{"vulnerability": "CVE-2025-3051", "sightings": [{"uuid": "a7dc675d-20d1-409b-91a8-7c1f0669b3be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30511", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12085", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30511\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: An authenticated attacker can achieve stored XSS by exploiting improper sanitization of the plant name value while adding or editing a plant.\n\ud83d\udccf Published: 2025-04-15T20:12:09.876Z\n\ud83d\udccf Modified: 2025-04-16T15:46:18.058Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "creation_timestamp": "2025-04-16T15:56:16.000000Z"}, {"uuid": "76f3fe29-934f-42d2-badc-2fd7c903f7c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30510", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11934", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30510\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: An attacker can upload an arbitrary file instead of a plant image.\n\ud83d\udccf Published: 2025-04-15T21:36:07.191Z\n\ud83d\udccf Modified: 2025-04-15T21:36:07.191Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "creation_timestamp": "2025-04-15T21:56:03.000000Z"}, {"uuid": "c07b92df-5f02-4ef5-bdf2-874e4d05ac5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30512", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11921", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30512\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Unauthenticated attackers can send configuration settings to device and possible perform physical actions remotely (e.g., on/off).\n\ud83d\udccf Published: 2025-04-15T21:45:46.649Z\n\ud83d\udccf Modified: 2025-04-15T21:45:46.649Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "creation_timestamp": "2025-04-15T21:55:41.000000Z"}, {"uuid": "7cbe8d6b-efd3-4aa5-a242-5ca48d4483ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30515", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17808", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30515\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: CyberData\u00a0011209 Intercom\n \ncould allow an authenticated attacker to upload arbitrary files to multiple locations within the system.\n\ud83d\udccf Published: 2025-06-09T22:31:50.355Z\n\ud83d\udccf Modified: 2025-06-09T22:31:50.355Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01", "creation_timestamp": "2025-06-09T23:32:52.000000Z"}, {"uuid": "4a8af168-4790-4024-aa66-6f6343ccef18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3051", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9816", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3051\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238.\n\nIf an attacker can place a malicious file in current working directory, it may be\u00a0loaded instead of the intended file, potentially leading to arbitrary\u00a0code execution.\n\nLinux::Statm::Tiny uses Mite to produce the affected code section due to\u00a0CVE-2025-30672\n\ud83d\udccf Published: 2025-04-01T02:20:40.971Z\n\ud83d\udccf Modified: 2025-04-01T02:20:40.971Z\n\ud83d\udd17 References:\n1. https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0701/changes\n2. https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0700/source/lib/Linux/Statm/Tiny/Mite.pm#L82\n3. https://blogs.perl.org/users/todd_rinaldo/2016/11/what-happened-to-dot-in-inc.html", "creation_timestamp": "2025-04-01T02:32:16.000000Z"}, {"uuid": "13ce8d85-b6f4-4d17-a087-e72ce5d548eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30510", "type": "seen", "source": "https://t.me/cvedetector/23024", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30510 - Apache Stratosphere File Upload Vulnerability (Path Traversal)\", \n  \"Content\": \"CVE ID : CVE-2025-30510 \nPublished : April 15, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : An attacker can upload an arbitrary file instead of a plant image. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T01:48:55.000000Z"}, {"uuid": "3c976b53-fb68-418c-90fa-8eec3831a1f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30512", "type": "seen", "source": "https://t.me/cvedetector/23025", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30512 - Cisco Router Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30512 \nPublished : April 15, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Unauthenticated attackers can send configuration settings to device and possible perform physical actions remotely (e.g., on/off). \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T01:48:58.000000Z"}, {"uuid": "17bccf9f-25f8-4e5e-abbc-344bf5424adc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30516", "type": "seen", "source": "https://t.me/cvedetector/22829", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30516 - Mattermost Mobile Apps Session Termination Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30516 \nPublished : April 14, 2025, 7:15 a.m. | 1\u00a0hour, 4\u00a0minutes ago \nDescription : Mattermost Mobile Apps versions &lt;=2.25.0\u00a0\nSeverity: 2.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-14T10:28:51.000000Z"}, {"uuid": "30cd4cf1-5b03-438f-a302-fcbc1b574384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3051", "type": "seen", "source": "https://t.me/cvedetector/21713", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3051 - Linux::Statm::Tiny Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3051 \nPublished : April 1, 2025, 3:15 a.m. | 2\u00a0hours, 1\u00a0minute ago \nDescription : Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238.  \n  \nIf an attacker can place a malicious file in current working directory, it may be\u00a0loaded instead of the intended file, potentially leading to arbitrary\u00a0code execution.  \n  \nLinux::Statm::Tiny uses Mite to produce the affected code section due to\u00a0CVE-2025-30672 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T07:46:11.000000Z"}, {"uuid": "c8f3dc11-79ef-437a-a77f-25fedf17c0bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30515", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01", "content": "", "creation_timestamp": "2025-06-05T10:00:00.000000Z"}, {"uuid": "3ca39530-ce3d-4515-9d50-3cc629c27f15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30512", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "2bd7c84f-3e41-41a0-971f-54166aa1356c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30515", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr7pxbu6432q", "content": "", "creation_timestamp": "2025-06-10T01:18:49.130504Z"}, {"uuid": "630e29b0-450e-473b-b4c2-b1a4315cd6a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30519", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-07", "content": "", "creation_timestamp": "2025-09-18T10:00:00.000000Z"}, {"uuid": "ac642491-bfc9-4bc1-ba56-d698eb718946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30513", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3meji7xfydo2o", "content": "", "creation_timestamp": "2026-02-10T17:25:48.661498Z"}, {"uuid": "80724d08-980b-4808-a744-155703c13ecd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30513", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/7898", "content": "Intel \u0432 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u0447\u0435\u0441\u0442\u0432\u0435 \u0441 Google \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043b\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u0432\u043e\u0435\u0439 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438 Trust Domain Extensions (TDX), \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0434\u0435\u0441\u044f\u0442\u043a\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u043e\u0448\u0438\u0431\u043e\u043a.\u00a0\n\nTDX - \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u0430\u044f \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u044f \u0432\u044b\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u0439, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u0430\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0440\u0430\u0431\u043e\u0447\u0438\u0445 \u043d\u0430\u0433\u0440\u0443\u0437\u043e\u043a \u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0438 \u043c\u043d\u043e\u0433\u043e\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u0441\u0440\u0435\u0434\u0430\u0445, \u0434\u0430\u0436\u0435 \u043e\u0442 \u0432\u0437\u043b\u043e\u043c\u0430 \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u0430 \u0438\u043b\u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u0438\u043d\u0441\u0430\u0439\u0434\u0435\u0440\u043e\u0432.\n\nIntel TDX \u0441\u043e\u0437\u0434\u0430\u0435\u0442 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0430\u0448\u0438\u043d\u044b (\u0442\u0430\u043a\u0436\u0435 \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u043c\u044b\u0435 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u043c\u0438 \u0434\u043e\u043c\u0435\u043d\u0430\u043c\u0438 \u0438\u043b\u0438 TD), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0441\u043e\u0431\u043e\u0439 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0430\u0448\u0438\u043d\u044b, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0449\u0438\u0435 \u043d\u0430\u0434\u0435\u0436\u043d\u0443\u044e \u0437\u0430\u0449\u0438\u0442\u0443 \u043a\u0430\u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438, \u0442\u0430\u043a \u0438 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438 \u0434\u0430\u043d\u043d\u044b\u0445.\n\nGoogle Cloud Security \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043f\u044f\u0442\u0438 \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u0447\u0430\u043b\u0430 \u0441 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Intel INT31, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0443\u0447\u043d\u043e\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u043a\u043e\u0434\u0430, \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0438 \u0433\u043e\u0442\u043e\u0432\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u0418\u0418 \u0434\u043b\u044f \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u043a\u043e\u0434\u0430 \u043c\u043e\u0434\u0443\u043b\u044f TDX 1.5, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u0432\u044b\u0441\u043e\u043a\u043e\u0443\u0440\u043e\u0432\u043d\u0435\u0432\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 TDX.\n\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0431\u044b\u043b\u043e \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043e \u043f\u044f\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0430 \u0442\u0430\u043a\u0436\u0435 35 \u043e\u0448\u0438\u0431\u043e\u043a, \u0441\u043b\u0430\u0431\u044b\u0445 \u043c\u0435\u0441\u0442 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c  \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u0443\u0440\u043e\u0432\u043d\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\nIntel \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0432\u0441\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u0432 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0435 \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u0435 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u0432\u00a0\u0432\u0435\u0440\u0441\u0438\u044e 1.5 TDX, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0434\u0432\u0435 \u043d\u043e\u0432\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438: Live Migration \u0438 Trust Domain Partitioning.\n\n\u0412\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043a\u0430\u043a CVE-2025-32007, CVE-2025-27940, CVE-2025-30513, CVE-2025-27572 \u0438 CVE-2025-32467 \u0438 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0434\u043b\u044f EoP \u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, Google\u00a0\u043e\u0431\u0440\u0430\u0449\u0430\u0435\u0442 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043d\u0430 CVE-2025-30513, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u043d\u0430\u0434\u0451\u0436\u043d\u043e\u043c\u0443 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0443 \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 TDX.