{"vulnerability": "CVE-2025-4674", "sightings": [{"uuid": "317d59cf-d858-40ad-9467-ff8b9552ba84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46741", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16010", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46741\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A suspended or recently logged-out user could continue to interact with Blueframe until the time-out period occurred.\n\ud83d\udccf Published: 2025-05-12T16:09:53.581Z\n\ud83d\udccf Modified: 2025-05-12T17:55:24.025Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:38:02.000000Z"}, {"uuid": "67e597ce-35e1-4615-9362-352694a06021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46740", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16009", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46740\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An authenticated user without user administrative permissions could  change the administrator Account Name.\n\ud83d\udccf Published: 2025-05-12T16:09:22.036Z\n\ud83d\udccf Modified: 2025-05-12T17:56:25.876Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:38:01.000000Z"}, {"uuid": "56fe6083-b15b-4592-b8b1-484df36dd7c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46746", "type": "seen", "source": "https://t.me/cvedetector/25093", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46746 - Citrix SharePoint Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-46746 \nPublished : May 12, 2025, 5:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : An administrator could discover another account's credentials. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T21:07:56.000000Z"}, {"uuid": "0a5d942f-612e-4043-9df1-bb98628e8fb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46744", "type": "seen", "source": "https://t.me/cvedetector/25092", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46744 - Apache Struts Username Manipulation\", \n  \"Content\": \"CVE ID : CVE-2025-46744 \nPublished : May 12, 2025, 5:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : An authenticated administrator could modify the Created By username for a user account \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T21:07:55.000000Z"}, {"uuid": "4841f856-d5a9-44d3-b968-4dc3378406e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46745", "type": "seen", "source": "https://t.me/cvedetector/25091", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46745 - Apache User Account Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-46745 \nPublished : May 12, 2025, 5:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : An authenticated user without user-management permissions could view other users' account information. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T21:07:54.000000Z"}, {"uuid": "d49efd3c-f650-49ae-a8cf-e7d6d7d7b142", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46743", "type": "seen", "source": "https://t.me/cvedetector/25102", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46743 - Apache HTTP Server Session Token Reuse\", \n  \"Content\": \"CVE ID : CVE-2025-46743 \nPublished : May 12, 2025, 5:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : An authenticated user's token could be used by another source after the user had logged out prior to the token expiring. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T21:08:09.000000Z"}, {"uuid": "a1c1a53d-43c9-482a-a9e6-391a5c1e49e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46742", "type": "seen", "source": "https://t.me/cvedetector/25101", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46742 - Oracle WebLogic Server Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-46742 \nPublished : May 12, 2025, 5:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : Users who were required to change their password could still access system information before changing their password \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T21:08:08.000000Z"}, {"uuid": "6ac0fda8-6098-4f54-96f4-583764b46029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46741", "type": "seen", "source": "https://t.me/cvedetector/25100", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46741 - Blueframe Session Fixation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46741 \nPublished : May 12, 2025, 5:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : A suspended or recently logged-out user could continue to interact with Blueframe until the time-out period occurred. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T21:08:04.000000Z"}, {"uuid": "7b29bb0d-8106-4bdb-a4ef-d37a069bf16b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46747", "type": "seen", "source": "https://t.me/cvedetector/25094", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46747 - Adobe Acrobat Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46747 \nPublished : May 12, 2025, 5:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : An authenticated user without user-management permissions could identify other user accounts. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T21:07:57.000000Z"}, {"uuid": "0b90e346-ee5f-4053-8127-c2d169258741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46749", "type": "seen", "source": "https://t.me/cvedetector/25096", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46749 - Apache Struts XSS\", \n  \"Content\": \"CVE ID : CVE-2025-46749 \nPublished : May 12, 2025, 5:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : An authenticated user could submit scripting to fields that lack proper input and output sanitization leading to subsequent client-side script execution. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T21:08:01.000000Z"}, {"uuid": "1c831e01-dcec-431e-a478-868c271dc465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46748", "type": "seen", "source": "https://t.me/cvedetector/25095", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46748 - Apache Password Change Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46748 \nPublished : May 12, 2025, 5:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : An authenticated user attempting to change their password could do so without using the current password. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T21:07:57.000000Z"}, {"uuid": "90522f0c-6f65-4391-8d68-e074c0e032c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46740", "type": "seen", "source": "https://t.me/cvedetector/25099", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46740 - Adobe Acrobat Account Name Manipulation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46740 \nPublished : May 12, 2025, 5:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : An authenticated user without user administrative permissions could  change the administrator Account Name. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T21:08:03.000000Z"}, {"uuid": "abaf7e2b-0554-45d8-96db-412d6857b3f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "https://bsky.app/profile/bitnami.bsky.social/post/3ltjfsxap422n", "content": "", "creation_timestamp": "2025-07-09T08:34:28.148744Z"}, {"uuid": "ebf43075-44c6-483f-b8bb-0080a74dd884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "https://bsky.app/profile/golang.org/post/3lthuofsd222w", "content": "", "creation_timestamp": "2025-07-08T17:55:04.586077Z"}, {"uuid": "79ce7ae3-d726-4c4c-a0be-4ecb6bb34545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lv5freuxxj26", "content": "", "creation_timestamp": "2025-07-30T00:52:00.596768Z"}, {"uuid": "a846029d-a080-49f0-8e59-5822be0e7963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "MISP/853ff921-86fb-463b-bc2a-2860bf336b81", "content": "", "creation_timestamp": "2025-08-06T01:04:19.000000Z"}, {"uuid": "ef0643f0-9b61-4a65-be2a-a25dc0eaae54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lwlyv3s6rs2w", "content": "", "creation_timestamp": "2025-08-17T13:36:37.359507Z"}, {"uuid": "0aea0057-5987-4851-ac74-7fe1509c00d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lwp6jf5lxs2k", "content": "", "creation_timestamp": "2025-08-18T19:55:27.065643Z"}, {"uuid": "e9f85558-ad4b-41f7-b177-ff5bdc54a9d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "MISP/853ff921-86fb-463b-bc2a-2860bf336b81", "content": "", "creation_timestamp": "2025-08-21T10:03:53.000000Z"}, {"uuid": "4729659a-efbc-4a17-b763-72ca3dd7c137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ltic6i2wne2z", "content": "", "creation_timestamp": "2025-07-08T21:56:39.001802Z"}, {"uuid": "ce42b826-a51a-49cc-ba30-02e4f3d628ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q3/14", "content": "", "creation_timestamp": "2025-07-08T19:35:54.000000Z"}, {"uuid": "98ac08bb-840e-41da-91d1-cef7063a543d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46744", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2figlh2h", "content": "", "creation_timestamp": "2025-05-12T18:47:59.061222Z"}, {"uuid": "fef29a96-151b-4c92-a6eb-b81432ab11ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46741", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15980", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46741\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A suspended or recently logged-out user could continue to interact with Blueframe until the time-out period occurred.\n\ud83d\udccf Published: 2025-05-12T16:09:53.581Z\n\ud83d\udccf Modified: 2025-05-12T17:55:24.025Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:29:22.000000Z"}, {"uuid": "6bf1a7fd-87f4-454c-ab24-9c15281209be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46745", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15997", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46745\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: An authenticated user without user-management permissions could view other users' account information.\n\ud83d\udccf Published: 2025-05-12T16:11:08.840Z\n\ud83d\udccf Modified: 2025-05-12T17:51:41.630Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:31:47.000000Z"}, {"uuid": "b22f8089-227f-4976-b11c-57ac6fa37fd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46748", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15942", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46748\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: An authenticated user attempting to change their password could do so without using the current password.\n\ud83d\udccf Published: 2025-05-12T16:12:07.018Z\n\ud83d\udccf Modified: 2025-05-12T16:12:07.018Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:24:06.000000Z"}, {"uuid": "240d70ba-5c60-49d8-87cf-6889eb6231c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46749", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15941", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46749\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: An authenticated user could submit scripting to fields that lack proper input and output sanitization leading to subsequent client-side script execution.