{"vulnerability": "CVE-2025-27636", "sightings": [{"uuid": "e12f7c77-b9fc-4f2c-8b2a-54b7502ec048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27636", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lt2if2lwxt2r", "content": "", "creation_timestamp": "2025-07-03T10:10:26.369733Z"}, {"uuid": "8311e55b-a6bf-4448-b6cc-b3749841f005", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27636", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114789378245748413", "content": "", "creation_timestamp": "2025-07-03T12:48:30.197244Z"}, {"uuid": "905a669b-0ae7-43fd-881c-68345a4f7cc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/", "content": "", "creation_timestamp": "2025-07-03T08:00:03.000000Z"}, {"uuid": "d2a5d940-8775-4bf9-8b7b-5210822451f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/115403251349771913", "content": "", "creation_timestamp": "2025-10-19T22:44:30.956316Z"}, {"uuid": "8506f803-3f67-4ecf-8ca5-69ab41a9b87a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7406", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29891\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Bypass/Injection vulnerability in Apache Camel.\n\nThis issue affects Apache Camel: from 4.10.0 before 4.10.2, from 4.8.0 before 4.8.5, from 3.10.0 before 3.22.4.\n\nUsers are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases.\n\nThis vulnerability is present in Camel's default incoming header filter, that allows an attacker to include Camel specific headers that for some Camel components can alter the behaviours such as the camel-bean component, or the camel-exec component.\n\nIf you have Camel applications that are directly connected to the internet via HTTP, then an attacker\u00a0could include parameters in the HTTP requests that are sent to the Camel application that get translated into headers.\u00a0\n\nThe headers could be both provided as request parameters for an HTTP methods invocation or as part of the payload of the HTTP methods invocation.\n\nAll the known Camel HTTP component such as camel-servlet, camel-jetty, camel-undertow, camel-platform-http, and camel-netty-http would be vulnerable out of the box.\n\nThis CVE is related to the CVE-2025-27636: while they have the same root cause and are fixed with the same fix, CVE-2025-27636 was assumed to only be exploitable if an attacker could add malicious HTTP headers, while we have now determined that it is also exploitable via HTTP parameters. Like in CVE-2025-27636, exploitation is only possible if the Camel route uses particular vulnerable components.\n\ud83d\udccf Published: 2025-03-12T14:42:59.644Z\n\ud83d\udccf Modified: 2025-03-13T08:22:07.519Z\n\ud83d\udd17 References:\n1. https://camel.apache.org/security/CVE-2025-27636.html\n2. https://camel.apache.org/security/CVE-2025-29891.html", "creation_timestamp": "2025-03-13T08:46:02.000000Z"}, {"uuid": "ce8a84af-6e98-46a8-b2b7-2f13452df18c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "published-proof-of-concept", "source": "https://t.me/information_security_channel/53821", "content": "CVE-2025-27636 \u2013 Remote Code Execution in Apache Camel via Case-Sensitive Header Filtering Bypass\nhttps://www.offsec.com/blog/cve-2025-27636/\n\nDiscover the critical Apache Camel vulnerability (CVE-2025-27636) that allows remote code execution via case-sensitive HTTP header manipulation in the exec component. Learn how attackers exploit this flaw and how to mitigate it.\nThe post CVE-2025-27636 \u2013 Remote Code Execution in Apache Camel via Case-Sensitive Header Filtering Bypass (https://www.offsec.com/blog/cve-2025-27636/) appeared first on OffSec (https://www.offsec.com/).", "creation_timestamp": "2025-07-10T17:45:03.000000Z"}, {"uuid": "9285e2e2-5dd5-40e2-831e-b30d794b65de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/4192", "content": "Apache Camel CVE-2025\u201327636 &amp; CVE-2025-29891 PoC\n\nhttps://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC", "creation_timestamp": "2025-03-13T13:17:13.000000Z"}, {"uuid": "18732022-fd3c-4928-ba3d-b5ce344e3e23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/sansisc.bsky.social/post/3lloe45ahpc2g", "content": "", "creation_timestamp": "2025-03-31T12:25:33.375711Z"}, {"uuid": "88dca039-b8c2-4b7f-a438-bd3a45882fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lloga37a332a", "content": "", "creation_timestamp": "2025-03-31T13:03:33.069018Z"}, {"uuid": "ba14d662-0756-4253-9cff-e91b20b7d371", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lk4s6wcjq22o", "content": "", "creation_timestamp": "2025-03-11T19:24:32.374796Z"}, {"uuid": "0c2c4d9a-3ca1-496b-8e04-8cc24b7c5f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lk4sfqnk4d2q", "content": "", "creation_timestamp": "2025-03-11T19:28:21