{"vulnerability": "CVE-2025-2723", "sightings": [{"uuid": "47c7d3d3-6573-49de-b2a7-cde98cafd7b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2723", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8578", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2723\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in GNOME libgsf up to 1.14.53. It has been rated as critical. This issue affects the function gsf_property_settings_collec. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Attacking locally is a requirement. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-25T01:00:06.666Z\n\ud83d\udccf Modified: 2025-03-25T01:00:06.666Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300743\n2. https://vuldb.com/?ctiid.300743\n3. https://vuldb.com/?submit.520183\n4. https://www.gnome.org/", "creation_timestamp": "2025-03-25T01:24:07.000000Z"}, {"uuid": "0a92b90b-e4a6-47b2-b0b5-75afe94b3817", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27237", "type": "seen", "source": "https://t.me/ics_cert/1333", "content": "\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u062c\u0632\u0627\u06cc Zabbix Agent \u0648 Agent2 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0646\u0638\u0627\u0631\u062a \u0628\u0631 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a Zabbix \u0628\u0647 \u0646\u0642\u0635\u200c\u0647\u0627\u06cc \u0645\u06a9\u0627\u0646\u06cc\u0632\u0645 \u06a9\u0646\u062a\u0631\u0644 \u0628\u0627\u0631\u06af\u0630\u0627\u0631\u06cc \u0641\u0627\u06cc\u0644 \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc OpenSSL \u0645\u0631\u0628\u0648\u0637 \u0645\u06cc\u200c\u0634\u0648\u062f. \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0646\u0641\u0648\u0630\u06af\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u062e\u0648\u062f \u0631\u0627 \u0628\u0627 \u0648\u0627\u0631\u062f \u06a9\u0631\u062f\u0646 \u0641\u0627\u06cc\u0644 DLL \u0628\u0647\u200c\u0637\u0648\u0631 \u062e\u0627\u0635 \u0633\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0647\u062f.\n\nBDU:2025-12554\nCVE-2025-27237\n\n\u0646\u0635\u0628 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0645\u0639\u062a\u0628\u0631\u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645\u06cc \u0631\u06cc\u0633\u06a9\u200c\u0647\u0627\u06cc \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u0634\u0648\u0646\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u0622\u0646\u062a\u06cc\u200c\u0648\u06cc\u0631\u0648\u0633 \u0628\u0631\u0627\u06cc \u0628\u0631\u0631\u0633\u06cc \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u062f\u0631\u06cc\u0627\u0641\u062a \u0634\u062f\u0647 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0646\u0627\u0645\u0639\u062a\u0628\u0631\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0645\u062d\u06cc\u0637 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u0628\u0633\u062a\u0647 \u0628\u0631\u0627\u06cc \u06a9\u0627\u0631 \u0628\u0627 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u062f\u0631\u06cc\u0627\u0641\u062a \u0634\u062f\u0647 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0646\u0627\u0645\u0639\u062a\u0628\u0631\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc SIEM \u0628\u0631\u0627\u06cc \u0631\u0635\u062f \u0631\u0648\u06cc\u062f\u0627\u062f\u0647\u0627\u06cc \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u062a\u063a\u06cc\u06cc\u0631 \u0641\u0627\u06cc\u0644 \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc OpenSSL\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 \u0648 \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc \u0627\u0632 \u0646\u0641\u0648\u0630 \u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc (\u06a9\u0634\u0641\u060c \u062b\u0628\u062a) \u0648 \u0648\u0627\u06a9\u0646\u0634 \u0628\u0647 \u062a\u0644\u0627\u0634\u200c\u0647\u0627\u06cc \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627.