{"vulnerability": "CVE-2025-5256", "sightings": [{"uuid": "c603ec9d-3039-4320-8363-dc3e8b33552f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m4y7nkxdan2o", "content": "", "creation_timestamp": "2025-11-06T18:40:44.829843Z"}, {"uuid": "a355eb3c-e72e-415c-bcd1-00fea4288ea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/155", "content": "", "creation_timestamp": "2025-11-06T16:48:32.000000Z"}, {"uuid": "de2d5512-739a-48d2-945c-28d9856bcecd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3m4yeeozlcj25", "content": "", "creation_timestamp": "2025-11-06T20:05:15.688512Z"}, {"uuid": "28e3f614-a233-4909-986a-d44982d459d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3m54cfnvlwc25", "content": "", "creation_timestamp": "2025-11-08T09:40:40.348890Z"}, {"uuid": "99e49cf0-af10-4610-9c83-5b235525f8f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3m5bld6w7x6l2", "content": "", "creation_timestamp": "2025-11-10T12:04:59.664051Z"}, {"uuid": "79b0786e-390e-4cca-a481-4667374cf5a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m4yhqwql4lw2", "content": "", "creation_timestamp": "2025-11-06T21:05:57.414476Z"}, {"uuid": "c1c7733b-3faf-4cd0-8750-6eacae1fc060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/alexpulver.bsky.social/post/3m7kyzwfzsm2e", "content": "", "creation_timestamp": "2025-12-09T16:53:21.741258Z"}, {"uuid": "db1dfec4-e749-49bd-9cbd-7470ec841582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3majevgyzy523", "content": "", "creation_timestamp": "2025-12-21T18:45:28.501876Z"}, {"uuid": "20db656b-42d5-4c66-9105-8fc00156f0b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://gist.github.com/calenwalshe/e60488e3998fd3d2e527c4af1317edbc", "content": "", "creation_timestamp": "2026-04-15T04:32:14.000000Z"}, {"uuid": "f8c49973-2f19-48c3-b3f4-117d1eebdac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "4aa118a0-db16-4d49-abe2-bf920e6d3f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52560", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19300", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52560\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.46, Kanboard allows password reset emails to be sent with URLs derived from the unvalidated Host header when the application_url configuration is unset (default behavior). This allows an attacker to craft a malicious password reset link that leaks the token to an attacker-controlled domain. If a victim (including an administrator) clicks the poisoned link, their account can be taken over. This affects all users who initiate a password reset while application_url is not set. This issue has been patched in version 1.2.46.\n\ud83d\udccf Published: 2025-06-24T02:56:26.589Z\n\ud83d\udccf Modified: 2025-06-24T02:56:26.589Z\n\ud83d\udd17 References:\n1. https://github.com/kanboard/kanboard/security/advisories/GHSA-2ch5-gqjm-8p92\n2. https://github.com/kanboard/kanboard/commit/bca2bd7ab95e7990e358fd35a7daf51a9c16aa75", "creation_timestamp": "2025-06-24T03:48:15.000000Z"}, {"uuid": "4819440a-b8fb-4d26-9a4c-37b8f4f60df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5256", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgaytbtac2o", "content": "", "creation_timestamp": "2025-05-30T22:14:41.517904Z"}, {"uuid": "b3cad447-1f4c-40a2-a9e3-bdb8b4bfea1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52566", "type": "seen", "source": "https://bsky.app/profile/LLMs.activitypub.awakari.com.ap.brid.gy/post/3lsdfjweq26x2", "content": "", "creation_timestamp": "2025-06-24T05:48:22.814665Z"}, {"uuid": "0b44d1c4-eb2d-4229-b065-2ffecc20f1cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52568", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsdhihtfma2m", "content": "", "creation_timestamp": "2025-06-24T06:23:13.011449Z"}, {"uuid": "75aa0d66-7d11-4e31-bfd5-25db29a43a00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52562", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lse63vptws2k", "content": "", "creation_timestamp": "2025-06-24T13:07:48.356696Z"}, {"uuid": "61b1551d-184d-4de8-b123-9bb29e614cae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4ymhfx7jx2q", "content": "", "creation_timestamp": "2025-11-06T22:29:56.795926Z"}, {"uuid": "ec24a93b-d32c-481d-bc7e-6c50f57b92fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/138", "content": "", "creation_timestamp": "2025-11-05T08:57:06.000000Z"}, {"uuid": "a01eb660-108a-4328-a360-0af6f1ee3da8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://mstdn.social/users/jschauma/statuses/115497683553103053", "content": "", "creation_timestamp