.246052Z"}, {"uuid": "d319d463-3b55-4a59-97ed-434bc0f707b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ljxqn46f3r2x", "content": "", "creation_timestamp": "2025-03-09T19:13:21.914650Z"}, {"uuid": "8a3be263-59f2-4a4c-a19a-8bb2fc53ba87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114134748263447483", "content": "", "creation_timestamp": "2025-03-09T22:07:44.580663Z"}, {"uuid": "23849978-3f31-483a-b39f-eb7c0eda1d21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3ljy2etlej6u2", "content": "", "creation_timestamp": "2025-03-09T22:07:48.740938Z"}, {"uuid": "f129ed7b-eef4-459c-a2bf-e754a116fe56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "MISP/0c55e2e0-b297-4bc6-921b-5d4b37cda914", "content": "", "creation_timestamp": "2025-03-12T10:08:23.000000Z"}, {"uuid": "06cba7eb-dbbd-4bbc-8ed4-c57a543a2dda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/cyberkendra.bsky.social/post/3lk3lhmzo7c2o", "content": "", "creation_timestamp": "2025-03-11T07:51:32.006885Z"}, {"uuid": "c8c69ca7-af1c-4995-a8de-87ed7be28600", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114138732094751912", "content": "", "creation_timestamp": "2025-03-10T15:00:40.356558Z"}, {"uuid": "28a92957-d85d-43ca-82f1-656f6bf604ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27636", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114149364716998991", "content": "", "creation_timestamp": "2025-03-12T12:04:54.122976Z"}, {"uuid": "d38679c8-d720-492e-a8db-d7ebcc77fa78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lk6k3o326qu2", "content": "", "creation_timestamp": "2025-03-12T12:07:54.959679Z"}, {"uuid": "bc1df22b-a244-4c4d-b8b7-c691afc29704", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114139417886547290", "content": "", "creation_timestamp": "2025-03-10T17:55:25.288443Z"}, {"uuid": "a12f1a1e-a633-4325-9b68-138fffb8232d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lk24qb7r5ht2", "content": "", "creation_timestamp": "2025-03-10T17:55:27.904496Z"}, {"uuid": "dc44d17c-f3ed-47f8-9082-e2de9cef17bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27636", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-571c4095-786a21dfffbe298b", "content": "", "creation_timestamp": "2025-07-04T11:33:48.889811Z"}, {"uuid": "a4c31564-b0a3-4fc6-a4f6-c307dcbd2063", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mkgat2dm5b2s", "content": "", "creation_timestamp": "2026-04-26T19:06:30.269800Z"}, {"uuid": "1e84725c-6ab2-4a33-a2a6-a6b47c193f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9877", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30177\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Bypass/Injection vulnerability in Apache Camel in Camel-Undertow component under particular conditions.\n\nThis issue affects Apache Camel: from 4.10.0 before 4.10.3, from 4.8.0 before 4.8.6.\n\nUsers are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS.\n\nCamel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the \"out\" direction, while it doesn't filter the \"in\" direction.\n\n\nThis allows an attacker to include Camel specific headers that for some Camel components can alter the behaviour such as the camel-bean component, or the camel-exec component.\n\ud83d\udccf Published: 2025-04-01T11:56:30.484Z\n\ud83d\udccf Modified: 2025-04-01T11:56:30.484Z\n\ud83d\udd17 References:\n1. https://camel.apache.org/security/CVE-2025-27636.html\n2. https://camel.apache.org/security/CVE-2025-29891.html\n3. https://lists.apache.org/thread/dj79zdgw01j337lr9gvyy4sv8xfyw8py", "creation_timestamp": "2025-04-01T12:32:30.000000Z"}, {"uuid": "24787749-4f47-44a8-8f63-d1368b7cf20c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "published-proof-of-concept", "source": "Telegram/Y_xPY5an29zAjBEjsanjtpLbpBVw7mFfDR_wSaO-iTXPUi8", "content": "", "creation_timestamp": "2025-03-11T00:00:12.000000Z"}, {"uuid": "4c2fe41a-2d03-49b5-8125-778adf29c694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6915", "content": "\u041f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c \u0437\u0430 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0442\u0440\u0435\u0441\u043a\u043e\u0432\u044b\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438, \u043a\u043e\u0438\u0445 \u043f\u043e\u0434 \u043d\u0430\u043a\u043e\u043f\u0438\u043b\u043e\u0441\u044c. \u0412\u043a\u0440\u0430\u0442\u0446\u0435 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c:\n\n1. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438\u00a0\u043d\u0430\u0447\u0430\u043b\u0438 \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0432 \u043f\u043e\u043f\u044b\u0442\u0430\u0442\u043a\u0430\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Apache Camel \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u043e\u0439 CVE-2025-27636. \u041f\u043e \u0432\u0441\u0435\u0439 \u0432\u0438\u0434\u0438\u043c\u043e\u0441\u0442\u0438, \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442\u0441\u044f \u0441\u0432\u0435\u0436\u0435\u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0439\u00a0PoC.