{"vulnerability": "CVE-2025-2744", "sightings": [{"uuid": "26bd10c8-6374-415a-a35f-e9289a349f55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27440", "type": "seen", "source": "https://t.me/cvedetector/20132", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27440 - Zoom Workplace Apps Heap Overflow Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-27440 \nPublished : March 11, 2025, 6:15 p.m. | 2\u00a0hours, 11\u00a0minutes ago \nDescription : Heap overflow in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via network access. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T21:49:03.000000Z"}, {"uuid": "e1cf5226-29fd-4b04-8ad2-849265c226ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2744", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8621", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2744\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in zhijiantianya ruoyi-vue-pro 2.4.1. Affected is an unknown function of the file /admin-api/mp/material/upload-news-image of the component Material Upload Interface. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-25T07:00:11.929Z\n\ud83d\udccf Modified: 2025-03-25T07:00:11.929Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300846\n2. https://vuldb.com/?ctiid.300846\n3. https://vuldb.com/?submit.519694\n4. https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#7arbitrary-file-deletion-vulnerability---uploadnewsimage", "creation_timestamp": "2025-03-25T07:23:57.000000Z"}, {"uuid": "06e703d5-f1ab-446f-8309-498f923231b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27445", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18691", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27445\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files\n\ud83d\udccf Published: 2025-06-05T13:20:40.631Z\n\ud83d\udccf Modified: 2025-06-18T04:38:55.787Z\n\ud83d\udd17 References:\n1. https://rsjoomla.com/", "creation_timestamp": "2025-06-18T05:40:26.000000Z"}, {"uuid": "ae6c889c-aded-45b7-989d-6490112429b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2744", "type": "seen", "source": "https://t.me/cvedetector/21051", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2744 - \"Zhijiantianya Ruoyi-vue-pro Remote Path Traversal Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2744 \nPublished : March 25, 2025, 7:15 a.m. | 32\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in zhijiantianya ruoyi-vue-pro 2.4.1. Affected is an unknown function of the file /admin-api/mp/material/upload-news-image of the component Material Upload Interface. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T09:27:25.000000Z"}, {"uuid": "816593f4-c729-405d-a419-07c363cfacb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27440", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk4wr6jc562s", "content": "", "creation_timestamp": "2025-03-11T20:46:19.714162Z"}, {"uuid": "d5fb4050-1aa4-4d3a-af98-7bcd9baefddc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27440", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkek3hf4ks2o", "content": "", "creation_timestamp": "2025-03-14T21:20:49.877440Z"}, {"uuid": "7a4a0c5f-c1e1-4822-8b1b-b2325a790e4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27440", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lk3xmbkm452f", "content": "", "creation_timestamp": "2025-03-11T11:28:49.202027Z"}, {"uuid": "905c20a4-a00a-4a8f-ae48-d22095264cca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27441", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmlrp5p35c24", "content": "", "creation_timestamp": "2025-04-12T05:16:05.459053Z"}, {"uuid": "6d733900-63ba-42bc-bbf2-0e81ce7758ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27442", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmlrp5p35c24", "content": "", "creation_timestamp": "2025-04-12T05:16:05.548568Z"}, {"uuid": "57dcae04-3757-4f79-9845-4642e9e0af32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27444", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqrnv262am2q", "content": "", "creation_timestamp": "2025-06-04T11:04:30.097351Z"}, {"uuid": "98769721-8a9b-4c7e-a064-118153886146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27449", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114787856061012885", "content": "", "creation_timestamp": "2025-07-03T06:21:23.547062Z"}, {"uuid": "5597751e-415d-405a-baa9-ebff9ba5e61b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27442", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10949", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27442\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access.\n\ud83d\udccf Published: 2025-04-08T16:14:53.396Z\n\ud83d\udccf Modified: 2025-04-08T16:14:53.396Z\n\ud83d\udd17 References:\n1. https://www.zoom.com/en/trust/security-bulletin/zsb-25013", "creation_timestamp": "2025-04-08T16:46:41.000000Z"}, {"uuid": "7f80e4c9-315a-4b5b-89c6-c9f005a5a918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27443", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10948", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27443\n\ud83d\udd25 CVSS Score: 2.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access.\n\ud83d\udccf Published: 2025-04-08T16:16:38.148Z\n\ud83d\udccf Modified: 2025-04-08T16:16:38.148Z\n\ud83d\udd17 References:\n1. https://www.zoom.com/en/trust/security-bulletin/zsb-25014", "creation_timestamp": "2025-04-08T16:46:40.000000Z"}, {"uuid": "f49870ff-27d1-46bd-9073-a5b975096c2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27441", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10950", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27441\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access.