{"vulnerability": "CVE-2025-3708", "sightings": [{"uuid": "d5e593d2-7421-4ce6-ae64-901841a7d911", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3708", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14440", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3708\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Le-show medical practice management system from Le-yan has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.\n\ud83d\udccf Published: 2025-05-02T02:55:32.493Z\n\ud83d\udccf Modified: 2025-05-02T02:55:32.493Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-10085-69e16-1.html\n2. https://www.twcert.org.tw/en/cp-139-10086-dbfd0-2.html", "creation_timestamp": "2025-05-02T04:15:56.000000Z"}, {"uuid": "aa37d5d7-1e83-4dcc-b34c-168311143138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37089", "type": "seen", "source": "https://t.me/true_secator/7102", "content": "Hewlett Packard Enterprise (HPE) \u0432 \u0441\u0432\u043e\u0435\u043c \u043d\u043e\u0432\u043e\u043c \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u0432\u043e\u0441\u044c\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445, \u0432\u043b\u0438\u044f\u044e\u0449\u0438\u0445 \u043d\u0430 \u0440\u0430\u0431\u043e\u0442\u0443 StoreOnce, \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0434\u0435\u0434\u0443\u043f\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u0434\u0438\u0441\u043a\u043e\u0432.\n\nHPE StoreOnce \u043e\u0431\u044b\u0447\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0430 \u043a\u0440\u0443\u043f\u043d\u044b\u0445 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f\u0445, \u0432 \u0426\u041e\u0414\u0430\u0445, \u0443 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0443\u0441\u043b\u0443\u0433 \u0438 \u0432 \u0446\u0435\u043b\u043e\u043c \u0432 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u0445, \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0438\u0445 \u0431\u043e\u043b\u044c\u0448\u0438\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438\u043b\u0438 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0441\u0440\u0435\u0434\u044b.\n\nStoreOnce \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0441 \u041f\u041e \u0434\u043b\u044f \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u0432\u043a\u043b\u044e\u0447\u0430\u044f HPE Data Protector, Veeam, Commvault \u0438 Veritas NetBackup, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044f \u043d\u0435\u043f\u0440\u0435\u0440\u044b\u0432\u043d\u043e\u0441\u0442\u044c \u0431\u0438\u0437\u043d\u0435\u0441\u0430 \u0438 \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u044b\u043c \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c.\n\n\u041e\u0441\u043e\u0431\u043e\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 (CVSS v3.1: 9,8), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2025-37093.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0447\u0435\u0442\u044b\u0440\u0435 RCE (CVE-2025-37089, 37091, 37092, 37096), \u0434\u0432\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043e\u0431\u0445\u043e\u0434\u0430 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u043e\u0432 (CVE-2025-37094 \u0438 CVE-2025-37095) \u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u043e\u0434\u0434\u0435\u043b\u043a\u0438 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 (CVE-2025-37090).\n\n\u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 HPE StoreOnce \u0434\u043e 4.3.11, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u0435\u043f\u0435\u0440\u044c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0435\u0439 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f. \u041d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043e \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u0445 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u043e \u043d\u0435 \u0442\u0430\u043a \u043c\u043d\u043e\u0433\u043e.