{"vulnerability": "CVE-2025-2708", "sightings": [{"uuid": "cb2c3ce6-6e82-4cef-bcbf-dc31d6e8584f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27089", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likej7ksw226", "content": "", "creation_timestamp": "2025-02-19T18:06:41.749695Z"}, {"uuid": "eaf91d7e-1d5a-4a53-89f3-2417ce4f57d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27081", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmhfsnsacr2v", "content": "", "creation_timestamp": "2025-04-10T11:32:45.541809Z"}, {"uuid": "c8ace33f-384b-4603-b283-fe30394e64e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27086", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114382402386823114", "content": "", "creation_timestamp": "2025-04-22T15:49:17.643573Z"}, {"uuid": "7f33e2b6-409c-44ca-a7de-aaf18f2b63f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27087", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114383837388549905", "content": "", "creation_timestamp": "2025-04-22T21:54:07.570411Z"}, {"uuid": "f782dc1e-5e31-4c20-82de-36422fcef687", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27087", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngzdjofmo2l", "content": "", "creation_timestamp": "2025-04-23T01:14:37.476323Z"}, {"uuid": "5f599608-a989-4944-8339-e5721c2f6913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27088", "type": "seen", "source": "https://t.me/cvedetector/18606", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27088 - AWS S3 Proxy - Reflected Cross-site Scripting (XSS) in oxyno-zeta\", \n  \"Content\": \"CVE ID : CVE-2025-27088 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : oxyno-zeta/s3-proxy is an aws s3 proxy written in go. In affected versions a Reflected Cross-site Scripting (XSS) vulnerability enables attackers to create malicious URLs that, when visited, inject scripts into the web application. This can lead to session hijacking or phishing attacks on a trusted domain, posing a moderate risk to all users. It's possible to inject html elements, including scripts through the folder-list template. The affected template allows users to interact with the URL path provided by the `Request.URL.Path` variable, which is then rendered directly into the HTML without proper sanitization or escaping. This can be abused by attackers who craft a malicious URL containing injected HTML or JavaScript. When users visit such a URL, the malicious script will be executed in the user's context. This issue has been addressed in version 4.18.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:54:18.000000Z"}, {"uuid": "5aa7955e-8b30-4520-b8a6-cef671ea3918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2708", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8524", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2708\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in zhijiantianya ruoyi-vue-pro 2.4.1. This affects an unknown part of the file /admin-api/infra/file/upload of the component Backend File Upload Interface. The manipulation of the argument path leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-24T19:31:03.576Z\n\ud83d\udccf Modified: 2025-03-24T20:06:17.827Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300729\n2. https://vuldb.com/?ctiid.300729\n3. https://vuldb.com/?submit.517030\n4. https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#4file-path-traversal-back-end", "creation_timestamp": "2025-03-24T20:23:39.000000Z"}, {"uuid": "0ec7f1a0-1741-44dc-803a-a06f193129fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27087", "type": "seen", "source": "https://t.me/cvedetector/23564", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27087 - Cray Operating System (COS) Kernel Local Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2025-27087 \nPublished : April 22, 2025, 10:15 p.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : A vulnerability in the kernel of the Cray Operating System (COS) could allow an attacker to perform a local Denial of Service (DoS) attack. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T02:46:25.000000Z"}, {"uuid": "cbf6163d-d678-4b29-b96f-ed46c0db59fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27081", "type": "seen", "source": "https://t.me/cvedetector/22645", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27081 - HPE NonStop OSM Service Connection Suite Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27081 \nPublished : April 10, 2025, 9:15 a.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : A potential security vulnerability in HPE NonStop OSM Service Connection Suite could potentially be exploited to allow a local Denial of Service. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T13:41:24.000000Z"}, {"uuid": "4b230c96-9926-4e6a-8fb3-11a9c2a8ea20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27089", "type": "seen", "source": "https://t.me/cvedetector/18457", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27089 - Directus Unintended Field Update Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27089 \nPublished : Feb. 19, 2025, 5:15 p.