:44.836800Z"}, {"uuid": "91d60598-de4d-48ca-8254-1cd396b7e472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26752", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114065783798975123", "content": "", "creation_timestamp": "2025-02-25T17:48:55.666960Z"}, {"uuid": "7031573c-dc18-4857-b384-1ecc5968728b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26754", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114019047687602781", "content": "", "creation_timestamp": "2025-02-17T11:43:19.825685Z"}, {"uuid": "c05473ff-0697-4ad9-ac7e-04ca3f639f56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26758", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114019047703215178", "content": "", "creation_timestamp": "2025-02-17T11:43:19.909848Z"}, {"uuid": "4470caf5-0a96-477b-90dc-eedd9c9c5f56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26754", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3liepy35dwx2i", "content": "", "creation_timestamp": "2025-02-17T12:15:49.764870Z"}, {"uuid": "444dd3f1-0aa3-4810-a85b-77c1de88bc82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26758", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3liepy5pd4r27", "content": "", "creation_timestamp": "2025-02-17T12:15:52.213455Z"}, {"uuid": "ebaa0d40-cae2-49ab-8bec-2e0791edd7e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26758", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liezywsbuh23", "content": "", "creation_timestamp": "2025-02-17T15:15:18.723121Z"}, {"uuid": "824fc28d-7888-43cd-b37b-35fff8e0489e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26754", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liezyxfint2v", "content": "", "creation_timestamp": "2025-02-17T15:15:22.335508Z"}, {"uuid": "2ba1d51f-a7e1-446c-82cc-3504b5d84e7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26756", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5040", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26756\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in grimdonkey Magic the Gathering Card Tooltips allows Stored XSS. This issue affects Magic the Gathering Card Tooltips: from n/a through 3.5.0.\n\ud83d\udccf Published: 2025-02-22T15:52:11.712Z\n\ud83d\udccf Modified: 2025-02-22T15:52:11.712Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/magic-the-gathering-card-tooltips/vulnerability/wordpress-magic-the-gathering-card-tooltips-plugin-3-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-22T16:25:11.000000Z"}, {"uuid": "01b4b507-0d57-4cf2-a494-53be3c92028f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26757", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26757\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FULL SERVICES FULL Customer allows PHP Local File Inclusion. This issue affects FULL Customer: from n/a through 3.1.26.\n\ud83d\udccf Published: 2025-02-22T15:52:47.168Z\n\ud83d\udccf Modified: 2025-02-22T15:52:47.168Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/full-customer/vulnerability/wordpress-full-cliente-plugin-3-1-26-local-file-inclusion-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-22T16:25:08.000000Z"}, {"uuid": "7fb2e5d8-7601-47dd-b378-df7761f87a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26750", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5041", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26750\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Missing Authorization vulnerability in appsbd Vitepos allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Vitepos: from n/a through 3.1.3.\n\ud83d\udccf Published: 2025-02-22T15:52:11.429Z\n\ud83d\udccf Modified: 2025-02-22T15:52:11.429Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/vitepos-lite/vulnerability/wordpress-vitepos-plugin-3-1-3-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-22T16:25:13.000000Z"}, {"uuid": "9a712d61-1891-41e2-96ef-f24348c5ce74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26759", "type": "seen", "source": "https://t.me/cvedetector/18205", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26759 - Alexvtn Content Snippet Manager CSRF Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26759 \nPublished : Feb. 16, 2025, 11:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in alexvtn Content Snippet Manager allows Stored XSS. This issue affects Content Snippet Manager: from n/a through 1.1.5. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T01:29:25.000000Z"}, {"uuid": "d5612f8f-2ef9-4f99-8caf-d855a0d91916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26755", "type": "seen", "source": "https://t.me/cvedetector/18204", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26755 - Airbnb Review Slider SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-26755 \nPublished : Feb. 16, 2025, 11:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in jgwhite33 WP Airbnb Review Slider allows Blind SQL Injection. This issue affects WP Airbnb Review Slider: from n/a through 3.9. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T01:29:24.000000Z"}, {"uuid": "c0402614-560f-4299-8971-a43d50008942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2675", "type": "seen", "source": "https://t.me/cvedetector/20930", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2675 - PHPGurukul Bank Locker Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2675 \nPublished : March 24, 2025, 1:15 a.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in PHPGurukul Bank Locker Management System 1.0. Affected by this issue is some unknown functionality of the file /add-lockertype.php. The manipulation of the argument lockerprice leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T04:11:17.000000Z"}, {"uuid": "db7efb39-34a0-48bd-a56a-2811840d437e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26755", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:43.000000Z"}, {"uuid": "7158696b-1725-4be7-be94-bf02036c2a67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26759", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:43.000000Z"}]}