{"vulnerability": "CVE-2025-4656", "sightings": [{"uuid": "861d8322-208e-4a7f-bbed-535ae6773821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46566", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqqkl2lmpn2q", "content": "", "creation_timestamp": "2025-06-04T00:32:34.355629Z"}, {"uuid": "337d6194-9a04-4cdb-9592-836c39ca67bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46560", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnyvdljsau24", "content": "", "creation_timestamp": "2025-04-30T03:50:58.343346Z"}, {"uuid": "a59db521-add2-4a82-9a2c-6e09ca6eff5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46569", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo5cpp4fve22", "content": "", "creation_timestamp": "2025-05-01T22:01:02.633675Z"}, {"uuid": "af737feb-3f45-4851-bb5c-e6556da4224d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46565", "type": "seen", "source": "https://bsky.app/profile/mynameisv.bsky.social/post/3lofscowf6k2y", "content": "", "creation_timestamp": "2025-05-05T07:01:24.584699Z"}, {"uuid": "41ecdec7-0c5b-4ccd-b3ca-d7c09894fb88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46561", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lqkqgl4r4k2r", "content": "", "creation_timestamp": "2025-06-01T17:01:30.675710Z"}, {"uuid": "af8b0718-0673-4693-b338-da41aa1069a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46569", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lvgncwlzts2p", "content": "", "creation_timestamp": "2025-08-02T17:01:05.937418Z"}, {"uuid": "c82f9bdb-99d5-437e-a8be-9b3ffdfd7d6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46569", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lvhmyo5sn72t", "content": "", "creation_timestamp": "2025-08-03T02:27:59.440325Z"}, {"uuid": "f8fd459a-58f2-452e-b39b-1e3446e8f6ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46569", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14399", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46569\n\ud83d\udd25 CVSS Score: 7.4 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Open Policy Agent (OPA) is an open source, general-purpose policy engine. Prior to version 1.4.0, when run as a server, OPA exposes an HTTP Data API for reading and writing documents. Requesting a virtual document through the Data API entails policy evaluation, where a Rego query containing a single data document reference is constructed from the requested path. This query is then used for policy evaluation. A HTTP request path can be crafted in a way that injects Rego code into the constructed query. The evaluation result cannot be made to return any other data than what is generated by the requested path, but this path can be misdirected, and the injected Rego code can be crafted to make the query succeed or fail; opening up for oracle attacks or, given the right circumstances, erroneous policy decision results. Furthermore, the injected code can be crafted to be computationally expensive, resulting in a Denial Of Service (DoS) attack. This issue has been patched in version 1.4.0. A workaround involves having network access to OPA\u2019s RESTful APIs being limited to `localhost` and/or trusted networks, unless necessary for production reasons.\n\ud83d\udccf Published: 2025-05-01T19:32:47.988Z\n\ud83d\udccf Modified: 2025-05-01T19:32:47.988Z\n\ud83d\udd17 References:\n1. https://github.com/open-policy-agent/opa/security/advisories/GHSA-6m8w-jc87-6cr7\n2. https://github.com/open-policy-agent/opa/commit/ad2063247a14711882f18c387a511fc8094aa79c", "creation_timestamp": "2025-05-01T20:16:05.000000Z"}, {"uuid": "aa478604-de18-4833-9c70-73b2852f54e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4656", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19484", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4656\n\ud83d\udd25 CVSS Score: 3.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22.\n\ud83d\udccf Published: 2025-06-25T16:15:11.861Z\n\ud83d\udccf Modified: 2025-06-25T16:17:34.648Z\n\ud83d\udd17 References:\n1. https://discuss.hashicorp.com/t/hcsec-2025-11-vault-vulnerable-to-recovery-key-cancellation-denial-of-service/75570", "creation_timestamp": "2025-06-25T16:47:42.000000Z"}, {"uuid": "4cfc996c-d304-4424-8ccd-8a14ae9cf36f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46565", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/183", "content": "", "creation_timestamp": "2025-11-21T18:06:21.000000Z"}, {"uuid": "344b3117-09ec-44af-8c98-44985e862664", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46564", "type": "seen", "source": "https://gist.github.com/MagnaCapax/15579d7add88dacf2ba0c5bb47be443b", "content": "", "creation_timestamp": "2026-02-11T08:11:05.000000Z"}, {"uuid": "1f4d6c1b-a5fc-4eba-9a81-33a930170fb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46566", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14558", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46566\n\ud83d\udd25 CVSS Score: 6.8 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: DataEase is an open-source BI tool alternative to Tableau. Prior to version 2.10.9, authenticated users can complete RCE through the backend JDBC link. This issue has been patched in version 2.10.9.