{"vulnerability": "CVE-2025-3244", "sightings": [{"uuid": "831c0ba3-482c-488a-8159-c01de1f7cfde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3244", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyichld5m2f", "content": "", "creation_timestamp": "2025-04-04T13:07:19.023423Z"}, {"uuid": "5118e61d-9378-4351-92a0-c4a4a43b4226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lo3f6mufyy2v", "content": "", "creation_timestamp": "2025-05-01T03:39:50.968508Z"}, {"uuid": "77cf69ad-df8f-45a5-af9a-d7fd25b31317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lo3zety7eu2y", "content": "", "creation_timestamp": "2025-05-01T09:41:14.082784Z"}, {"uuid": "23a0bee1-9772-4405-9db8-f0f62052e466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32441", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3luiglow3nk2y", "content": "", "creation_timestamp": "2025-07-21T16:40:51.758996Z"}, {"uuid": "77994b6d-6261-411e-addd-16a7fad54846", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://gist.github.com/alon710/85717da89d2462733523c04a8c1a2e50", "content": "", "creation_timestamp": "2026-01-24T22:41:19.000000Z"}, {"uuid": "3cf1b6f9-7b49-42a3-bff0-78bc7896d785", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://gist.github.com/alon710/1441e69379270f9bfb7d94afbdbaaa0a", "content": "", "creation_timestamp": "2026-01-24T22:42:08.000000Z"}, {"uuid": "f7a489ca-c9f4-4ab8-ada7-ab8af6eb3919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32441", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15460", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32441\n\ud83d\udd25 CVSS Score: 4.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessions atomically by marking them as logged out e.g., using a `logged_out` flag, instead of deleting them, and check this flag on every request to prevent reuse; or implement a custom session store that tracks session invalidation timestamps and refuses to accept session data if the session was invalidated after the request began.\n\ud83d\udccf Published: 2025-05-07T23:01:19.722Z\n\ud83d\udccf Modified: 2025-05-07T23:01:19.722Z\n\ud83d\udd17 References:\n1. https://github.com/rack/rack/security/advisories/GHSA-vpfw-47h7-xj4g\n2. https://github.com/rack/rack/commit/c48e52f7c57e99e1e1bf54c8760d4f082cd1c89d\n3. https://github.com/rack/rack/blob/v2.2.13/lib/rack/session/abstract/id.rb#L263-L270", "creation_timestamp": "2025-05-07T23:23:30.000000Z"}, {"uuid": "6de2686a-bf10-48c6-803b-24519ae01607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32442", "type": "seen", "source": "https://t.me/cvedetector/23312", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32442 - Fastify Content-Type Validation Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32442 \nPublished : April 18, 2025, 4:15 p.m. | 26\u00a0minutes ago \nDescription : Fastify is a fast and low overhead web framework, for Node.js. In versions 5.0.0 to 5.3.0, applications that specify different validation strategies for different content types have a possibility to bypass validation by providing a _slightly altered_ content type such as with different casing or altered whitespacing before `;`. This issue has been patched in version 5.3.1. A workaround involves not specifying individual content types in the schema. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T19:04:52.000000Z"}, {"uuid": "c90505f6-a362-4895-a073-6cb42b845989", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://t.me/cvedetector/23011", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32445 - Argo Events Privileged Access Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-32445 \nPublished : April 15, 2025, 8:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : Argo Events is an event-driven workflow automation framework for Kubernetes. A user with permission to create/modify EventSource and Sensor custom resources can gain privileged access to the host system and cluster, even without having direct administrative privileges. The EventSource and Sensor CRs allow the corresponding orchestrated pod to be customized with spec.template and spec.template.container (with type k8s.io/api/core/v1.Container), thus, any specification under container such as command, args, securityContext , volumeMount can be specified, and applied to the EventSource or Sensor pod. With these, a user would be able to gain privileged access to the cluster host, if he/she specified the EventSource/Sensor CR with some particular properties under template. This vulnerability is fixed in v1.9.6. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T00:08:31.000000Z"}, {"uuid": "dfeb2568-fe03-475a-9066-1c9dfde44331", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://t.me/cvedetector/24065", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32444 - \"vLLM Mooncake ZeroMQ Remote Code Execution\"\", \n  \"Content\": \"CVE ID : CVE-2025-32444 \nPublished : April 30, 2025, 1:15 a.m. | 2\u00a0hours ago \nDescription : vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, having vLLM integration with mooncake, are vulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack. vLLM instances that do not make use of the mooncake integration are not vulnerable. This issue has been patched in version 0.8.5. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T05:22:34.000000Z"}, {"uuid": "8a65a34f-4a57-432b-a647-311d3fa616c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32442", "type": "published-proof-of-concept", "source": "Telegram/o9Pfw-M-GTwrCTTIwOJwUgm12Tx7Pgy5iImnbWlBRAjomOU", "content": "", "creation_timestamp": "2025-04-18T19:30:43.000000Z"}, {"uuid": "07c74cac-f7cc-4ddf-8877-f325e2a968ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32441", "type": "seen", "source": "https://t.me/cvedetector/24786", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32441 - Rack Session Pool Session Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32441 \nPublished : May 7, 2025, 11:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessions atomically by marking them as logged out e.g., using a `logged_out` flag, instead of deleting them, and check this flag on every request to prevent reuse; or implement a custom session store that tracks session invalidation timestamps and refuses to accept session data if the session was invalidated after the request began. \nSeverity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T03:23:25.000000Z"}, {"uuid": "0d39c03a-4670-4403-a0eb-6e41a53e1b47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114343777087123748", "content": "", "creation_timestamp": "2025-04-15T20:06:15.879221Z"}, {"uuid": "0326dcda-73ca-4147-a4ab-5cd725a64755", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114344414811016576", "content": "", "creation_timestamp": "2025-04-15T22:48:39.966520Z"}, {"uuid": "bccd8b73-8bdd-4b42-947a-117c55407650", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvd77ud4q2z", "content": "", "creation_timestamp": "2025-04-16T00:23:15.405076Z"}, {"uuid": "3a1006b3-8cc3-423c-ac1e-a808af040e82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmvzyne2ly2z", "content": "", "creation_timestamp": "2025-04-16T07:11:08.162556Z"}, {"uuid": "f22131dc-a9c1-4301-9e08-4e2ebd2525ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lmwcnkippk2p", "content": "", "creation_timestamp": "2025-04-16T09:46:02.496482Z"}, {"uuid": "1b7963a5-023c-4722-b380-9ffe6961d7c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32442", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114360071872639571", "content": "", "creation_timestamp": "2025-04-18T17:10:14.595091Z"}, {"uuid": "91986919-dc69-443a-aa14-f09b2f8cd290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ln6std6c7i2w", "content": "", "creation_timestamp": "2025-04-19T18:56:51.563265Z"}, {"uuid": "56022b5f-e89d-4cb4-8390-9a646fb2e33e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://bsky.app/profile/santana.dev/post/3lnawajpdns2p", "content": "", "creation_timestamp": "2025-04-20T15:03:17.943213Z"}, {"uuid": "5a4ed77e-0445-4000-8d76-3df02539ac58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lnc3wwzzst2z", "content": "", "creation_timestamp": "2025-04-21T02:17:56.155159Z"}, {"uuid": "3d5fa8c0-b8bc-4c6a-812e-e3fdc1009e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://bsky.app/profile/iartificialblog.bsky.social/post/3lo43tau7pc2x", "content": "", "creation_timestamp": "2025-05-01T10:25:07.795257Z"}, {"uuid": "174649b9-b0c1-4659-b59b-ec375f299c40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32441", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lomkcpp7t3r2", "content": "", "creation_timestamp": "2025-05-07T23:30:22.723958Z"}, {"uuid": "25fde268-b6ac-475e-bb14-ab3bc09d7370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32441", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lomnonedoz2n", "content": "", "creation_timestamp": "2025-05-08T00:27:15.321015Z"}, {"uuid": "8a9c3e9c-2397-4b56-8714-c3eba05df07f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lorjn7numc25", "content": "", "creation_timestamp": "2025-05-09T22:58:09.413788Z"}, {"uuid": "a9c6ada4-563d-4688-8481-ae7a9b395956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m2ahaq4zrq23", "content": "", "creation_timestamp": "2025-10-02T21:02:30.598880Z"}, {"uuid": "aa123dfd-1242-4519-9eee-787b45694138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://gist.github.com/alon710/35916d593408cec9703320650f2f775f", "content": "", "creation_timestamp": "2026-01-24T21:26:44.000000Z"}, {"uuid": "d0d98f4b-b3d8-4987-9f8d-dfb227f2f7a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://gist.github.com/alon710/af42a5d08be0444aa26b262702b2cf50", "content": "", "creation_timestamp": "2026-01-24T21:25:56.000000Z"}, {"uuid": "1e8d343a-59fd-4b5b-ab7c-418322f5f277", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3244", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10429", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3244\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /add-admin.php