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : Directus is a real-time API and App dashboard for managing SQL database content. In affected versions if there are two overlapping policies for the `update` action that allow access to different fields, instead of correctly checking access permissions against the item they apply for the user is allowed to update the superset of fields allowed by any of the policies. E.g. have one policy allowing update access to `field_a` if the `id == 1` and one policy allowing update access to `field_b` if the `id == 2`. The user with both these policies is allowed to update both `field_a` and `field_b` for the items with ids `1` and `2`. Before v11, if a user was allowed to update an item they were allowed to update the fields that the single permission, that applied to that item, listed. With overlapping permissions this isn't as clear cut anymore and the union of fields might not be the fields the user is allowed to update for that specific item. The solution that this PR introduces is to evaluate the permissions for each field that the user tries to update in the validateItemAccess DB query, instead of only verifying access to the item as a whole. This is done by, instead of returning the actual field value, returning a flag that indicates if the user has access to that field. This uses the same case/when mechanism that is used for stripping out non permitted field that is at the core of the permissions engine. As a result, for every item that the access is validated for, the expected result is an item that has either 1 or null for all the \"requested\" fields instead of any of the actual field values. These results are not useful for anything other than verifying the field level access permissions. The final check in validateItemAccess can either fail if the number of items does not match the number of items the access is checked for (ie. the user does not have access to the item at all) or if not all of the passed in fields have access permissions for any of the returned items. This is a vulnerability that allows update access to unintended fields, potentially impacting the password field for user accounts. This has been addressed in version 11.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:24:59.000000Z"}, {"uuid": "e07f6c57-f229-438d-8a80-9f96bc8c4a85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27086", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12744", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27086\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability in the HPE Performance Cluster Manager (HPCM) GUI could allow an attacker to bypass authentication.\n\ud83d\udccf Published: 2025-04-21T18:07:11.498Z\n\ud83d\udccf Modified: 2025-04-21T18:19:30.528Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04842en_us&amp;docLocale=en_US", "creation_timestamp": "2025-04-21T19:02:27.000000Z"}, {"uuid": "30e9ce77-8101-4a51-a2aa-cfd836fbe9e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27080", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7977", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27080\n\ud83d\udd25 CVSS Score: 6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Vulnerabilities in the command line interface of AOS-CX could allow an authenticated remote attacker to expose sensitive information. Successful exploitation could allow an attacker to gain unauthorized access to services outside of the impacted switch, potentially leading to lateral movement involving those services.\n\ud83d\udccf Published: 2025-03-18T19:02:30.151Z\n\ud83d\udccf Modified: 2025-03-18T19:32:15.822Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04818en_us&amp;docLocale=en_US", "creation_timestamp": "2025-03-18T19:48:50.000000Z"}, {"uuid": "14dfd86b-cd7c-45c9-88ce-e9bf928078ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27081", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11198", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27081\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: A potential security vulnerability in HPE NonStop OSM Service Connection Suite could potentially be exploited to allow a local Denial of Service.\n\ud83d\udccf Published: 2025-04-10T08:43:48.473Z\n\ud83d\udccf Modified: 2025-04-10T08:43:48.473Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbns04836en_us&amp;docLocale=en_US", "creation_timestamp": "2025-04-10T08:48:40.000000Z"}, {"uuid": "1a543fb0-6586-406f-a49e-545abf8e9f8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27084", "type": "seen", "source": "https://t.me/cvedetector/22482", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27084 - Aruba Captive Portal Reflected Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27084 \nPublished : April 8, 2025, 5:15 p.m. | 17\u00a0minutes ago \nDescription : A vulnerability in the Captive Portal of an AOS-10 GW and AOS-8 Controller/Mobility Conductor could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack. Successful exploitation could enable the attacker to execute arbitrary script code in the victim's browser within the context of the affected interface. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T19:51:32.000000Z"}, {"uuid": "cebab40f-9322-4c40-8c52-a92ea42ac135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27085", "type": "seen", "source": "https://t.me/cvedetector/22483", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27085 - AOS-10 GW and AOS-8 Controller/Mobility Conductor File Download Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27085 \nPublished : April 8, 2025, 5:15 p.m. | 17\u00a0minutes ago \nDescription : Multiple vulnerabilities exist in the web-based management interface of AOS-10 GW and AOS-8 Controller/Mobility Conductor. Successful exploitation of these vulnerabilities could allow an authenticated, remote attacker to download arbitrary files from the filesystem of an affected device. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T19:51:33.000000Z"}, {"uuid": "8c5da85a-100b-40cb-a652-bddd5b63f001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27083", "type": "seen", "source": "https://t.me/cvedetector/22481", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27083 - AOS-10 GW and AOS-8 Controller/Mobility Conductor Command Injection\", \n  \"Content\": \"CVE ID : CVE-2025-27083 \nPublished : April 8, 2025, 5:15 p.m. | 17\u00a0minutes ago \nDescription : Authenticated command injection vulnerabilities exist in the AOS-10 GW and AOS-8 Controller/Mobility Conductor web-based management interface. Successful exploitation of these vulnerabilities allows an Authenticated attacker to execute arbitrary commands as a privileged user on the underlying operating system. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T19:51:29.000000Z"}, {"uuid": "e08e06cc-9e03-429a-bde0-354d44339136", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2708", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll5t67j2pl2n", "content": "", "creation_timestamp": "2025-03-24T22:39:55.750299Z"}, {"uuid": "16c19759-4295-40b1-a1bc-aa3e6685ea15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27086", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114377364182338148", "content": "", "creation_timestamp": "2025-04-21T18:27:54.145018Z"}, {"uuid": "79895c7f-b59c-46f2-816c-9f97432e4d54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27086", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lne2luzh7m2v", "content": "", "creation_timestamp": "2025-04-21T20:59:14.160543Z"}, {"uuid": "0107e889-a4e9-45af-8009-3bbbc5454018", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27085", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10937", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27085\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Multiple vulnerabilities exist in the web-based management interface of AOS-10 GW and AOS-8 Controller/Mobility Conductor. Successful exploitation of these vulnerabilities could allow an authenticated, remote attacker to download arbitrary files from the filesystem of an affected device.\n\ud83d\udccf Published: 2025-04-08T16:29:25.829Z\n\ud83d\udccf Modified: 2025-04-08T16:29:25.829Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&amp;docLocale=en_US", "creation_timestamp": "2025-04-08T16:46:23.000000Z"}, {"uuid": "bc9645f3-7522-4b79-971f-32b371b07e02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27088", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4824", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27088\n\ud83d\udd25 CVSS Score: 8.4 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:N)\n\ud83d\udd39 Description: oxyno-zeta/s3-proxy is an aws s3 proxy written in go. In affected versions a Reflected Cross-site Scripting (XSS) vulnerability enables attackers to create malicious URLs that, when visited, inject scripts into the web application. This can lead to session hijacking or phishing attacks on a trusted domain, posing a moderate risk to all users. It's possible to inject html elements, including scripts through the folder-list template. The affected template allows users to interact with the URL path provided by the `Request.URL.Path` variable, which is then rendered directly into the HTML without proper sanitization or escaping. This can be abused by attackers who craft a malicious URL containing injected HTML or JavaScript. When users visit such a URL, the malicious script will be executed in the user's context. This issue has been addressed in version 4.18.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-02-20T22:33:50.646Z\n\ud83d\udccf Modified: 2025-02-20T22:33:50.646Z\n\ud83d\udd17 References:\n1. https://github.com/oxyno-zeta/s3-proxy/security/advisories/GHSA-pp9m-qf39-hxjc\n2. https://github.com/oxyno-zeta/s3-proxy/commit/c611c741ed4872ea3f46232be23bb830f96f9564\n3. https://github.com/oxyno-zeta/s3-proxy/blob/master/templates/folder-list.tpl#L19C21-L19C38", "creation_timestamp": "2025-02-20T23:16:57.000000Z"}, {"uuid": "bf843783-f6e9-4e6b-a1e8-4f0d0f66ac72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27084", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10936", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27084\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability in the Captive Portal of an AOS-10 GW and AOS-8 Controller/Mobility Conductor could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack. Successful exploitation could enable the attacker to execute arbitrary script code in the victim's browser within the context of the affected interface.