\n\ud83d\udccf Published: 2025-05-12T16:12:25.269Z\n\ud83d\udccf Modified: 2025-05-12T16:12:25.269Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:24:05.000000Z"}, {"uuid": "7827e1b6-f38a-4a61-bc64-96a3cbc51657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46744", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15996", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46744\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: An authenticated administrator could modify the Created By username for a user account\n\ud83d\udccf Published: 2025-05-12T16:10:29.888Z\n\ud83d\udccf Modified: 2025-05-12T17:53:00.590Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:31:43.000000Z"}, {"uuid": "ce077d91-6c74-4f36-81f6-c84aaeb52add", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46742", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15995", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46742\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Users who were required to change their password could still access system information before changing their password\n\ud83d\udccf Published: 2025-05-12T16:10:09.527Z\n\ud83d\udccf Modified: 2025-05-12T17:53:46.879Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:31:42.000000Z"}, {"uuid": "108a8888-2d03-4c7b-bbb4-b00143432cf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46741", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15994", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46741\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A suspended or recently logged-out user could continue to interact with Blueframe until the time-out period occurred.\n\ud83d\udccf Published: 2025-05-12T16:09:53.581Z\n\ud83d\udccf Modified: 2025-05-12T17:55:24.025Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:31:41.000000Z"}, {"uuid": "b14429b7-c384-45d9-ae78-1891d1ae3b8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46740", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15993", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46740\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An authenticated user without user administrative permissions could  change the administrator Account Name.\n\ud83d\udccf Published: 2025-05-12T16:09:22.036Z\n\ud83d\udccf Modified: 2025-05-12T17:56:25.876Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:31:40.000000Z"}, {"uuid": "8a7c64cb-2ffb-4d3c-9c8f-4b4f6e85b067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46745", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15983", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46745\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: An authenticated user without user-management permissions could view other users' account information.\n\ud83d\udccf Published: 2025-05-12T16:11:08.840Z\n\ud83d\udccf Modified: 2025-05-12T17:51:41.630Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:29:28.000000Z"}, {"uuid": "a189c80b-d494-4eae-8531-7f4a3e4ab1b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46744", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15982", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46744\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: An authenticated administrator could modify the Created By username for a user account\n\ud83d\udccf Published: 2025-05-12T16:10:29.888Z\n\ud83d\udccf Modified: 2025-05-12T17:53:00.590Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:29:24.000000Z"}, {"uuid": "f6e6f062-4a0b-4be0-9c4d-b711acc81b98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3ltir3535up2c", "content": "", "creation_timestamp": "2025-07-09T02:23:13.543882Z"}, {"uuid": "a545a68e-1764-4aeb-a0b6-94299ed92042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46740", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114496055573801981", "content": "", "creation_timestamp": "2025-05-12T17:32:41.279884Z"}, {"uuid": "6d51416b-3899-4b6b-855c-f585cd37782f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46741", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114496055573801981", "content": "", "creation_timestamp": "2025-05-12T17:32:41.374563Z"}, {"uuid": "fc40488c-65e3-42f5-8632-024399a00e08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46742", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114496055573801981", "content": "", "creation_timestamp": "2025-05-12T17:32:41.473783Z"}, {"uuid": "06cc8bb5-ce9e-4c28-8c74-689efb122b7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46743", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114496055573801981", "content": "", "creation_timestamp": "2025-05-12T17:32:41.566073Z"}, {"uuid": "e522e9e6-ab6f-464a-9bbf-5dbd0039941c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46744", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114496055573801981", "content": "", "creation_timestamp": "2025-05-12T17:32:41.657830Z"}, {"uuid": "caf5b33c-7eb4-4e77-a750-19c61e468e6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46745", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114496055573801981", "content": "", "creation_timestamp": "2025-05-12T17:32:41.750276Z"}, {"uuid": "a67b6ebd-3631-41fb-a958-0b28778f08f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46746", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114496055573801981", "content": "", "creation_timestamp": "2025-05-12T17:32:41.839465Z"}, {"uuid": "fe66c6ca-a95d-4c39-a015-b2fc3c369942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46747", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114496055573801981", "content": "", "creation_timestamp": "2025-05-12T17:32:41.929439Z"}, {"uuid": "67ff7fa9-a30d-4301-b9e8-606471f9c1ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46748", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114496055573801981", "content": "", "creation_timestamp": "2025