\n\n\u041e\u0434\u043d\u0430\u043a\u043e Zero Day Initiative (ZDI) \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442, \u0447\u0442\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f CVE-2025-37093 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 machineAccountCheck \u0438 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u043e\u043c \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\nCVE-2025-37093 - \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043e\u0446\u0435\u043d\u0435\u043d\u043d\u0430\u044f \u043a\u0430\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f, \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0434\u0440\u0443\u0433\u0438\u0435 \u0442\u0430\u043a\u0436\u0435 \u043d\u0435\u0441\u0443\u0442 \u0432 \u0441\u0435\u0431\u0435 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0440\u0438\u0441\u043a\u0438, \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u0431\u043e\u043b\u0435\u0435 \u043d\u0438\u0437\u043a\u0438\u043c \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u044f\u043c \u043f\u043e \u0443\u0440\u043e\u0432\u043d\u044e \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438.\n\nZDI \u043f\u043e\u044f\u0441\u043d\u044f\u0435\u0442, \u0447\u0442\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u043b\u044e\u0447\u043e\u043c \u043a \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044e \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u0430 \u0432\u0441\u0435\u0445 \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0438\u0445 \u0440\u0438\u0441\u043a \u043d\u0435 \u0441\u0442\u043e\u0438\u0442 \u0440\u0430\u0441\u0446\u0435\u043d\u0438\u0432\u0430\u0442\u044c \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c.\n\n\u041f\u0440\u0438\u043c\u0435\u0440\u044b CVE-2025-3794 \u0438 CVE-2025-37095, \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435\u043c \u0444\u0430\u0439\u043b\u043e\u0432 \u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0435 \u043f\u0440\u043e\u0449\u0435, \u0447\u0435\u043c \u044d\u0442\u043e \u043e\u0442\u0440\u0430\u0436\u0435\u043d\u043e \u0432 \u043e\u0446\u0435\u043d\u043a\u0435.\n\n\u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430\u0445 Hewlett Packard Enterprise StoreOnce VSA. \u0425\u043e\u0442\u044f \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f, \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0439 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043c\u043e\u0436\u043d\u043e \u043e\u0431\u043e\u0439\u0442\u0438.\n\n\u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0435\u0449\u0435 \u0432 \u043e\u043a\u0442\u044f\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430 \u0438 \u043f\u043e\u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043b\u043e\u0441\u044c \u0446\u0435\u043b\u044b\u0445 \u0441\u0435\u043c\u044c \u043c\u0435\u0441\u044f\u0446\u0435\u0432, \u043f\u0440\u0435\u0436\u0434\u0435 \u0447\u0435\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0430\u043a\u043e\u043d\u0435\u0446-\u0442\u043e \u0441\u0442\u0430\u043b\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b. \u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043d\u0435\u0442 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\nHPE \u043d\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430 \u0432 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u043e\u0431\u0445\u043e\u0434\u043d\u044b\u0445 \u043f\u0443\u0442\u0435\u0439 \u0434\u043b\u044f \u0432\u043e\u0441\u044c\u043c\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c\u044b\u043c \u0440\u0435\u0448\u0435\u043d\u0438\u0435\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435.", "creation_timestamp": "2025-06-04T16:30:06.000000Z"}, {"uuid": "a8890c5b-bb37-4682-a264-c9764a7b4369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37089", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114614060543344731", "content": "", "creation_timestamp": "2025-06-02T13:42:53.816713Z"}, {"uuid": "10266145-41bb-48e3-8d37-7f4f3f7927e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37087", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngzdixnwv2j", "content": "", "creation_timestamp": "2025-04-23T01:14:34.714484Z"}, {"uuid": "da1b7496-14eb-49e8-9c55-681531ee4574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