{"vulnerability": "CVE-2025-2742", "sightings": [{"uuid": "5923406e-9989-4067-ae00-a62128e77191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://t.me/cvedetector/22425", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27429 - SAP S/4HANA ABAP Code Injection Backdoor\", \n  \"Content\": \"CVE ID : CVE-2025-27429 \nPublished : April 8, 2025, 8:15 a.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T11:29:13.000000Z"}, {"uuid": "5be32dfd-3283-4245-bc1c-5b01c43ad264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27428", "type": "seen", "source": "https://t.me/cvedetector/22424", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27428 - SAP Solution Manager Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27428 \nPublished : April 8, 2025, 8:15 a.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Due to directory traversal vulnerability, an authorized attacker could gain access to some critical information by using RFC enabled function module. Upon successful exploitation, they could read files from any managed system connected to SAP Solution Manager, leading to high impact on confidentiality. There is no impact on integrity or availability. \nSeverity: 7.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T11:29:12.000000Z"}, {"uuid": "a5674f70-7627-412b-a0d8-11f418aac74c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27427", "type": "seen", "source": "https://t.me/cvedetector/21740", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27427 - Apache ActiveMQ Artemis Routing Type Permission Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-27427 \nPublished : April 1, 2025, 8:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : A vulnerability exists in Apache ActiveMQ Artemis whereby a user with the createDurableQueue or createNonDurableQueue permission on an address can augment the routing-type supported by that address even if said user doesn't have the createAddress permission for that particular address. When combined with the send permission and automatic queue creation a user could successfully send a message with a routing-type not supported by the address when that message should actually be rejected on the basis that the user doesn't have permission to change the routing-type of the address.  \n  \nThis issue affects Apache ActiveMQ Artemis from 2.0.0 through 2.39.0.  \n  \nUsers are recommended to upgrade to version 2.40.0 which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T11:57:26.000000Z"}, {"uuid": "8ec5b134-25b9-428e-91df-2b10cd08bfd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2742", "type": "seen", "source": "https://t.me/cvedetector/21055", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2742 - \"Zhijiantianya Ruoyi-Vue-Pro Remote Path Traversal Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2742 \nPublished : March 25, 2025, 7:15 a.m. | 32\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in zhijiantianya ruoyi-vue-pro 2.4.1. This vulnerability affects unknown code of the file /admin-api/mp/material/upload-permanent of the component Material Upload Interface. The manipulation of the argument File leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T09:27:28.000000Z"}, {"uuid": "4d350d8f-2f08-4632-8a83-8d355b7e980f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://t.me/CyberBulletin/2488", "content": "\u26a1Vim Users Warned: Crafted TAR Files Could Trigger Code Execution (CVE-2025-27423).\n\n#CyberBulletin", "creation_timestamp": "2025-03-05T15:22:46.000000Z"}, {"uuid": "8dde147f-8268-4a29-a65d-16d26f657469", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://t.me/TengkorakCyberCrewzz/28663", "content": "Vim Vulnerability (CVE-2025-27423) Allows Code Execution via Malicious TAR Archives \u2013 gbhackers.com\n\nWed, 05 Mar 2025 18:28:30", "creation_timestamp": "2025-03-05T13:03:33.000000Z"}, {"uuid": "210aa638-2e2a-4ef1-b561-b1b86af3b057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ljmavbqxde2k", "content": "", "creation_timestamp": "2025-03-05T05:32:19.716908Z"}, {"uuid": "56c84c39-b45a-4bee-96c6-ffb097c36e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3ljmka6mqks2d", "content": "", "creation_timestamp": "2025-03-05T08:19:30.727166Z"}, {"uuid": "377f5716-375c-458e-b0fe-2826f5810811", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lkj2rs74y62b", "content": "", "creation_timestamp": "2025-03-16T16:30:12.792956Z"}, {"uuid": "f3a41915-3855-4fc3-9981-95594fb1345e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27425", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114104546018145703", "content": "", "creation_timestamp": "2025-03-04T14:06:39.273061Z"}, {"uuid": "a3f0c3b4-5b97-4c2b-ab28-5e59e8034483", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27420", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljim7ip7v52a", "content": "", "creation_timestamp": "2025-03-03T18:44:18.624254Z"}, {"uuid": "c24bf465-d0b9-4add-8553-b67920227272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27426", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljkxogshke2y", "content": "", "creation_timestamp": "2025-03-04T17:14:48.249492Z"}, {"uuid": "35c4828f-10b0-4f01-b0f2-031a806d12d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3ljlzzs576s2o", "content": "", "creation_timestamp": "2025-03-05T03:29:39.012283Z"}, {"uuid": "337621a2-53be-4d96-9646-883563deffce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27423", "type": "seen", "source": "https://bsky.app/profile/fernand0.bsky.social