of the component Create User Page. The manipulation of the argument Avatar leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-04T11:31:07.662Z\n\ud83d\udccf Modified: 2025-04-04T11:31:07.662Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303271\n2. https://vuldb.com/?ctiid.303271\n3. https://vuldb.com/?submit.547916\n4. https://github.com/6s6-630/CVE/blob/main/yaofang.md\n5. https://www.sourcecodester.com/", "creation_timestamp": "2025-04-04T11:39:05.000000Z"}, {"uuid": "1dbb6cf0-9065-4829-9562-a3df332afed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32442", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12494", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32442\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: Fastify is a fast and low overhead web framework, for Node.js. In versions 5.0.0 to 5.3.0, applications that specify different validation strategies for different content types have a possibility to bypass validation by providing a _slightly altered_ content type such as with different casing or altered whitespacing before `;`. This issue has been patched in version 5.3.1. A workaround involves not specifying individual content types in the schema.\n\ud83d\udccf Published: 2025-04-18T15:59:06.670Z\n\ud83d\udccf Modified: 2025-04-18T15:59:06.670Z\n\ud83d\udd17 References:\n1. https://github.com/fastify/fastify/security/advisories/GHSA-mg2h-6x62-wpwc\n2. https://github.com/fastify/fastify/commit/436da4c06dfbbb8c24adee3a64de0c51e4f47418\n3. https://hackerone.com/reports/3087928", "creation_timestamp": "2025-04-18T16:59:07.000000Z"}, {"uuid": "c0f92542-8f1c-4949-9c82-3021a3c2ed52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "published-proof-of-concept", "source": "Telegram/hbVDftoo7cklg62Gdj6otKY7hUkOaO8wH7xugOEL8u8l2Gc", "content": "", "creation_timestamp": "2025-04-30T03:30:38.000000Z"}, {"uuid": "c25a4c8b-d44b-4749-b07f-05895a27969a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32445", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmwresszpk2c", "content": "", "creation_timestamp": "2025-04-16T14:09:32.936990Z"}, {"uuid": "d26d4d60-ff9d-431c-8703-11058c8c8f8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114424232674350194", "content": "", "creation_timestamp": "2025-04-30T01:07:10.749874Z"}, {"uuid": "233ec452-ecca-42b8-9ee3-09c2774a6170", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114424395593995699", "content": "", "creation_timestamp": "2025-04-30T01:48:36.876923Z"}, {"uuid": "7a9065e7-f6a6-4629-bfae-a0250e989eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnyvdlg2p22n", "content": "", "creation_timestamp": "2025-04-30T03:50:57.864587Z"}, {"uuid": "33e2d51b-bab3-4793-bbc6-2b72b32f992f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32440", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114582204188066200", "content": "", "creation_timestamp": "2025-05-27T22:41:25.204917Z"}, {"uuid": "72bea89d-2cff-404f-92fc-a61a5c3734dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32440", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lq6s7htw6z2q", "content": "", "creation_timestamp": "2025-05-27T23:01:19.981147Z"}, {"uuid": "65bb5296-5ba0-4b3a-8b23-fc2fe3b9f2af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32444", "type": "seen", "source": "https://bsky.app/profile/checkmarxzero.bsky.social/post/3lo77j2mlll25", "content": "", "creation_timestamp": "2025-05-02T16:08:57.080982Z"}, {"uuid": "9c35056d-07c3-4efa-b768-6d4568a86f0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3244", "type": "seen", "source": "https://t.me/cvedetector/22124", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3244 - SourceCodester Web-based Pharmacy Product Management System File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3244 \nPublished : April 4, 2025, 12:15 p.m. | 1\u00a0hour, 42\u00a0minutes ago \nDescription : A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /add-admin.php of the component Create User Page. The manipulation of the argument Avatar leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T16:20:54.000000Z"}]}