-05-12T17:32:42.020744Z"}, {"uuid": "d9936180-d958-4fd0-8de6-89df5640cfbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46749", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114496055573801981", "content": "", "creation_timestamp": "2025-05-12T17:32:42.109735Z"}, {"uuid": "71991609-e54c-4a52-b173-df044fb79edd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46740", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2dswgg2p", "content": "", "creation_timestamp": "2025-05-12T18:47:49.504970Z"}, {"uuid": "d36db141-013e-446c-94f8-18c8f66e8b9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46745", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2e4vby2j", "content": "", "creation_timestamp": "2025-05-12T18:47:51.285619Z"}, {"uuid": "aa73bf3b-3f3b-4827-817f-d09a3bd8808d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46749", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2eac4m22", "content": "", "creation_timestamp": "2025-05-12T18:47:51.889848Z"}, {"uuid": "15ecca8b-47d5-428b-a3e1-90761ebb1bee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46743", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2eh2ii2e", "content": "", "creation_timestamp": "2025-05-12T18:47:53.105315Z"}, {"uuid": "bcdbe183-fd8c-4684-9fa1-6783c3d8fe9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46746", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2ekdtw2o", "content": "", "creation_timestamp": "2025-05-12T18:47:53.690672Z"}, {"uuid": "0cc90c24-e8a7-4867-be9f-aff225933434", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46747", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2enost24", "content": "", "creation_timestamp": "2025-05-12T18:47:54.300501Z"}, {"uuid": "49827de4-6813-42fc-adcb-24103d8705ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46742", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2eqwxt2w", "content": "", "creation_timestamp": "2025-05-12T18:47:54.873760Z"}, {"uuid": "5d52250d-9e38-4743-a0a5-76d344d5847e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46748", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2eufzx2p", "content": "", "creation_timestamp": "2025-05-12T18:47:55.480180Z"}, {"uuid": "747b740b-af17-43e9-b640-54669bea5a80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46741", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2f2wwx2h", "content": "", "creation_timestamp": "2025-05-12T18:47:56.709134Z"}, {"uuid": "bed951b4-5004-4122-86b1-083d6cf35505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4674", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "b930fb28-1991-4fdb-a1f3-6446dad52ddc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46740", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15968", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46740\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An authenticated user without user administrative permissions could  change the administrator Account Name.\n\ud83d\udccf Published: 2025-05-12T16:09:22.036Z\n\ud83d\udccf Modified: 2025-05-12T16:09:22.036Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:26:47.000000Z"}, {"uuid": "861df7f7-cf92-41c1-ab42-d66a660ef7fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46741", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15967", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46741\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A suspended or recently logged-out user could continue to interact with Blueframe until the time-out period occurred.\n\ud83d\udccf Published: 2025-05-12T16:09:53.581Z\n\ud83d\udccf Modified: 2025-05-12T16:09:53.581Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:26:43.000000Z"}, {"uuid": "f61ee1ef-af60-497b-989b-2ef82dd380d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46743", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46743\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L)\n\ud83d\udd39 Description: An authenticated user's token could be used by another source after the user had logged out prior to the token expiring.\n\ud83d\udccf Published: 2025-05-12T16:14:05.722Z\n\ud83d\udccf Modified: 2025-05-12T16:14:05.722Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:24:03.000000Z"}, {"uuid": "382dbcc1-73ac-41e5-8434-9ae1095d394d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46742", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15947", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46742\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Users who were required to change their password could still access system information before changing their password\n\ud83d\udccf Published: 2025-05-12T16:10:09.527Z\n\ud83d\udccf Modified: 2025-05-12T16:10:09.527Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:24:11.000000Z"}, {"uuid": "3173c14f-2281-43ac-b271-1ed6fa03306e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46744", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15946", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46744\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: An authenticated administrator could modify the Created By username for a user account\n\ud83d\udccf Published: 2025-05-12T16:10:29.888Z\n\ud83d\udccf Modified: 2025-05-12T16:10:29.888Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:24:10.000000Z"}, {"uuid": "cf479e7c-9697-46cf-8cc0-6e881fe47c30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46745", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15945", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46745\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: An authenticated user without user-management permissions could view other users' account information.