/post/3llyaftt4xt2o", "content": "", "creation_timestamp": "2025-04-04T10:46:01.639023Z"}, {"uuid": "30519c77-2aa7-4661-97b6-8fd9cf4af3b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lmc3aojtmn2t", "content": "", "creation_timestamp": "2025-04-08T08:40:17.146664Z"}, {"uuid": "1772d278-5acc-4153-a5f9-a82205063cba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmc5ed5kug2z", "content": "", "creation_timestamp": "2025-04-08T09:18:10.624614Z"}, {"uuid": "d6442843-e8b3-45ec-9120-cb7a00bfea3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27428", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmc5edeayk2b", "content": "", "creation_timestamp": "2025-04-08T09:18:11.843582Z"}, {"uuid": "f8862ee8-50b2-4531-8784-35d42b9f3c8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114301713078763649", "content": "", "creation_timestamp": "2025-04-08T09:48:49.932838Z"}, {"uuid": "102e8cf9-eb1f-4d1c-855b-3d1c00057d8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0119", "content": "", "creation_timestamp": "2025-04-25T10:10:29.000000Z"}, {"uuid": "228d3fd6-d7a8-45e9-b9b8-36e63b1f9f60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0119", "content": "", "creation_timestamp": "2025-04-30T11:12:27.000000Z"}, {"uuid": "fb01db52-afdc-44b7-a150-9416a67a3118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lw7rlkrj622o", "content": "", "creation_timestamp": "2025-08-12T16:54:01.747753Z"}, {"uuid": "01760072-7d46-423a-b65d-27c96284eb2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27422", "type": "seen", "source": "https://t.me/cvedetector/19376", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27422 - Faction Admin Account Creation Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27422 \nPublished : March 3, 2025, 5:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : FACTION is a PenTesting Report Generation and Collaboration Framework. Authentication is bypassed when an attacker registers a new user with admin privileges. This is possible at any time without any authorization. The request must follow the validation rules (no missing information, secure password, etc) but there are no other controls stopping them. This vulnerability is fixed in 1.4.3. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T19:44:02.000000Z"}, {"uuid": "ec7bbdf9-51ff-4bc4-8df8-e77a96acdf39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27421", "type": "seen", "source": "https://t.me/cvedetector/19375", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27421 - Abacus Server-Sent Events Goroutine Leak Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27421 \nPublished : March 3, 2025, 5:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Abacus is a highly scalable and stateless counting API. A critical goroutine leak vulnerability has been identified in the Abacus server's Server-Sent Events (SSE) implementation. The issue occurs when clients disconnect from the /stream endpoint, as the server fails to properly clean up resources and terminate associated goroutines. This leads to resource exhaustion where the server continues running but eventually stops accepting new SSE connections while maintaining high memory usage. The vulnerability specifically involves improper channel cleanup in the event handling mechanism, causing goroutines to remain blocked indefinitely. This vulnerability is fixed in 1.4.0. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T19:44:01.000000Z"}, {"uuid": "73809eb9-020e-481e-9ba9-fd5e9c15f71f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://t.me/cvedetector/19373", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27423 - Vim Tar.vim Plugin Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27423 \nPublished : March 3, 2025, 5:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the \":read\" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164 \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T19:43:59.000000Z"}, {"uuid": "f716c433-d0cf-4189-aa88-8f54b29d2d8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14624", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27423\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the \":read\" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164\n\ud83d\udccf Published: 2025-03-03T16:30:19.752Z\n\ud83d\udccf Modified: 2025-05-02T23:03:02.425Z\n\ud83d\udd17 References:\n1. https://github.com/vim/vim/security/advisories/GHSA-wfmf-8626-q3r3\n2. https://github.com/vim/vim/commit/129a8446d23cd9cb4445fcfea259cba5e0487d29\n3. https://github.com/vim/vim/commit/334a13bff78aa0ad206bc436885f63e3a0bab399", "creation_timestamp": "2025-05-02T23:17:18.000000Z"}, {"uuid": "39bc6ed4-80af-49b6-a425-223320bfed4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27427", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9861", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27427\n\ud83d\udd25 CVSS Score: 2.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability exists in Apache ActiveMQ Artemis whereby a user with the createDurableQueue or createNonDurableQueue permission on an address can augment the routing-type supported by that address even if said user doesn't have the createAddress permission for that particular address. When combined with the send permission and automatic queue creation a user could successfully send a message with a routing-type not supported by the address when that message should actually be rejected on the basis that the user doesn't have permission to change the routing-type of the address.