\n\ud83d\udccf Published: 2025-05-01T17:20:34.660Z\n\ud83d\udccf Modified: 2025-05-02T17:38:02.983Z\n\ud83d\udd17 References:\n1. https://github.com/dataease/dataease/security/advisories/GHSA-hxw4-vpfp-frgv", "creation_timestamp": "2025-05-02T18:19:55.000000Z"}, {"uuid": "a646f7bf-c8bf-45e1-add3-ddc64b585d27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46560", "type": "seen", "source": "https://t.me/cvedetector/24063", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46560 - LLaMA LLM Multimodal Tokenizer Resource Exhaustion\", \n  \"Content\": \"CVE ID : CVE-2025-46560 \nPublished : April 30, 2025, 1:15 a.m. | 2\u00a0hours ago \nDescription : vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.8.0 and prior to 0.8.5 are affected by a critical performance vulnerability in the input preprocessing logic of the multimodal tokenizer. The code dynamically replaces placeholder tokens (e.g., &lt;|audio_|, &lt;|image_|) with repeated tokens based on precomputed lengths. Due to \u200b\u200binefficient list concatenation operations\u200b\u200b, the algorithm exhibits \u200b\u200bquadratic time complexity (O(n\u00b2))\u200b\u200b, allowing malicious actors to trigger resource exhaustion via specially crafted inputs. This issue has been patched in version 0.8.5. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T05:22:33.000000Z"}, {"uuid": "055d7564-f20a-4d07-b1f4-9d2851fbf49b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46568", "type": "published-proof-of-concept", "source": "Telegram/QFVP5TcYkEi5fC3DYhpbJ3tJ8sPusYmL1ImuYd1RRjGW6cE", "content": "", "creation_timestamp": "2025-05-01T20:00:50.000000Z"}, {"uuid": "0cb61f7b-8cb4-4a25-a4f8-48c613872e11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46569", "type": "seen", "source": "https://t.me/cvedetector/24274", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46569 - Open Policy Agent (OPA) HTTP Data API Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46569 \nPublished : May 1, 2025, 8:15 p.m. | 20\u00a0minutes ago \nDescription : Open Policy Agent (OPA) is an open source, general-purpose policy engine. Prior to version 1.4.0, when run as a server, OPA exposes an HTTP Data API for reading and writing documents. Requesting a virtual document through the Data API entails policy evaluation, where a Rego query containing a single data document reference is constructed from the requested path. This query is then used for policy evaluation. A HTTP request path can be crafted in a way that injects Rego code into the constructed query. The evaluation result cannot be made to return any other data than what is generated by the requested path, but this path can be misdirected, and the injected Rego code can be crafted to make the query succeed or fail; opening up for oracle attacks or, given the right circumstances, erroneous policy decision results. Furthermore, the injected code can be crafted to be computationally expensive, resulting in a Denial Of Service (DoS) attack. This issue has been patched in version 1.4.0. A workaround involves having network access to OPA\u2019s RESTful APIs being limited to `localhost` and/or trusted networks, unless necessary for production reasons. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T23:12:44.000000Z"}, {"uuid": "7b2d9f2a-52e8-4e5b-8454-ab9037047f6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46565", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-46565.yaml", "content": "", "creation_timestamp": "2026-03-26T01:31:37.000000Z"}, {"uuid": "5313675e-089b-495d-8ba7-1134dfdf7b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46568", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14487", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46568\n\ud83d\udd25 CVSS Score: 7.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. Prior to version 0.45.0, Stirling-PDF is vulnerable to SSRF-induced arbitrary file read. WeasyPrint redefines a set of HTML tags, including img, embed, object, and others. The references to several files inside, allow the attachment of content from any webpage or local file to a PDF. This allows the attacker to read any file on the server, including sensitive files and configuration files. All users utilizing this feature will be affected. This issue has been patched in version 0.45.0.\n\ud83d\udccf Published: 2025-05-01T17:20:46.488Z\n\ud83d\udccf Modified: 2025-05-02T13:33:46.987Z\n\ud83d\udd17 References:\n1. https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r", "creation_timestamp": "2025-05-02T14:15:53.000000Z"}, {"uuid": "a392b2d9-a0a5-4b58-9fe6-621fc6539328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46565", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14557", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46565\n\ud83d\udd25 CVSS Score: 6 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Vite is a frontend tooling framework for javascript. Prior to versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14, the contents of files in the project root that are denied by a file matching pattern can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. Only files that are under project root and are denied by a file matching pattern can be bypassed. `server.fs.deny` can contain patterns matching against files (by default it includes .env, .env.