\n\ud83d\udccf Published: 2025-05-12T16:11:08.840Z\n\ud83d\udccf Modified: 2025-05-12T16:11:08.840Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:24:09.000000Z"}, {"uuid": "06af0687-514b-4e72-b1f4-17dffc3f5137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46748", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15961", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46748\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: An authenticated user attempting to change their password could do so without using the current password.\n\ud83d\udccf Published: 2025-05-12T16:12:07.018Z\n\ud83d\udccf Modified: 2025-05-12T16:12:07.018Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:26:34.000000Z"}, {"uuid": "39425ab4-b13c-41c8-b7a5-3b6664c46fb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46749", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15960", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46749\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: An authenticated user could submit scripting to fields that lack proper input and output sanitization leading to subsequent client-side script execution.\n\ud83d\udccf Published: 2025-05-12T16:12:25.269Z\n\ud83d\udccf Modified: 2025-05-12T16:12:25.269Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:26:33.000000Z"}, {"uuid": "aa6f23f9-b3a4-4226-8883-9d07271c1978", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46740", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15979", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46740\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An authenticated user without user administrative permissions could  change the administrator Account Name.\n\ud83d\udccf Published: 2025-05-12T16:09:22.036Z\n\ud83d\udccf Modified: 2025-05-12T17:56:25.876Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:29:21.000000Z"}, {"uuid": "e7658644-4764-451f-8ec4-a4afebc7ca17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46746", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16015", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46746\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: An administrator could discover another account's credentials.\n\ud83d\udccf Published: 2025-05-12T16:11:33.768Z\n\ud83d\udccf Modified: 2025-05-12T17:50:17.015Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:38:08.000000Z"}, {"uuid": "aaaf4b02-450b-4de3-8cb0-a3eb83241bfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46745", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16013", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46745\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: An authenticated user without user-management permissions could view other users' account information.\n\ud83d\udccf Published: 2025-05-12T16:11:08.840Z\n\ud83d\udccf Modified: 2025-05-12T17:51:41.630Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:38:05.000000Z"}, {"uuid": "79e25de2-a740-48a5-8528-3c66f2eec9c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46744", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16012", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46744\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: An authenticated administrator could modify the Created By username for a user account\n\ud83d\udccf Published: 2025-05-12T16:10:29.888Z\n\ud83d\udccf Modified: 2025-05-12T17:53:00.590Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:38:04.000000Z"}, {"uuid": "9d697f31-ba9b-4495-bbd9-516889238349", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46742", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16011", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46742\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Users who were required to change their password could still access system information before changing their password\n\ud83d\udccf Published: 2025-05-12T16:10:09.527Z\n\ud83d\udccf Modified: 2025-05-12T17:53:46.879Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:38:03.000000Z"}, {"uuid": "eddf1727-8dcf-4ca6-86ec-9f8bc6d3056c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46743", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15958", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46743\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L)\n\ud83d\udd39 Description: An authenticated user's token could be used by another source after the user had logged out prior to the token expiring.\n\ud83d\udccf Published: 2025-05-12T16:14:05.722Z\n\ud83d\udccf Modified: 2025-05-12T16:14:05.722Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:26:31.000000Z"}, {"uuid": "264696ae-80a9-419f-a0fe-c2fc1c4ec28f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46742", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15966", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46742\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Users who were required to change their password could still access system information before changing their password\n\ud83d\udccf Published: 2025-05-12T16:10:09.527Z\n\ud83d\udccf Modified: 2025-05-12T16:10:09.527Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:26:42.000000Z"}, {"uuid": "4fc2bdcf-417a-4be3-92e7-bc27630cc06b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46744", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15965", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46744\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: An authenticated administrator could modify the Created By username for a user account\n\ud83d\udccf Published: 2025-05-12T16:10:29.888Z\n\ud83d\udccf Modified: 2025-05-12T16:10:29.888Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:26:41.000000Z"}, {"uuid": "c682683b-c21d-4b28-a354-137ca2468442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46745", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15964", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46745\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: An authenticated user without user-management permissions could view other users' account information.