37088", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngzdjkigy2d", "content": "", "creation_timestamp": "2025-04-23T01:14:36.891340Z"}, {"uuid": "9c898928-4751-4316-a6a1-cb02634b259f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3708", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo6e7pe2ro2l", "content": "", "creation_timestamp": "2025-05-02T08:00:35.632140Z"}, {"uuid": "3038629f-bc52-4b4a-aef1-7a69263907d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37087", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12973", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37087\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability in the cmdb service of the HPE Performance Cluster Manager (HPCM) could allow an attacker to gain access to an arbitrary file on the server host.\n\ud83d\udccf Published: 2025-04-22T20:58:58.516Z\n\ud83d\udccf Modified: 2025-04-22T20:59:34.714Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/docDisplay?docLocale=en_US&amp;docId=a00146087en_us", "creation_timestamp": "2025-04-22T21:04:11.000000Z"}, {"uuid": "495a671f-095e-4ce4-aa6c-f9e26b844cd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37088", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12993", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37088\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A security vulnerability has been identified in HPE Cray Data Virtualization Service (DVS). Depending on race conditions and configuration, this vulnerability may lead to local/cluster unauthorized access.\n\ud83d\udccf Published: 2025-04-22T21:55:32.657Z\n\ud83d\udccf Modified: 2025-04-22T21:55:32.657Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04749en_us&amp;docLocale=en_US", "creation_timestamp": "2025-04-22T22:04:01.000000Z"}, {"uuid": "19dedbb9-69b1-432f-9a55-cbd446b694df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37089", "type": "seen", "source": "https://t.me/ics_cert/1191", "content": "\u0628\u062f\u0648\u0646 \u0646\u06cc\u0627\u0632 \u0628\u0647 \u0648\u0631\u0648\u062f - \u062f\u0633\u062a\u0631\u0633\u06cc \u06a9\u0627\u0645\u0644: StoreOnce \u0641\u0631\u0627\u0645\u0648\u0634 \u06a9\u0631\u062f \u06a9\u0647 \u062f\u0631\u0650 \u0627\u0631\u0632\u0634\u0645\u0646\u062f\u062a\u0631\u06cc\u0646\u200c\u0647\u0627 \u0631\u0627 \u0628\u0628\u0646\u062f\u062f\n\n\u062f\u0631 \u062d\u0627\u0644\u06cc \u06a9\u0647 \u0628\u0631\u062e\u06cc \u062f\u0631 \u062d\u0627\u0644 \u062a\u0647\u06cc\u0647 \u0646\u0633\u062e\u0647 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646 \u0628\u0648\u062f\u0646\u062f\u060c \u0628\u0631\u062e\u06cc \u062f\u06cc\u06af\u0631 \u0628\u0647 \u062f\u0646\u0628\u0627\u0644 \u0631\u0627\u0647\u200c\u0647\u0627\u06cc\u06cc \u0628\u0631\u0627\u06cc \u0647\u06a9 \u06a9\u0631\u062f\u0646 \u0645\u062e\u0641\u06cc\u0627\u0646\u0647 \u0633\u06cc\u0633\u062a\u0645 \u0634\u062e\u0635 \u062f\u06cc\u06af\u0631\u06cc \u0628\u0648\u062f\u0646\u062f.\n\n\n\u0634\u0631\u06a9\u062a Hewlett Packard Enterprise \u062f\u0631 \u0631\u0627\u0628\u0637\u0647 \u0628\u0627 \u0647\u0634\u062a \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u067e\u0644\u062a\u0641\u0631\u0645 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc StoreOnce backup \u0648 data deduplication \u062e\u0648\u062f\u060c \u06cc\u06a9 \u0647\u0634\u062f\u0627\u0631 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0641\u0648\u0631\u06cc \u0635\u0627\u062f\u0631 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a. \u062a\u0645\u0627\u0645 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u062f\u0631 \u0646\u0633\u062e\u0647 \u062c\u062f\u06cc\u062f \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u060c StoreOnce 4.3.11\u060c \u06a9\u0647 \u0627\u06a9\u0646\u0648\u0646 \u0628\u0631\u0627\u06cc \u0647\u0645\u0647 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f\u060c \u0628\u0631\u0637\u0631\u0641 \u0634\u062f\u0647\u200c\u0627\u0646\u062f.\n\n\u062e\u0637\u0631\u0646\u0627\u06a9\u200c\u062a\u0631\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc CVE-2025-37093 \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u0645\u0642\u06cc\u0627\u0633 CVSS \u0646\u0633\u062e\u0647 \u06f3.