*, *.{crt,pem} as such patterns). These patterns were able to bypass for files under `root` by using a combination of slash and dot (/.). This issue has been patched in versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14.\n\ud83d\udccf Published: 2025-05-01T17:20:29.773Z\n\ud83d\udccf Modified: 2025-05-02T17:38:55.291Z\n\ud83d\udd17 References:\n1. https://github.com/vitejs/vite/security/advisories/GHSA-859w-5945-r5v3\n2. https://github.com/vitejs/vite/commit/c22c43de612eebb6c182dd67850c24e4fab8cacb", "creation_timestamp": "2025-05-02T18:19:55.000000Z"}, {"uuid": "40f9bdf1-bf60-4338-864b-8a3ae0bb567b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46568", "type": "published-proof-of-concept", "source": "https://t.me/wr3dmast3rvs/57", "content": "\u0421\u0435\u0433\u043e\u0434\u043d\u044f \u0432 \u043b\u0430\u0439\u0432-\u0440\u0435\u0436\u0438\u043c\u0435 \u0437\u043d\u0430\u043a\u043e\u043c\u0438\u043b\u0438\u0441\u044c \u0441 \u0430\u043d\u0430\u043b\u0438\u0437\u043e\u043c \u043a\u043e\u0434\u0430 \u043d\u0430 \u043f\u0440\u0438\u043c\u0435\u0440\u0435 SSRF \u0432 Stirling-PDF (CVE-2025-46568): \u0447\u0442\u0435\u043d\u0438\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0447\u0435\u0440\u0435\u0437 WeasyPrint. \u041d\u0435 \u0431\u044b\u043b\u043e \u043e\u0441\u043e\u0431\u043e \u0432\u0430\u0436\u043d\u043e, \u043a\u0430\u043a\u0430\u044f CVE. \u0413\u043b\u0430\u0432\u043d\u043e\u0435 \u2014 \u043f\u043e\u0442\u0440\u0435\u043d\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0430\u043d\u0430\u043b\u0438\u0437 \u043a\u043e\u0434\u0430 \ud83c\udfc3\u200d\u2642\ufe0f\n\nStirling-PDF \u2014 \u044d\u0442\u043e \u0432\u0435\u0431-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u0441 PDF (\u043a\u043e\u043d\u0432\u0435\u0440\u0442\u0430\u0446\u0438\u044f, \u0440\u0435\u0434\u0430\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435). \u0412 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 \u0434\u043e 0.45.0 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 SSRF-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u0447\u0438\u0442\u0430\u0442\u044c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0447\u0435\u0440\u0435\u0437 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0443 HTML \u0432 WeasyPrint \u26a0\ufe0f\n\n\u0421\u0443\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\n1. \u041f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e \u0444\u0438\u043b\u044c\u0442\u0440\u0443\u0435\u0442 HTML-\u043a\u043e\u043d\u0442\u0435\u043d\u0442, \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0439 \u043f\u043e URL;\n2. WeasyPrint \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u0442\u0435\u0433 , \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b (file://) \u0432 PDF \u043a\u0430\u043a \u0441\u043a\u0440\u044b\u0442\u044b\u0435 \u0432\u043b\u043e\u0436\u0435\u043d\u0438\u044f.\n\n\u041e\u0441\u043d\u043e\u0432\u043d\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u2014 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0441\u0430\u043d\u0438\u0442\u0438\u0437\u0430\u0446\u0438\u0438 HTML \u043f\u0435\u0440\u0435\u0434 \u0440\u0435\u043d\u0434\u0435\u0440\u0438\u043d\u0433\u043e\u043c:\n// 1. \u041f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 URL \u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u0441\u0445\u0435\u043c\u0443 http/https\nif (!URL.matches(\"^https?://.*\") || !GeneralUtils.isValidURL(URL)) {\n    throw new IllegalArgumentException(\"Invalid URL format provided.\");\n}\n\n// 2. \u041f\u0435\u0440\u0435\u0434\u0430\u0451\u0442 URL \u0432 WeasyPrint \u0431\u0435\u0437 \u043e\u0447\u0438\u0441\u0442\u043a\u0438 HTML\nList command = new ArrayList&lt;&gt;();\ncommand.add(runtimePathConfig.getWeasyPrintPath());\ncommand.add(URL);  // HTML \u043c\u043e\u0436\u0435\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442\u044c \ncommand.add(\"--pdf-forms\");\ncommand.add(tempOutputFile.toString());\n\n// 3. WeasyPrint \u0440\u0435\u043d\u0434\u0435\u0440\u0438\u0442 PDF \u0441 \u0432\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u043c\u0438 \u0444\u0430\u0439\u043b\u0430\u043c\u0438\nProcessExecutor.runCommandWithOutputHandling(command);\n\nPoC:\n\n\n\n    \n\n\n\n\n\u0415\u0441\u043b\u0438 \u0412\u0430\u043c \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u0435\u043d \u0430\u043d\u0430\u043b\u0438\u0437 \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u0412\u044b \u0445\u043e\u0442\u0438\u0442\u0435 \u043f\u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f, \u043f\u0440\u0438\u0441\u043e\u0435\u0434\u0438\u043d\u044f\u0439\u0442\u0435\u0441\u044c \u043a Discord \u0438 \u0437\u0430\u0445\u043e\u0434\u0438\u0442\u0435 \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0432\u0441\u0442\u0440\u0435\u0447\u0438! \ud83d\udd0d", "creation_timestamp": "2025-06-21T19:52:27.000000Z"}, {"uuid": "8879dc74-3ca5-4c2c-a9b9-e12e9ce7b042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46569", "type": "published-proof-of-concept", "source": "Telegram/0EwG4WR3r_yD8YYpC8nymf37rvRJ9lNf57cFzRcn8wtN8JQ", "content": "", "creation_timestamp": "2025-05-01T22:01:57.000000Z"}]}