{"vulnerability": "CVE-2025-3823", "sightings": [{"uuid": "66a961ec-fac6-4f81-b2b6-9d73460c0a04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3823", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lnaik65zrye2", "content": "", "creation_timestamp": "2025-04-20T10:58:14.142926Z"}, {"uuid": "85ac6c6e-4498-476f-8e80-235e604c355b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3823", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnavibya2g2b", "content": "", "creation_timestamp": "2025-04-20T14:49:41.644844Z"}, {"uuid": "9971d582-dbc0-47d1-9551-e42c7d1d7b47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38230", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lt5pxyryj42m", "content": "", "creation_timestamp": "2025-07-04T17:04:17.179281Z"}, {"uuid": "3b5c39a4-8d2c-4825-a4b1-53324feac7bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lw3vtn3gaa27", "content": "", "creation_timestamp": "2025-08-11T03:59:28.616989Z"}, {"uuid": "895f9535-0b90-403d-bed6-8be41ca07ef2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3lw4tcandogj2", "content": "", "creation_timestamp": "2025-08-11T12:46:45.644753Z"}, {"uuid": "6b4cac5a-44d8-4f73-ae9b-bf4f97f4f835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://bsky.app/profile/linkersec.bsky.social/post/3lx53sys5oc2b", "content": "", "creation_timestamp": "2025-08-24T08:44:29.042083Z"}, {"uuid": "5589fbe5-0f4a-4de8-9ca2-ce889422cce2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://bsky.app/profile/linkersec.bsky.social/post/3lx53t3mt222b", "content": "", "creation_timestamp": "2025-08-24T08:44:29.561329Z"}, {"uuid": "f787bc26-bcb0-4729-83f6-6ded27d7498b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://projectzero.google/2025/08/from-chrome-renderer-code-exec-to-kernel.html", "content": "", "creation_timestamp": "2025-08-08T05:00:00.000000Z"}, {"uuid": "aeee058e-7744-431f-818f-1bb6f2c88e5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38232", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "4d6e3f54-f605-422c-b385-b6c4cfcabb6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38234", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "c13bbcd2-27b4-4ee1-8db9-9149d4bdeaa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38239", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "f113a686-facc-43a9-a701-2590b4ade08d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38234", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "33e71061-a1c6-40db-bc1b-64880d600454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3823", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12611", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3823\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as problematic has been found in SourceCodester Web-based Pharmacy Product Management System 1.0. Affected is an unknown function of the file add-stock.php. The manipulation of the argument txttotalcost/txtproductID/txtprice/txtexpirydate leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-20T10:31:05.566Z\n\ud83d\udccf Modified: 2025-04-20T10:31:05.566Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.305730\n2. https://vuldb.com/?ctiid.305730\n3. https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/xss_from_input_with_post.md\n4. https://www.sourcecodester.com/", "creation_timestamp": "2025-04-20T11:01:46.000000Z"}, {"uuid": "549bca42-8d23-4448-8330-92a321a09ad5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38232", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lt5r2ouoom2r", "content": "", "creation_timestamp": "2025-07-04T17:23:40.885248Z"}, {"uuid": "e9e53ebc-de77-4fd8-9307-0f5eb19f2d80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3lvxkood2vju2", "content": "", "creation_timestamp": "2025-08-09T10:30:50.186323Z"}, {"uuid": "4468eddd-565a-4d89-be6a-d09e5cf176bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lxkprgig5p2f", "content": "", "creation_timestamp": "2025-08-29T18:45:59.684296Z"}, {"uuid": "2b7cb07b-af8d-431c-be71-6f3dcd316e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-38234", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mjoxda4ub42f", "content": "", "creation_timestamp": "2026-04-17T12:45:21.348925Z"}, {"uuid": "78b87943-3427-4a06-bade-1bc58d0b1883", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38232", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "dadf580d-4d49-447b-9e24-8f1314c41215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38232", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/ubuntu-linux-kernel-multiple-vulnerabilities_20260408", "content": "", "creation_timestamp": "2026-04-07T18:00:00.000000Z"}, {"uuid": "6672e5fb-0d09-4cef-a862-6e4fb2369ccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38235", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3ltbxwmb2bd2c", "content": "", "creation_timestamp": "2025-07-06T09:37:19.273321Z"}, {"uuid": "7b77a4a0-3489-475c-a7e2-ef82a0710ca3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38235", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltcbvejrbs2a", "content": "", "creation_timestamp": "2025-07-06T12:35:34.913104Z"}, {"uuid": "33b103eb-1097-49b7-8b12-38d9d6f1708a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltgzxk5ypa2w", "content": "", "creation_timestamp": "2025-07-08T09:56:56.832341Z"}, {"uuid": "31fae3d2-289a-4070-97a0-4cb82e649b71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/08/from-chrome-renderer-code-exec-to-kernel.html", "content": "", "creation_timestamp": "2025-08-08T08:43:00.000000Z"}, {"uuid": "99fedf88-eb56-441b-b508-01d5f6168d77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lvzduggjlhc2", "content": "", "creation_timestamp": "2025-08-10T03:32:35.814944Z"}, {"uuid": "264c7bd4-4e76-4872-9266-14c88f1feef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0397/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "5997937c-6b6f-45df-b975-e33124e6e515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/ubuntu-linux-kernel-multiple-vulnerabilities_20260408", "content": "", "creation_timestamp": "2026-04-07T18:00:00.000000Z"}, {"uuid": "327e0ea9-2290-4545-9de5-17677b520beb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38236", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/5543", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u044f\u0434\u0440\u0435 Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043e\u0431\u043e\u0439\u0442\u0438 sandbox-\u0438\u0437\u043e\u043b\u044f\u0446\u0438\u044e Chrome\nhttps://www.opennet.ru/opennews/art.shtml?num=63710\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Google \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u0432 \u044f\u0434\u0440\u0435 Linux \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2025-38236), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0443\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u0421\u0440\u0435\u0434\u0438 \u043f\u0440\u043e\u0447\u0435\u0433\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0430\u0451\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043e\u0431\u043e\u0439\u0442\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c sandbox-\u0438\u0437\u043e\u043b\u044f\u0446\u0438\u0438, \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0435\u043c\u044b\u0439 \u0432 Google Chrome, \u0438 \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u044f\u0434\u0440\u0430 \u043f\u0440\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 \u043a\u043e\u0434\u0430 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u0440\u0435\u043d\u0434\u0435\u0440\u0438\u043d\u0433\u0430 Chrome (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u043f\u0440\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0434\u0440\u0443\u0433\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Chrome).\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0444\u043b\u0430\u0433\u0430 MSG_OOB, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u043d\u043e \u0432\u044b\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0434\u043b\u044f \u0441\u043e\u043a\u0435\u0442\u043e\u0432 AF_UNIX. \u0424\u043b\u0430\u0433 MSG_OOB (\"out-of-band\") \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u0440\u0438\u043a\u0440\u0435\u043f\u0438\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u0431\u0430\u0439\u0442 \u043a \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u0435\u043b\u044c \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u0434\u043e \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0412 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 sandbox-\u043e\u043a\u0440\u0443\u0436\u0435\u043d\u0438\u0438 Chrome \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u044b \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0441 UNIX-\u0441\u043e\u043a\u0435\u0442\u0430\u043c\u0438 \u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u0432\u044b\u0437\u043e\u0432\u044b send()/recv(), \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0444\u043b\u0430\u0433 MSG_OOB \u0434\u043e\u043f\u0443\u0441\u043a\u0430\u043b\u0441\u044f \u043d\u0430\u0440\u044f\u0434\u0443 c \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u043e\u043f\u0446\u0438\u044f\u043c\u0438 \u0438 \u043d\u0435 \u0431\u044b\u043b \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u043e \u043e\u0442\u0444\u0438\u043b\u044c\u0442\u0440\u043e\u0432\u0430\u043d. \u041e\u0448\u0438\u0431\u043a\u0430 \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 MSG_OOB \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u043a \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0451 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (use-after-free) \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u043e\u0439 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u0432\u044b\u0437\u043e\u0432\u043e\u0432:\n\n   char dummy;\n   int socks[2];\n   socketpair(AF_UNIX, SOCK_STREAM, 0, socks);\n   send(socks[1], \"A\", 1, MSG_OOB);\n   recv(socks[0], &amp;dummy, 1, MSG_OOB);\n   send(socks[1], \"A\", 1, MSG_OOB);\n   recv(socks[0], &amp;dummy, 1, MSG_OOB);\n   send(socks[1], \"A\", 1, MSG_OOB);\n   recv(socks[0], &amp;dummy, 1, 0);\n   recv(socks[0], &amp;dummy, 1, MSG_OOB);\n\n\u0412\u0441\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b\u0435\n\nFrom Chrome renderer code exec to kernel with MSG_OOB\nhttps://googleprojectzero.blogspot.com/2025/08/from-chrome-renderer-code-exec-to-kernel.html\n\nPoC\nhttps://project-zero.issues.chromium.org/action/issues/423023990/attachments/67577205", "creation_timestamp": "2025-08-11T19:57:04.000000Z"}, {"uuid": "717dc724-f23d-4044-85a6-1bcf5a95bf10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3823", "type": "seen", "source": "https://t.me/cvedetector/23410", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3823 - SourceCodester Web-based Pharmacy Product Management System Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3823 \nPublished : April 20, 2025, 11:15 a.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in SourceCodester Web-based Pharmacy Product Management System 1.0. Affected is an unknown function of the file add-stock.php. The manipulation of the argument txttotalcost/txtproductID/txtprice/txtexpirydate leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-20T15:23:32.000000Z"}]}