\u06f1 \u0627\u0645\u062a\u06cc\u0627\u0632 \u0628\u062d\u0631\u0627\u0646\u06cc \u06f9.\u06f8 \u0631\u0627 \u062f\u0631\u06cc\u0627\u0641\u062a \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u062e\u0637\u0627\u06cc\u06cc \u062f\u0631 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0631\u0648\u0634 machineAccountCheck\u060c \u0645\u06a9\u0627\u0646\u06cc\u0632\u0645 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0631\u0627 \u062f\u0648\u0631 \u0628\u0632\u0646\u062f. \u0647\u0645\u0627\u0646\u0637\u0648\u0631 \u06a9\u0647 \u062a\u06cc\u0645 ZDI\u060c \u06a9\u0647 \u0627\u06cc\u0646 \u0627\u0634\u06a9\u0627\u0644 \u0631\u0627 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a\u060c \u062a\u0648\u0636\u06cc\u062d \u0645\u06cc\u200c\u062f\u0647\u062f\u060c \u0627\u0635\u0644 \u0645\u0634\u06a9\u0644 \u062f\u0631 \u0645\u0646\u0637\u0642 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0646\u0627\u062f\u0631\u0633\u062a \u0646\u0647\u0641\u062a\u0647 \u0627\u0633\u062a - \u0645\u06cc\u200c\u062a\u0648\u0627\u0646 \u0622\u0646 \u0631\u0627 \u0628\u0647 \u0637\u0648\u0631 \u06a9\u0627\u0645\u0644 \u062f\u0648\u0631 \u0632\u062f \u0648 \u0631\u0627\u0647 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0633\u0627\u06cc\u0631 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0627\u0632 \u06a9\u0631\u062f.\n\n\u0641\u0647\u0631\u0633\u062a \u062a\u0645\u0627\u0645 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0631\u0641\u0639\u200c\u0634\u062f\u0647 \u062f\u0631 \u0646\u0633\u062e\u0647 \u06f4.\u06f3.\u06f1\u06f1 \u0634\u0627\u0645\u0644 \u0645\u0648\u0627\u0631\u062f \u0632\u06cc\u0631 \u0627\u0633\u062a:\n\nCVE-2025-37089 - \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631\u061b\nCVE-2025-37090 - \u062d\u0645\u0644\u0647 \u062c\u0639\u0644 \u062f\u0631\u062e\u0648\u0627\u0633\u062a \u0633\u0631\u0648\u0631 (SSRF)\u061b\nCVE-2025-37091 - \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631\u061b\nCVE-2025-37092 - \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631\u061b\nCVE-2025-37093 - \u062f\u0648\u0631 \u0632\u062f\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a (\u0628\u062d\u0631\u0627\u0646\u06cc)\u061b\nCVE-2025-37094 - \u062d\u0630\u0641 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u067e\u06cc\u0645\u0627\u06cc\u0634 \u062f\u0627\u06cc\u0631\u06a9\u062a\u0648\u0631\u06cc\u061b\nCVE-2025-37095 - \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0627\u0632 \u0637\u0631\u06cc\u0642 \u067e\u06cc\u0645\u0627\u06cc\u0634 \u062f\u0627\u06cc\u0631\u06a9\u062a\u0648\u0631\u06cc\u061b\nCVE-2025-37096 - \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631.\n\u0627\u06af\u0631\u0686\u0647 CVE-2025-37093 \u062a\u0646\u0647\u0627 \u0645\u0648\u0631\u062f\u06cc \u0627\u0633\u062a \u06a9\u0647 \u0631\u0633\u0645\u0627\u064b \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0628\u062d\u0631\u0627\u0646\u06cc \u0637\u0628\u0642\u0647\u200c\u0628\u0646\u062f\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a\u060c \u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u062a\u0623\u06a9\u06cc\u062f \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f \u06a9\u0647 \u0633\u0627\u06cc\u0631 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0631\u0627 \u0646\u0628\u0627\u06cc\u062f \u062f\u0633\u062a \u06a9\u0645 \u06af\u0631\u0641\u062a. \u062e\u0637\u0631 \u062a\u0631\u06a9\u06cc\u0628\u06cc \u0622\u0646\u0647\u0627 \u062f\u0631 \u0635\u0648\u0631\u062a \u062f\u0648\u0631 \u0632\u062f\u0646 \u0645\u0648\u0641\u0642\u06cc\u062a\u200c\u0622\u0645\u06cc\u0632 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0628\u0647 \u0637\u0648\u0631 \u0642\u0627\u0628\u0644 \u062a\u0648\u062c\u0647\u06cc \u0627\u0641\u0632\u0627\u06cc\u0634 \u0645\u06cc\u200c\u06cc\u0627\u0628\u062f. \u0627\u06cc\u0646 \u0627\u0645\u0631 \u062d\u062a\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0628\u0627 \u062f\u0631\u062c\u0647 \u0645\u062a\u0648\u0633\u0637 \u200b\u200b\u0645\u0627\u0646\u0646\u062f CVE-2025-37094 \u0648 CVE-2025-37095 \u0631\u0627 \u0628\u0633\u06cc\u0627\u0631 \u062e\u0637\u0631\u0646\u0627\u06a9 \u0645\u06cc\u200c\u06a9\u0646\u062f - \u062d\u0630\u0641 \u0641\u0627\u06cc\u0644 \u0648 \u0646\u0634\u062a \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u0628\u062f\u0648\u0646 \u062a\u0644\u0627\u0634 \u0632\u06cc\u0627\u062f \u0627\u0645\u06a9\u0627\u0646\u200c\u067e\u0630\u06cc\u0631 \u0627\u0633\u062a.