\n\ud83d\udccf Published: 2025-04-08T16:32:46.764Z\n\ud83d\udccf Modified: 2025-04-08T16:33:09.252Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&amp;docLocale=en_US", "creation_timestamp": "2025-04-08T16:46:22.000000Z"}, {"uuid": "b059c2af-a453-4769-885a-3440b6ebb738", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27083", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10940", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27083\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Authenticated command injection vulnerabilities exist in the AOS-10 GW and AOS-8 Controller/Mobility Conductor web-based management interface. Successful exploitation of these vulnerabilities allows an Authenticated attacker to execute arbitrary commands as a privileged user on the underlying operating system.\n\ud83d\udccf Published: 2025-04-08T16:26:50.920Z\n\ud83d\udccf Modified: 2025-04-08T16:26:50.920Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&amp;docLocale=en_US", "creation_timestamp": "2025-04-08T16:46:26.000000Z"}, {"uuid": "da65d792-ed3f-41d4-8fad-699ad2593222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27082", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10943", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27082\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Arbitrary File Write vulnerabilities exist in the web-based management interface of both the AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an Authenticated attacker to upload arbitrary files and execute arbitrary commands on the underlying host operating system.\n\ud83d\udccf Published: 2025-04-08T16:22:50.625Z\n\ud83d\udccf Modified: 2025-04-08T16:22:50.625Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&amp;docLocale=en_US", "creation_timestamp": "2025-04-08T16:46:32.000000Z"}, {"uuid": "33342bf8-5a5a-452a-99e2-b737be3a3694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27087", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12994", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27087\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability in the kernel of the Cray Operating System (COS) could allow an attacker to perform a local Denial of Service (DoS) attack.\n\ud83d\udccf Published: 2025-04-22T21:38:20.893Z\n\ud83d\udccf Modified: 2025-04-22T21:38:20.893Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04838en_us&amp;docLocale=en_US", "creation_timestamp": "2025-04-22T22:04:03.000000Z"}, {"uuid": "9892b829-ab68-4852-85cf-a7d7bf8a1f88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27086", "type": "seen", "source": "https://t.me/cvedetector/23460", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27086 - Hewlett Packard Enterprise HPE Performance Cluster Manager (HPCM) Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27086 \nPublished : April 21, 2025, 6:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : A vulnerability in the HPE Performance Cluster Manager (HPCM) GUI could allow an attacker to bypass authentication. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-21T22:20:12.000000Z"}, {"uuid": "53e9886f-9546-4c15-9781-d29693797b29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27082", "type": "seen", "source": "https://t.me/cvedetector/22484", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27082 - Fortinet AOS-10 GW and AOS-8 Controller/Mobility Conductor Arbitrary File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27082 \nPublished : April 8, 2025, 5:15 p.m. | 17\u00a0minutes ago \nDescription : Arbitrary File Write vulnerabilities exist in the web-based management interface of both the AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an Authenticated attacker to upload arbitrary files and execute arbitrary commands on the underlying host operating system. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T19:51:34.000000Z"}, {"uuid": "4e9b4f7b-f99e-41e8-a167-54d0aa5b2a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27080", "type": "seen", "source": "https://t.me/cvedetector/20602", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27080 - AOS-CX Command Line Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27080 \nPublished : March 18, 2025, 7:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : Vulnerabilities in the command line interface of AOS-CX could allow an authenticated remote attacker to expose sensitive information. Successful exploitation could allow an attacker to gain unauthorized access to services outside of the impacted switch, potentially leading to lateral movement involving those services. \nSeverity: 6.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T21:55:35.000000Z"}, {"uuid": "732871f0-f442-4dfd-815b-2fcb3cb726b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2708", "type": "seen", "source": "https://t.me/cvedetector/20991", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2708 - Zhijiantianya Ruoyi-Vue-Pro Backend File Upload Interface Remote Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2708 \nPublished : March 24, 2025, 8:15 p.m. | 1\u00a0hour, 6\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in zhijiantianya ruoyi-vue-pro 2.4.1. This affects an unknown part of the file /admin-api/infra/file/upload of the component Backend File Upload Interface. The manipulation of the argument path leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T22:35:04.000000Z"}]}