\n\ud83d\udccf Published: 2025-04-08T16:14:40.782Z\n\ud83d\udccf Modified: 2025-04-08T16:14:40.782Z\n\ud83d\udd17 References:\n1. https://www.zoom.com/en/trust/security-bulletin/zsb-25013", "creation_timestamp": "2025-04-08T16:46:42.000000Z"}, {"uuid": "6a9708db-4b60-47fe-91d6-eff5f408ad0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27442", "type": "seen", "source": "https://t.me/cvedetector/22480", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27442 - Zoom Workplace Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27442 \nPublished : April 8, 2025, 5:15 p.m. | 17\u00a0minutes ago \nDescription : Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T19:51:28.000000Z"}, {"uuid": "f716223f-fc1e-4bf5-96d8-e4bc1614e51d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27441", "type": "seen", "source": "https://t.me/cvedetector/22479", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27441 - Zoom Workplace Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27441 \nPublished : April 8, 2025, 5:15 p.m. | 17\u00a0minutes ago \nDescription : Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T19:51:27.000000Z"}, {"uuid": "b8da10c8-8c92-4efb-bcf1-ec2fff6425e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27443", "type": "seen", "source": "https://t.me/cvedetector/22475", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27443 - Zoom Workplace Apps for Windows - Insecure Default Variable Initialization Local Integrity Loss\", \n  \"Content\": \"CVE ID : CVE-2025-27443 \nPublished : April 8, 2025, 5:15 p.m. | 17\u00a0minutes ago \nDescription : Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access. \nSeverity: 2.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T19:51:20.000000Z"}, {"uuid": "4d91d2d5-3c51-4eca-8609-f2b888abf67d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27446", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ltcarvxqpv2o", "content": "", "creation_timestamp": "2025-07-06T12:15:45.236230Z"}, {"uuid": "71111396-ed4e-48fb-a8c2-b5d43bb1f6c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27446", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114806333138890839", "content": "", "creation_timestamp": "2025-07-06T12:40:20.905353Z"}, {"uuid": "3b91483f-16a4-4e20-8a90-ff12e51d7195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27446", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q3/7", "content": "", "creation_timestamp": "2025-07-06T09:53:06.000000Z"}, {"uuid": "fe88f152-3057-4571-aebf-32ece6c6c599", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27440", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114145527796469293", "content": "", "creation_timestamp": "2025-03-11T19:48:51.648822Z"}, {"uuid": "7b7e1d61-ee7a-4fb1-b065-cefcdba7f1a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27445", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lquhlgrb3xi2", "content": "", "creation_timestamp": "2025-06-05T13:49:51.585353Z"}, {"uuid": "e68dd845-172a-404e-9aa7-bb77c77745ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27445", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114631238055243276", "content": "", "creation_timestamp": "2025-06-05T14:31:22.196304Z"}, {"uuid": "3e3488e7-26c6-40f7-8639-de70c3045e02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27441", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lmcenrnrjk2f", "content": "", "creation_timestamp": "2025-04-08T11:28:40.037870Z"}, {"uuid": "1e4988d8-7cd4-44eb-bbe3-92d6d29bd8a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27442", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lmcenrnrjk2f", "content": "", "creation_timestamp": "2025-04-08T11:28:40.128464Z"}, {"uuid": "0739ed46-9543-428d-8b8a-cf9af1470950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27443", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lmcentwnag2w", "content": "", "creation_timestamp": "2025-04-08T11:28:42.269668Z"}, {"uuid": "f52f464b-486b-4b7f-bb4b-472ec7142a63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27446", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltbujuthim2q", "content": "", "creation_timestamp": "2025-07-06T08:36:30.613309Z"}, {"uuid": "a1290f50-6a31-4534-aebf-652f93d91e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27447", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114787856061012885", "content": "", "creation_timestamp": "2025-07-03T06:21:23.852832Z"}, {"uuid": "b7db378a-d79a-4d3d-91f4-dd740650668b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27448", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114787856061012885", "content": "", "creation_timestamp": "2025-07-03T06:21:23.956276Z"}, {"uuid": "f1a18d0a-2a47-4ea0-8e0f-79f10577332c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27447", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3lt23lwyqz3d2", "content": "", "creation_timestamp": "2025-07-03T06:23:55.436789Z"}, {"uuid": "d12b5d60-6498-40b4-b18f-92c89cafe54f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27449", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3lt23lwyqz3d2", "content": "", "creation_timestamp": "2025-07-03T06:23:55.144501Z"}, {"uuid": "aec7300c-9b08-4915-9c5f-30a6fe04416a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27448", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3lt23lwyqz3d2", "content": "", "creation_timestamp": "2025-07-03T06:23:55.534683Z"}, {"uuid": "b20ccacb-975b-4c5f-8262-99ff08967aad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27446", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q3/8", "content": "", "creation_timestamp": "2025-07-07T07:49:08.000000Z"}, {"uuid": "78177b48-27b4-4330-885b-bf1fdc57c899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27446", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ltekiqfhyd2d", "content": "", "creation_timestamp": "2025-07-07T10:14:54.332305Z"}]}