\n\n\u0637\u0628\u0642 \u06af\u0632\u0627\u0631\u0634 Zero Day Initiative\u060c StoreOnce \u0628\u06cc\u0634 \u0627\u0632 \u0634\u0634 \u0645\u0627\u0647 \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0628\u0648\u062f\u0647 \u0627\u0633\u062a. \u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644\u0627\u062a \u0631\u0627 \u062f\u0631 \u0627\u06a9\u062a\u0628\u0631 \u06f2\u06f0\u06f2\u06f4 \u06af\u0632\u0627\u0631\u0634 \u06a9\u0631\u062f\u0646\u062f\u060c \u0627\u0645\u0627 \u062d\u062f\u0648\u062f \u0647\u0641\u062a \u0645\u0627\u0647 \u0637\u0648\u0644 \u06a9\u0634\u06cc\u062f \u062a\u0627 \u0648\u0635\u0644\u0647\u200c\u0647\u0627 \u0645\u0646\u062a\u0634\u0631 \u0634\u0648\u0646\u062f. \u0628\u0627 \u0648\u062c\u0648\u062f \u0627\u06cc\u0646\u060c \u0647\u06cc\u0686 \u062a\u0623\u06cc\u06cc\u062f\u06cc \u0648\u062c\u0648\u062f \u0646\u062f\u0627\u0631\u062f \u06a9\u0647 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0647 \u0637\u0648\u0631 \u0641\u0639\u0627\u0644 \u062f\u0631 \u062d\u0645\u0644\u0627\u062a \u0648\u0627\u0642\u0639\u06cc \u0645\u0648\u0631\u062f \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647\u200c\u0627\u0646\u062f.\n\nStoreOnce \u062f\u0631 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u200c\u0647\u0627\u06cc \u0628\u0632\u0631\u06af \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a\u060c \u0645\u0631\u0627\u06a9\u0632 \u062f\u0627\u062f\u0647 \u0648 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627\u06cc\u06cc \u0628\u0627 \u062d\u062c\u0645 \u0632\u06cc\u0627\u062f\u06cc \u0627\u0632 \u062f\u0627\u062f\u0647\u200c\u0647\u0627 - \u0627\u0632 \u0627\u0631\u0627\u0626\u0647\u200c\u062f\u0647\u0646\u062f\u06af\u0627\u0646 \u062e\u062f\u0645\u0627\u062a \u0627\u0628\u0631\u06cc \u06af\u0631\u0641\u062a\u0647 \u062a\u0627 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0634\u0631\u06a9\u062a\u06cc - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f. \u0627\u0632 \u062c\u0645\u0644\u0647 \u062f\u0631 \u0631\u0648\u0633\u06cc\u0647. \u0627\u06cc\u0646 \u0645\u062d\u0635\u0648\u0644 \u0628\u0627 \u0631\u0627\u0647\u06a9\u0627\u0631\u0647\u0627\u06cc \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u200c\u06af\u06cc\u0631\u06cc \u0645\u0627\u0646\u0646\u062f HPE Data Protector\u060c Veeam\u060c Commvault \u0648 Veritas NetBackup \u0627\u062f\u063a\u0627\u0645 \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u06cc\u06a9 \u062c\u0632\u0621 \u06a9\u0644\u06cc\u062f\u06cc \u062f\u0631 \u0627\u0633\u062a\u0631\u0627\u062a\u0698\u06cc\u200c\u0647\u0627\u06cc \u062a\u062f\u0627\u0648\u0645 \u06a9\u0633\u0628\u200c\u0648\u06a9\u0627\u0631 \u0639\u0645\u0644 \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\nHPE \u0647\u06cc\u0686 \u0631\u0627\u0647 \u062d\u0644 \u0645\u0648\u0642\u062a \u06cc\u0627 \u0627\u0642\u062f\u0627\u0645 \u0645\u0648\u0642\u062a\u06cc \u0628\u0631\u0627\u06cc \u0645\u062d\u0627\u0641\u0638\u062a \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u0645\u0634\u06a9\u0644\u0627\u062a \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647 \u0627\u0631\u0627\u0626\u0647 \u0646\u06a9\u0631\u062f\u0647 \u0627\u0633\u062a. \u062a\u0646\u0647\u0627 \u0631\u0627\u0647 \u0628\u0631\u0627\u06cc \u0628\u0633\u062a\u0646 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u060c \u0646\u0633\u062e\u0647 \u0641\u0639\u0644\u06cc StoreOnce 4.3.11 \u0627\u0633\u062a. \u0628\u0631\u0627\u06cc \u0645\u062f\u06cc\u0631\u0627\u0646 \u0633\u06cc\u0633\u062a\u0645 \u06a9\u0647 \u0645\u062d\u06cc\u0637\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u062f\u06cc\u062f\u0647 \u0631\u0627 \u0646\u06af\u0647\u062f\u0627\u0631\u06cc \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f\u060c \u0627\u06cc\u0646 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u062f\u0631 \u0627\u0648\u0644\u0648\u06cc\u062a \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u06af\u06cc\u0631\u062f.