\n\nThis issue affects Apache ActiveMQ Artemis from 2.0.0 through 2.39.0.\n\nUsers are recommended to upgrade to version 2.40.0 which fixes the issue.\n\ud83d\udccf Published: 2025-04-01T07:26:59.994Z\n\ud83d\udccf Modified: 2025-04-01T07:26:59.994Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/8dzlm2vkqphyrnkrby8r8kzndsm5o6x8", "creation_timestamp": "2025-04-01T07:32:09.000000Z"}, {"uuid": "f0377b19-fc19-4db5-8201-3ab972d6b281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/9262", "content": "Vim Vulnerability (CVE-2025-27423) Allows Code Execution via Malicious TAR Archives \u2013 gbhackers.com\n\nWed, 05 Mar 2025 18:28:30", "creation_timestamp": "2025-03-05T13:03:33.000000Z"}, {"uuid": "f513deba-c3bf-430e-b329-c4b6228471f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/2311", "content": "Vim Vulnerability (CVE-2025-27423) Allows Code Execution via Malicious TAR Archives \u2013 gbhackers.com\n\nWed, 05 Mar 2025 18:28:30", "creation_timestamp": "2025-03-05T13:03:33.000000Z"}, {"uuid": "e33f935f-cf96-497f-ad70-08a4429def4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27427", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llosdw2r662t", "content": "", "creation_timestamp": "2025-03-31T16:40:26.757492Z"}, {"uuid": "4767d7c6-f080-487f-add5-adc9a405cb3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27423", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3ljm6hi5hfs24", "content": "", "creation_timestamp": "2025-03-05T04:48:49.165434Z"}, {"uuid": "2877deeb-3e50-4169-8a87-4d1d39f1953c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lklwuqfadg2x", "content": "", "creation_timestamp": "2025-03-17T19:58:15.573405Z"}, {"uuid": "781e4221-4f2d-4a40-876e-8453f40869ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114099556793062950", "content": "", "creation_timestamp": "2025-03-03T16:57:49.831817Z"}, {"uuid": "cd0f413e-3033-4782-b373-df54d8ad0c94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27422", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114099625284227660", "content": "", "creation_timestamp": "2025-03-03T17:15:15.151620Z"}, {"uuid": "328027c2-2673-451d-beef-196740329035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljit7ahf7b2d", "content": "", "creation_timestamp": "2025-03-03T20:49:25.416486Z"}, {"uuid": "127244ba-13eb-450c-af1f-571beebfffac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0119", "content": "", "creation_timestamp": "2025-04-09T07:12:05.000000Z"}, {"uuid": "197a0929-9440-411d-830a-72d41bd6c976", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308286346337457", "content": "", "creation_timestamp": "2025-04-09T13:40:30.280024Z"}, {"uuid": "ac48bb4f-8fbf-4b04-8be3-37e61922e896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:45.000000Z"}, {"uuid": "e9bb8785-2cd1-4591-9247-c6b940fdeb25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27426", "type": "seen", "source": "https://t.me/cvedetector/19501", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27426 - \"Firefox for iOS URL Spoofing Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-27426 \nPublished : March 4, 2025, 2:15 p.m. | 28\u00a0minutes ago \nDescription : Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL This vulnerability affects Firefox for iOS &lt; 136. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T15:50:41.000000Z"}, {"uuid": "c746337a-731f-420c-9d32-99aa4dd7a93e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27424", "type": "seen", "source": "https://t.me/cvedetector/19500", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27424 - Firefox for iOS URL Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27424 \nPublished : March 4, 2025, 2:15 p.m. | 28\u00a0minutes ago \nDescription : Websites redirecting to a non-HTTP scheme URL could allow a website address to be spoofed for a malicious page This vulnerability affects Firefox for iOS &lt; 136. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T15:50:40.000000Z"}, {"uuid": "07dee797-68b8-4701-a401-e61eae30ffae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27421", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6226", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27421\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Abacus is a highly scalable and stateless counting API. A critical goroutine leak vulnerability has been identified in the Abacus server's Server-Sent Events (SSE) implementation. The issue occurs when clients disconnect from the /stream endpoint, as the server fails to properly clean up resources and terminate associated goroutines. This leads to resource exhaustion where the server continues running but eventually stops accepting new SSE connections while maintaining high memory usage. The vulnerability specifically involves improper channel cleanup in the event handling mechanism, causing goroutines to remain blocked indefinitely. This vulnerability is fixed in 1.4.0.\n\ud83d\udccf Published: 2025-03-03T16:19:23.914Z\n\ud83d\udccf Modified: 2025-03-03T16:19:23.914Z\n\ud83d\udd17 References:\n1. https://github.com/JasonLovesDoggo/abacus/security/advisories/GHSA-vh64-54px-qgf8\n2. https://github.com/JasonLovesDoggo/abacus/commit/898ff1204e11317cc161240b660e63eed5a72b33", "creation_timestamp": "2025-03-03T16:30:30.000000Z"}, {"uuid": "a273e1de-1f82-433d-90c4-3e661bf7aad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27420", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6229", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27420\n\ud83d\udd25 CVSS Score: 6.4 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the atendido_parentesco_adicionar.