\n\n2. Project Discovery \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438 PoC \u0434\u043b\u044f \u043d\u0435\u0434\u0430\u0432\u043d\u0435\u0433\u043e \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 CrushFTP, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0433\u043e \u043a\u0430\u043a CVE-2025-2825. \u0422\u0430\u043a \u0447\u0442\u043e \u0442\u0435\u043f\u0435\u0440\u044c \u043e\u043d\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f.\n\n3. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Endor Labs \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Apache Parquet \u0441 \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u043e\u043c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 10/10, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f RCE \u0438 \u043f\u043e\u043b\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0438\u043b\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f, \u0438\u043c\u043f\u043e\u0440\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u0444\u0430\u0439\u043b\u044b Parquet.\n\nCVE-2025-30065 \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u0432\u043b\u0438\u044f\u0435\u0442 \u043d\u0430 \u043c\u043e\u0434\u0443\u043b\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 parquet-avro. \u0417\u0430\u043a\u0440\u0430\u043b\u0430\u0441\u044c \u0441 \u0432\u0435\u0440\u0441\u0438\u0438 1.8.0 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0438 \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c Parquet \u0432\u0435\u0440\u0441\u0438\u0438 1.15.1.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Endor Labs, \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0441\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u0447\u0438\u0442\u044b\u0432\u0430\u044e\u0442 \u0438\u043b\u0438 \u0438\u043c\u043f\u043e\u0440\u0442\u0438\u0440\u0443\u044e\u0442 \u0444\u0430\u0439\u043b\u044b Parquet \u0447\u0435\u0440\u0435\u0437 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0438 \u0431\u043e\u043b\u044c\u0448\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a Hadoop \u0438\u043b\u0438 Spark, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0449\u0438\u0435 \u043a\u043e\u0434 Parquet Java.\n\n\u041f\u043e\u043a\u0430 \u043d\u0435\u0442 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-30065 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445, \u043e\u0434\u043d\u0430\u043a\u043e \u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u044c, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u0441\u043a\u043e\u0440\u0435 \u043c\u043e\u0433\u0443\u0442 \u0434\u043e\u0431\u0430\u0432\u0438\u0442\u044c \u0435\u0435 \u0432 \u0441\u0432\u043e\u0439 \u0430\u0440\u0441\u0435\u043d\u0430\u043b.\n\n4. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u041f\u044c\u0435\u0440 \u041a\u0438\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0434\u0435\u0441\u044f\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u0430\u0445 Brocade Fiber Channel.\n\n\u041d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 - \u044d\u0442\u043e \u0434\u0432\u0435 RCE \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u0441\u043b\u0430\u0431\u044b\u0435 \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b \u0442\u043e\u043b\u044c\u043a\u043e \u0441\u0435\u043c\u044c \u043e\u0448\u0438\u0431\u043e\u043a, \u0430 \u0442\u0440\u0438 \u043e\u0441\u0442\u0430\u043b\u0438\u0441\u044c \u043d\u0435\u0437\u0430\u043a\u0440\u044b\u0442\u044b\u043c\u0438, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 EoL-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.\n\n5. \u041e\u043d \u0436\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b \u043e\u0442\u0447\u0435\u0442 \u043e \u0442\u0440\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u0430\u0445 Palo Alto Network.\n\n6. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Tenable \u043f\u043e\u043c\u043e\u0433\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 Google Cloud, \u043d\u0430\u0437\u0432\u0430\u043d\u043d\u0443\u044e ImageRunner, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u0432\u0437\u0430\u0438\u043c\u043e\u0441\u0432\u044f\u0437\u0438 \u043c\u0435\u0436\u0434\u0443 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u043c\u0438 Cloud Run, Container Registry \u0438 Artifact Registry \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0431\u0440\u043e\u0441\u043a\u0438 \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0430\u0440\u0442\u0435\u0444\u0430\u043a\u0442\u043e\u0432 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0432 \u0443\u0447\u0435\u0442\u043d\u0443\u044e \u0437\u0430\u043f\u0438\u0441\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430.