\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ICSCERT_IR", "creation_timestamp": "2025-06-12T19:42:43.000000Z"}, {"uuid": "d286f939-d4ee-49f0-b2da-e08922836924", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37088", "type": "seen", "source": "https://t.me/cvedetector/23565", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-37088 - HPE Cray Data Virtualization Service (DVS) Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-37088 \nPublished : April 22, 2025, 10:15 p.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : A security vulnerability has been identified in HPE Cray Data Virtualization Service (DVS). Depending on race conditions and configuration, this vulnerability may lead to local/cluster unauthorized access. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T02:46:26.000000Z"}, {"uuid": "01873d5b-391f-409f-bccc-a1d31164ff0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3708", "type": "seen", "source": "Telegram/iYh3KCKDOJhhtXUlLXzKQ0urfXGfuEgjBYvrs8SISUYckP4", "content": "", "creation_timestamp": "2025-05-02T06:00:38.000000Z"}, {"uuid": "9a5ba644-01dc-48bd-89ae-f7c2148a2347", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37089", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/114647946130955056", "content": "", "creation_timestamp": "2025-06-08T13:20:31.584901Z"}, {"uuid": "f71b0156-da3d-4c8c-a8b9-c54dad5d56f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37089", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-312/", "content": "", "creation_timestamp": "2025-06-02T03:00:00.000000Z"}, {"uuid": "fefc20d7-8d30-4b60-94e9-c1de21e5dbc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37087", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114388062197378576", "content": "", "creation_timestamp": "2025-04-23T15:48:39.240327Z"}, {"uuid": "65276dd1-4072-4c93-92c7-1dee67c609e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37089", "type": "seen", "source": "Telegram/gkh687utgOctgjszmsMxTUPnrLH3iSmfkgQMbemL6f96aIw", "content": "", "creation_timestamp": "2025-06-02T14:00:51.000000Z"}, {"uuid": "a23dde5f-2e98-4b35-afe5-11bf1f9b40af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37087", "type": "seen", "source": "https://t.me/cvedetector/23559", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-37087 - HPE Performance Cluster Manager (HPCM) Arbitrary File Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-37087 \nPublished : April 22, 2025, 9:15 p.m. | 47\u00a0minutes ago \nDescription : A vulnerability in the cmdb service of the HPE Performance Cluster Manager (HPCM) could allow an attacker to gain access to an arbitrary file on the server host. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T00:15:51.000000Z"}, {"uuid": "cc953fd5-9fd3-4bb7-aaad-37fea10a1514", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3708", "type": "seen", "source": "https://t.me/cvedetector/24313", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3708 - Le-Yan Le-Show Medical SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3708 \nPublished : May 2, 2025, 4:15 a.m. | 33\u00a0minutes ago \nDescription : Le-show medical practice management system from Le-yan has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T07:34:36.000000Z"}, {"uuid": "63541148-1471-40ef-9d97-024660674236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37089", "type": "seen", "source": "https://bsky.app/profile/jfreeg.bsky.social/post/3lqqekb3xjj2v", "content": "", "creation_timestamp": "2025-06-03T22:44:45.631755Z"}, {"uuid": "a09e7fc0-f9f2-463a-bc23-02f2c9819a4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37089", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqmyxodruce2", "content": "", "creation_timestamp": "2025-06-02T14:39:58.532306Z"}]}