\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647\u200c\u0647\u0627:\nhttps://support.zabbix.com/browse/ZBX-27061\n\ud83d\udca1\u0627\u06af\u0631 \u0627\u06cc\u0646 \u0645\u062a\u0646 \u062f\u06cc\u062f\u06af\u0627\u0647 \u0634\u0645\u0627 \u0631\u0627 \u062a\u063a\u06cc\u06cc\u0631 \u062f\u0627\u062f\u060c \u0628\u0647 \u0627\u0634\u062a\u0631\u0627\u06a9 \u0628\u06af\u0630\u0627\u0631\u06cc\u062f. \n\u0628\u06cc\u0627\u06cc\u06cc\u062f \u0628\u0627 \u0647\u0645 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627 \u0631\u0627 \u0628\u0627\u0644\u0627 \u0628\u0628\u0631\u06cc\u0645.\u00a0 \n\ud83c\udfed\u00a0 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n@pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645 :\nhttps://t.me/ICSCERT_IR\n\u0627\u06cc\u062a\u0627:\nhttps://eitaa.com/joinchat/1866007784Cfd023f90b2\n\u06af\u0631\u0648\u0647 \u062a\u062e\u0635\u0635\u06cc \u0648\u0627\u062a\u0633 \u0627\u067e:\nhttps://chat.whatsapp.com/BZu1yr1aeHpCDxiIXotzyW?mode=ac_t\n\u0628\u0647 \u0627\u0646\u062c\u0645\u0646 \u062a\u062e\u0635\u0635\u06cc AI.Sec \u0628\u067e\u06cc\u0648\u0646\u062f\u06cc\u062f:\nhttps://chat.whatsapp.com/KRPUA6WM4f6AdS727vRBmM?mode=ems_copy_t", "creation_timestamp": "2025-10-06T17:33:28.000000Z"}, {"uuid": "a7d23cc6-dadb-4ff5-8dc2-7f6b1f6f6aab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27232", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3m6wj4dk6wj2c", "content": "", "creation_timestamp": "2025-12-01T13:15:07.955420Z"}, {"uuid": "14ab2480-5c13-4f47-ae27-07f59391d52d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27238", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lynjtf252q2a", "content": "", "creation_timestamp": "2025-09-12T15:02:53.549421Z"}, {"uuid": "a5c333a8-0790-4d6c-b475-7fec0f8793aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27237", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m2ki6fv55c2b", "content": "", "creation_timestamp": "2025-10-06T20:45:42.250853Z"}, {"uuid": "d785a027-7ad1-4bad-8fda-0dca37ed449c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27237", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m2izeyov7l2t", "content": "", "creation_timestamp": "2025-10-06T06:48:15.252784Z"}, {"uuid": "ea3c82d1-3adb-4400-81ff-c271e25394e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27233", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lynjd5mnjp2x", "content": "", "creation_timestamp": "2025-09-12T14:53:48.914461Z"}, {"uuid": "25fa1a33-04fd-41a0-bba4-3ab7205cd9ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lynjhzyihw2m", "content": "", "creation_timestamp": "2025-09-12T14:56:32.897734Z"}, {"uuid": "066004e5-cb6e-4a48-9f5a-041fffd874ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27234", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3meemdib5qs2u", "content": "", "creation_timestamp": "2026-02-08T18:56:08.621532Z"}, {"uuid": "a23a3ed7-7aee-4ce4-8d9d-e3a9cc9b1d23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2723", "type": "seen", "source": "https://t.me/cvedetector/21014", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2723 - GNOME libgsf Heap-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2723 \nPublished : March 25, 2025, 1:15 a.m. | 15\u00a0minutes ago \nDescription : A vulnerability was found in GNOME libgsf up to 1.14.53. It has been rated as critical. This issue affects the function gsf_property_settings_collec. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Attacking locally is a requirement. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T02:46:02.000000Z"}, {"uuid": "378846d3-eea1-45f5-9b97-ec81faf1d6ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27232", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6wqmal2r42k", "content": "", "creation_timestamp": "2025-12-01T15:29:17.465955Z"}, {"uuid": "48d05983-3e78-41f3-91ce-a341076d9515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27237", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m2jqx7zo3s2r", "content": "", "creation_timestamp": "2025-10-06T13:50:04.897471Z"}]}