{"vulnerability": "CVE-2025-4573", "sightings": [{"uuid": "6ed5a13c-dd11-412c-8b34-bf30c5fd4088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45737", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19666", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-45737\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in NetEase (Hangzhou) Network Co., Ltd NeacSafe64 Driver before v1.0.0.8 allows attackers to escalate privileges via sending crafted IOCTL commands to the NeacSafe64.sys component.\n\ud83d\udccf Published: 2025-06-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-27T04:03:12.346Z\n\ud83d\udd17 References:\n1. https://github.com/za233/NeacController", "creation_timestamp": "2025-06-27T04:51:45.000000Z"}, {"uuid": "52b34c5c-49ee-49ab-b421-f75f9e1d96e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45737", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsl74bxh752u", "content": "", "creation_timestamp": "2025-06-27T08:14:31.843844Z"}, {"uuid": "ea7ab334-2a04-45a6-ad33-aad4382b5cb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4573", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrdoqrgcdc2a", "content": "", "creation_timestamp": "2025-06-11T15:07:55.793564Z"}, {"uuid": "46649bab-2b42-4ceb-a0f1-b0af04e0e2ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4573", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18068", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4573\n\ud83d\udd25 CVSS Score: 4.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: Mattermost versions 10.7.x &lt;= 10.7.1, 10.6.x &lt;= 10.6.3, 10.5.x &lt;= 10.5.4, 9.11.x &lt;= 9.11.13 fail to properly validate LDAP group ID attributes, allowing an authenticated administrator with PermissionSysconsoleWriteUserManagementGroups permission to execute LDAP search filter injection via the PUT /api/v4/ldap/groups/{remote_id}/link API when objectGUID is configured as the Group ID Attribute.\n\ud83d\udccf Published: 2025-06-11T10:22:24.103Z\n\ud83d\udccf Modified: 2025-06-11T13:13:11.535Z\n\ud83d\udd17 References:\n1. https://mattermost.com/security-updates", "creation_timestamp": "2025-06-11T13:30:55.000000Z"}]}