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the descricao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability fix in 3.2.16.\n\ud83d\udccf Published: 2025-03-03T16:05:16.087Z\n\ud83d\udccf Modified: 2025-03-03T16:05:16.087Z\n\ud83d\udd17 References:\n1. https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x3wr-75qx-55cw\n2. https://github.com/LabRedesCefetRJ/WeGIA/commit/add78bb177cbb29477ff2121b533651a9d673918", "creation_timestamp": "2025-03-03T16:30:33.000000Z"}, {"uuid": "e456e2c4-7836-47ea-bc9f-5101d002a139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2742", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8623", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2742\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical was found in zhijiantianya ruoyi-vue-pro 2.4.1. This vulnerability affects unknown code of the file /admin-api/mp/material/upload-permanent of the component Material Upload Interface. The manipulation of the argument File leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-25T06:31:07.259Z\n\ud83d\udccf Modified: 2025-03-25T06:31:07.259Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300844\n2. https://vuldb.com/?ctiid.300844\n3. https://vuldb.com/?submit.519691\n4. https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#5arbitrary-file-deletion-vulnerability---uploadpermanentmaterial", "creation_timestamp": "2025-03-25T07:24:03.000000Z"}, {"uuid": "5dd29482-a923-4288-ae17-efdd440add30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3ljoamu53ak2s", "content": "", "creation_timestamp": "2025-03-06T00:33:00.672107Z"}, {"uuid": "7985b9f3-3afa-4710-a5a5-a90064ef9074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lmcejquoj22v", "content": "", "creation_timestamp": "2025-04-08T11:26:25.691664Z"}, {"uuid": "46788740-e77d-4049-ac3a-d1b09f16d0e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lmcvlgaa4222", "content": "", "creation_timestamp": "2025-04-08T16:31:34.938302Z"}, {"uuid": "4eb6b132-ccba-4805-9bf8-686371527e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0119", "content": "", "creation_timestamp": "2025-04-28T07:35:57.000000Z"}, {"uuid": "e1f76c22-baa3-47f6-ac46-d49d906318d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "3c95bee0-d166-4b2f-9c7e-981a63ee8b3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27425", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:45.000000Z"}, {"uuid": "4916e357-8654-479e-8adc-f2a65883baa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27420", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}, {"uuid": "f6654132-0f74-43d7-ab09-a4dc439b928e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27421", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}, {"uuid": "6f7815c6-4abb-4cf0-8086-ea1332de34f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27428", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/43ff9e04-da8f-45fe-a06a-e8f9b84a2d14", "content": "", "creation_timestamp": "2025-09-11T13:37:23.512990Z"}, {"uuid": "e730d53b-1287-459b-a2f9-ba52be9958b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27425", "type": "seen", "source": "https://t.me/cvedetector/19497", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27425 - Firefox for iOS URL Autoload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27425 \nPublished : March 4, 2025, 2:15 p.m. | 28\u00a0minutes ago \nDescription : Scanning certain QR codes that included text with a website URL could allow the URL to be opened without presenting the user with a confirmation alert first This vulnerability affects Firefox for iOS &lt; 136. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T15:50:36.000000Z"}, {"uuid": "75d261cf-df32-43e1-833c-524b61431ac1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://t.me/TengkorakCyberCrewzz/388", "content": "Vim Vulnerability (CVE-2025-27423) Allows Code Execution via Malicious TAR Archives \u2013 gbhackers.com\n\nWed, 05 Mar 2025 18:28:30", "creation_timestamp": "2025-03-05T12:03:33.000000Z"}, {"uuid": "100bf165-6a37-47e1-8faa-62f83dcecbd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27428", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10869", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27428\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Due to directory traversal vulnerability, an authorized attacker could gain access to some critical information by using RFC enabled function module. Upon successful exploitation, they could read files from any managed system connected to SAP Solution Manager, leading to high impact on confidentiality. There is no impact on integrity or availability.\n\ud83d\udccf Published: 2025-04-08T07:13:27.056Z\n\ud83d\udccf Modified: 2025-04-08T07:13:27.056Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3581811\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-04-08T07:46:31.000000Z"}, {"uuid": "b1d5ae4d-0471-47ae-b21f-9d5c444444ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10868", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27429\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.\n\ud83d\udccf Published: 2025-04-08T07:13:37.548Z\n\ud83d\udccf Modified: 2025-04-08T07:13:37.548Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3581961\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-04-08T07:46:30.000000Z"}]}