\n\n7. Microsoft \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u043c \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043a\u043e\u0434 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u044b \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u0430 Canon.\n\n8. ERNW \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0442\u0440\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0430\u0433\u0435\u043d\u0442\u0430\u0445 VMware Carbon Black Cloud. \u0412\u0441\u0435 \u043e\u043d\u0438 \u043f\u043e\u0441\u043b\u0435 \u044d\u0442\u043e\u0433\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b.\n\n9. Project Black \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 unauth RCE \u0432 \u041f\u041e \u0434\u043b\u044f \u043e\u0431\u043c\u0435\u043d\u0430 \u0444\u0430\u0439\u043b\u0430\u043c\u0438 ZendTo. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0435\u0449\u0435 \u0432 2021 \u0433\u043e\u0434\u0443, \u043d\u043e \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e CVE \u0434\u043e \u0441\u0438\u0445 \u043f\u043e\u0440 \u043d\u0435\u0442.\n\n10. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u042d\u0432\u0430\u043d \u041a\u043e\u043d\u043d\u0435\u043b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 APIO \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f Verizon Call Filter, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0443\u0442\u0435\u0447\u043a\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 Verizon.\n\n11. Searchlight Cyber \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u043e\u0442\u0447\u0435\u0442 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 SQLi \u0432 Halo ITSM, \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0418\u0422-\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u043e\u0439 \u0432 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0430\u0445.\n\n12. Cisco \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0442\u0440\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0430 Jenkins - \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0441\u0432\u043e\u0435\u043c \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u043c \u043a\u043e\u0434\u0435 \u0438 \u0448\u0435\u0441\u0442\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 - \u0432 \u043f\u043b\u0430\u0433\u0438\u043d\u0430\u0445.\n\n13. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c SafeBreach \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 \u043e\u0431 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0438\u00a0Google 10 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0441\u0432\u043e\u0435\u0439 \u0443\u0442\u0438\u043b\u0438\u0442\u0435 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Quick Share.\n\n\u041e\u0448\u0438\u0431\u043a\u0438 \u0431\u044b\u043b\u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443 \u043d\u0430 DEFCON \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043b\u0435\u0433\u043a\u043e \u043e\u0431\u043c\u0435\u043d\u0438\u0432\u0430\u0442\u044c\u0441\u044f \u0444\u0430\u0439\u043b\u0430\u043c\u0438 \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u0431\u0435\u0437 \u0438\u0445 \u0441\u043e\u0433\u043b\u0430\u0441\u0438\u044f.", "creation_timestamp": "2025-04-04T19:30:05.000000Z"}, {"uuid": "76c136c0-47b4-4c93-8edc-4b7537a3637f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://t.me/ctinow/233101", "content": "Apache Camel Exploit Attempt by Vulnerability Scan (CVE-2025-27636, CVE-2025-29891), (Mon, Mar 31st)\nhttps://ift.tt/yRozrXM", "creation_timestamp": "2025-03-31T15:44:26.000000Z"}, {"uuid": "ed785e12-e317-4f7a-8396-d37cfabafaa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lk4tul556n27", "content": "", "creation_timestamp": "2025-03-11T19:54:32.506628Z"}, {"uuid": "7915e17a-ce66-4f0b-8909-32ec9b1f7eaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljxjhx6jqn26", "content": "", "creation_timestamp": "2025-03-09T17:05:12.967325Z"}, {"uuid": "88f02746-5c61-4ac6-aeee-79f0cec38d5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lk3o65y7wa2s", "content": "", "creation_timestamp": "2025-03-11T08:39:52.034682Z"}, {"uuid": "4280d1d9-de62-40fa-a199-42be5da82011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/timb-machine.infosec.exchange.ap.brid.gy/post/3lkfy6qjt5kz2", "content": "", "creation_timestamp": "2025-03-15T11:07:49.922368Z"}, {"uuid": "40f19463-e1ad-40cf-83a4-5ca59e3477d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3lk44xr2joi2w", "content": "", "creation_timestamp": "2025-03-11