\n\n\u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, CVE-2025-30513 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0430 \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u044b\u0432\u0430\u0442\u044c \u043c\u0438\u0433\u0440\u0438\u0440\u0443\u0435\u043c\u044b\u0439 TD \u0432 \u043e\u0442\u043b\u0430\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0439 TD \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0435 \u043c\u0438\u0433\u0440\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u043c\u043f\u043e\u0440\u0442\u0435 \u0435\u0433\u043e \u043d\u0435\u0438\u0437\u043c\u0435\u043d\u044f\u0435\u043c\u043e\u0433\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044f.\n\n\u041f\u043e\u0441\u043b\u0435 \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u0432\u0441\u0435 \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0435 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 TD \u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0441\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u043c \u0441 \u0445\u043e\u0441\u0442\u0430. \u041d\u0430 \u044d\u0442\u043e\u043c \u044d\u0442\u0430\u043f\u0435 \u0437\u043b\u043e\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u044b\u0439 \u0445\u043e\u0441\u0442 \u043c\u043e\u0436\u0435\u0442 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0434\u0440\u0443\u0433\u043e\u0439 TD \u0441 \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c \u0438\u043b\u0438 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0442\u044c \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438.\n\n\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043c\u0438\u0433\u0440\u0430\u0446\u0438\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u043e\u0438\u0437\u043e\u0439\u0442\u0438 \u0432 \u043b\u044e\u0431\u043e\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0436\u0438\u0437\u043d\u0435\u043d\u043d\u043e\u0433\u043e \u0446\u0438\u043a\u043b\u0430 TD, \u0430\u0442\u0430\u043a\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0430 \u043f\u043e\u0441\u043b\u0435 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0430\u0442\u0442\u0435\u0441\u0442\u0430\u0446\u0438\u0438 TD, \u0447\u0442\u043e \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u0435\u0442 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0441\u0435\u043a\u0440\u0435\u0442\u043e\u0432 \u0432 \u0435\u0433\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0438.\n\n\u041f\u043e \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0430\u043c \u0441\u0432\u043e\u0438\u0445 \u0438\u0437\u044b\u0441\u043a\u0430\u043d\u0438\u0439 Google \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u043f\u043e\u043b\u043d\u044b\u0439 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u043e\u0442\u0447\u0435\u0442, \u0430 Intel \u0443 \u0441\u0435\u0431\u044f \u0432 \u0431\u043b\u043e\u0433\u0435 \u043e\u0442\u0440\u0430\u0437\u0438\u043b\u0430 \u043e\u0431\u0449\u0435\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0435\u043a\u0442\u0430.", "creation_timestamp": "2026-02-11T13:17:13.000000Z"}, {"uuid": "27169056-e1c3-4ed7-9740-136d016d47a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30515", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lqv4g7amkm2j", "content": "", "creation_timestamp": "2025-06-05T20:02:37.505209Z"}, {"uuid": "5f932211-6520-49ff-bca1-aa5488d0085f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30516", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmreecbiij2l", "content": "", "creation_timestamp": "2025-04-14T10:33:17.960494Z"}, {"uuid": "1d18b5fa-6cd5-4816-a95b-d7724116e31f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-30519", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lz5pscjtg22q", "content": "", "creation_timestamp": "2025-09-19T01:32:16.240432Z"}, {"uuid": "631b4814-7148-4a9e-b3d2-f69b0f85a109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30514", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "6deda950-a99a-4e7e-ad76-949c8c6fc3cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30511", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "7141008b-1d2c-4c83-9e38-28bbf897f3e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30510", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "90b21b54-0678-41b6-8502-f6dc836a6bea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30510", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmv5nzwuwl24", "content": "", "creation_timestamp": "2025-04-15T22:44:07.638920Z"}, {"uuid": "99070ab8-3fb4-4807-8ee4-8610d26da7b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30512", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmv5o2otae2q", "content": "", "creation_timestamp": "2025-04-15T22:44:11.581066Z"}, {"uuid": "52fac686-83b2-4a2e-9da8-eb7fdc682953", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30511", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114344414835900986", "content": "", "creation_timestamp": "2025-04-15T22:48:40.260927Z"}, {"uuid": "ab041495-80cb-4da7-a814-75259b3edfec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30511", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvd7ajg4e2h", "content": "", "creation_timestamp": "2025-04-16T00:23:19.137031Z"}, {"uuid": "ee12d57d-ae10-4848-aa58-b17f2b419442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30510", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114344888053253496", "content": "", "creation_timestamp": "2025-04-16T00:48:47.985081Z"}, {"uuid": "3bb03923-a1b3-4aa0-8445-70bb37218f66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30519", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lz55hd4prc27", "content": "", "creation_timestamp": "2025-09-18T20:03:59.938208Z"}]}