\n\ud83d\udccf Published: 2025-05-12T16:11:08.840Z\n\ud83d\udccf Modified: 2025-05-12T16:11:08.840Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:26:40.000000Z"}, {"uuid": "01e1d1f7-0ef9-4496-a492-58712cfd6a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46746", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15963", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46746\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: An administrator could discover another account's credentials.\n\ud83d\udccf Published: 2025-05-12T16:11:33.768Z\n\ud83d\udccf Modified: 2025-05-12T16:11:33.768Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:26:39.000000Z"}, {"uuid": "ddad4209-6e22-42a0-9640-c9a6c62d2311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46747", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15962", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46747\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: An authenticated user without user-management permissions could identify other user accounts.\n\ud83d\udccf Published: 2025-05-12T16:11:52.359Z\n\ud83d\udccf Modified: 2025-05-12T16:11:52.359Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:26:35.000000Z"}, {"uuid": "7166cd50-e771-460f-8a22-ab6e066baf11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46746", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15985", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46746\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: An administrator could discover another account's credentials.\n\ud83d\udccf Published: 2025-05-12T16:11:33.768Z\n\ud83d\udccf Modified: 2025-05-12T17:50:17.015Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:29:30.000000Z"}, {"uuid": "087a67a8-19b4-42f2-b268-3396d0e9f43c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46746", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15944", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46746\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: An administrator could discover another account's credentials.\n\ud83d\udccf Published: 2025-05-12T16:11:33.768Z\n\ud83d\udccf Modified: 2025-05-12T16:11:33.768Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:24:08.000000Z"}, {"uuid": "a2b28faa-2f95-42ae-b015-8a29349fdc61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46747", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15943", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46747\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: An authenticated user without user-management permissions could identify other user accounts.\n\ud83d\udccf Published: 2025-05-12T16:11:52.359Z\n\ud83d\udccf Modified: 2025-05-12T16:11:52.359Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:24:07.000000Z"}, {"uuid": "62664dd1-56e7-4634-98a6-c826ec9658f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46740", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15949", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46740\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An authenticated user without user administrative permissions could  change the administrator Account Name.\n\ud83d\udccf Published: 2025-05-12T16:09:22.036Z\n\ud83d\udccf Modified: 2025-05-12T16:09:22.036Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:24:13.000000Z"}, {"uuid": "eee37b42-ad2f-4484-9acb-1878912e7c43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46741", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15948", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46741\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A suspended or recently logged-out user could continue to interact with Blueframe until the time-out period occurred.\n\ud83d\udccf Published: 2025-05-12T16:09:53.581Z\n\ud83d\udccf Modified: 2025-05-12T16:09:53.581Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:24:12.000000Z"}, {"uuid": "9bfee383-2c37-4c29-a13b-536e136a9885", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46742", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15981", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46742\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Users who were required to change their password could still access system information before changing their password\n\ud83d\udccf Published: 2025-05-12T16:10:09.527Z\n\ud83d\udccf Modified: 2025-05-12T17:53:46.879Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:29:23.000000Z"}, {"uuid": "c9df439f-7a92-4d24-8795-8fe6cc2185b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46746", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15999", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46746\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: An administrator could discover another account's credentials.\n\ud83d\udccf Published: 2025-05-12T16:11:33.768Z\n\ud83d\udccf Modified: 2025-05-12T17:50:17.015Z\n\ud83d\udd17 References:\n1. https://selinc.com/products/software/latest-software-versions/", "creation_timestamp": "2025-05-12T18:31:50.000000Z"}]}