T13:04:43.268086Z"}, {"uuid": "23fb6745-5c41-46f0-9d95-c14889412283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114149396635489302", "content": "", "creation_timestamp": "2025-03-12T12:12:59.184767Z"}, {"uuid": "dcd031df-b0e6-4488-a280-fc19609b975c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lk6kk2ddtfu2", "content": "", "creation_timestamp": "2025-03-12T12:15:03.577878Z"}, {"uuid": "8a64126e-c675-46d0-af6a-53289a61df62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://infosec.exchange/users/timb_machine/statuses/114139379936582959", "content": "", "creation_timestamp": "2025-03-10T17:53:59.240935Z"}, {"uuid": "0596728c-1498-4548-8e81-62cd71e813b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk6pl7szo22g", "content": "", "creation_timestamp": "2025-03-12T13:43:05.868253Z"}, {"uuid": "4ee0606d-ef7f-4496-9ba2-b374b1a42b97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ltfep2o2py2b", "content": "", "creation_timestamp": "2025-07-07T18:03:43.975105Z"}, {"uuid": "b8101f19-4336-43ed-a08e-822e1d205fea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "MISP/85904d3b-1b16-528f-8394-ddfd11e0289e", "content": "", "creation_timestamp": "2025-07-03T13:25:45.000000Z"}, {"uuid": "babc6005-3296-4e75-865c-90adbf05bc8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://t.me/cvedetector/19923", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27636 - Apache Camel Header Injection Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-27636 \nPublished : March 9, 2025, 1:15 p.m. | 1\u00a0hour, 8\u00a0minutes ago \nDescription : Bypass/Injection vulnerability in Apache Camel.  \n  \nThis issue affects Apache Camel: from 4.10.0 through &lt;=&lt;=&lt;=\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-09T15:26:25.000000Z"}, {"uuid": "b526e161-5207-4404-9a60-5cad71280bb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1833", "content": "", "creation_timestamp": "2026-04-21T21:00:00.000000Z"}, {"uuid": "025bd839-9fbd-415f-8985-5894f0a9471c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1594", "content": "Apache Camel CVE-2025\u201327636 &amp; CVE-2025-29891 PoC\n\nhttps://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC", "creation_timestamp": "2025-03-13T13:16:58.000000Z"}, {"uuid": "0e9a91ed-6d67-414f-9686-d66515eb0bf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11924", "content": "#exploit\n1. CVE-2025-27636, CVE-2025-29891:\nApache Camel RCE PoC/Detection\n\n2. CVE-2024-0760:\nDoS in ISC BIND DNS\n\n3. CVE-2025-24813:\nApache Tomcat RCE\n\n4. CVE-2015-0009:\nSMB Security Feature Bypass (SMB Signing)\n\n5. CVE-2024-0582, CVE-2024-35880:\nA Series of io_uring pbuf Vulnerabilities", "creation_timestamp": "2025-03-13T23:40:19.000000Z"}, {"uuid": "8dd398f5-fbee-41bf-8397-799481809441", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114150283427551221", "content": "", "creation_timestamp": "2025-03-12T15:58:16.752412Z"}, {"uuid": "831c9739-60dc-42ff-8a35-15302664149c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114150287987853471", "content": "", "creation_timestamp": "2025-03-12T15:59:26.402498Z"}, {"uuid": "1d384076-bc54-4497-88ed-35108afc55ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://mstdn.social/users/jschauma/statuses/114133791183428238", "content": "", "creation_timestamp": "2025-03-09T18:04:07.844532Z"}, {"uuid": "bcd48736-9203-43cc-9085-8accca7489f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/jschauma.mstdn.social.ap.brid.gy/post/3ljxnasvmsxv2", "content": "", "creation_timestamp": "2025-03-09T18:13:44.446256Z"}, {"uuid": "86887fd0-5c37-4c7a-812b-983abc43ca74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lk73ndrfu22k", "content": "", "creation_timestamp": "2025-03-12T17:18:59.631339Z"}, {"uuid": "3ba00846-f1f8-4329-ba3b-c8f732ae9cfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4lcg3snno2", "content": "", "creation_timestamp": "2025-03-24T10:47:35.642646Z"}, {"uuid": "c48a8396-bd8b-463a-bf3d-e96745168f10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lk4xdybbxk2d", "content": "", "creation_timestamp": "2025-03-11T20:56:51.425430Z"}, {"uuid": "4a34479a-fffd-4b60-a8bb-fc1c41b7641f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/timb-machine.infosec.exchange.ap.brid.gy/post/3lk246udxlht2", "content": "", "creation_timestamp": "2025-03-10T17:45:39.784865Z"}, {"uuid": "f7663f7d-05a6-4682-99b2-4192a5f014e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3llqtbwg7us2x", "content": "", "creation_timestamp": "2025-04-01T12:02:33.253952Z"}, {"uuid": "a693f466-3ee2-4fdb-97da-d5b2d466a78f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27636", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmdep7pjum2t", "content": "", "creation_timestamp": "2025-04-08T21:02:11.822486Z"}]}