": "2025-11-05T14:59:52.269634Z"}, {"uuid": "f3a76ec6-3657-46b8-bd32-0c39321f0dd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3m54r4q6bn225", "content": "", "creation_timestamp": "2025-11-08T14:04:06.686740Z"}, {"uuid": "f967fb03-bc7d-444e-a000-1c8d4a90f2a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/lobsters-feed.bsky.social/post/3m4vk4i6c3e2n", "content": "", "creation_timestamp": "2025-11-05T17:10:04.574283Z"}, {"uuid": "81d1cb49-57de-484d-a4c7-7dee21b96a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3m4w4idjgus22", "content": "", "creation_timestamp": "2025-11-05T22:38:49.385862Z"}, {"uuid": "f351ca9e-3f88-4c95-8721-d0b12717a5d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/115508745643459318", "content": "", "creation_timestamp": "2025-11-07T13:53:06.915712Z"}, {"uuid": "26e169b9-b6d7-4429-8b0c-2c4231d490be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3m57n3r3lqk2m", "content": "", "creation_timestamp": "2025-11-09T17:29:58.775419Z"}, {"uuid": "7c3f4888-0816-4aba-8477-9c0c842fa721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m5akqvnh3k2o", "content": "", "creation_timestamp": "2025-11-10T02:20:45.856339Z"}, {"uuid": "81d84a97-5a30-456a-b901-163d0493796b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/161", "content": "", "creation_timestamp": "2025-11-07T16:16:11.000000Z"}, {"uuid": "67589e43-93fd-42a7-acb9-4eed647c4405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://gist.github.com/EbonJaeger/f7d172d49605e41a6829980152c0f6d1", "content": "", "creation_timestamp": "2025-11-07T20:31:33.000000Z"}, {"uuid": "c384bc95-d6b9-4344-b4be-afdf8dcf1c3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6by3k24", "content": "", "creation_timestamp": "2025-11-12T17:17:33.114546Z"}, {"uuid": "2fcd7c38-83a2-4de8-8ef7-7c97fe1388b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6cfr224", "content": "", "creation_timestamp": "2025-11-12T17:17:34.989200Z"}, {"uuid": "8da3c384-2a5b-482a-b5d6-7121b8b8dea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/Kubernetes.activitypub.awakari.com.ap.brid.gy/post/3m53huj3yzn52", "content": "", "creation_timestamp": "2025-11-08T01:45:49.269942Z"}, {"uuid": "800236a0-66ea-4f67-89c5-c742996d0d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/unraid.net/post/3mkocnold3a2s", "content": "", "creation_timestamp": "2026-04-30T00:00:36.012074Z"}, {"uuid": "182789a8-2822-4df6-863c-ceea50b352c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://t.me/GithubRedTeam/59132", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aDEPRECATED See CVE-2025-31133, CVE-2025-52565, CVE-2025-52881\nURL\uff1ahttps://github.com/omne-earth/arca\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-10T15:28:52.000000Z"}, {"uuid": "84d441a2-69f2-48ea-8a68-3d22a9e578a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52568", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19299", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52568\n\ud83d\udd25 CVSS Score: 8.8 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: NeKernal is a free and open-source operating system stack. Prior to version 0.0.3, there are several memory safety issues that can lead to memory corruption, disk image corruption, denial of service, and potential code execution. These issues stem from unchecked memory operations, unsafe typecasting, and improper input validation. This issue has been patched in version 0.0.3.\n\ud83d\udccf Published: 2025-06-24T03:06:12.471Z\n\ud83d\udccf Modified: 2025-06-24T03:06:12.471Z\n\ud83d\udd17 References:\n1. https://github.com/nekernel-org/nekernel/security/advisories/GHSA-cmp2-5f6g-mw34\n2. https://github.com/nekernel-org/nekernel/pull/35\n3. https://github.com/nekernel-org/nekernel/pull/36\n4. https://github.com/nekernel-org/nekernel/commit/6506875ad0ab210b82a5c4ce227bf851508de17d\n5. https://github.com/nekernel-org/nekernel/commit/6511afbf405c31513bc88ab06bca58218610a994", "creation_timestamp": "2025-06-24T03:48:14.000000Z"}, {"uuid": "96efd689-b7b6-40a8-9ebd-772805dde48b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52562", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19385", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52562\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Convoy is a KVM server management panel for hosting businesses. In versions 3.9.0-rc3 to before 4.4.1, there is a directory traversal vulnerability in the LocaleController component of Performave Convoy. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious locale and namespace parameters. This allows the attacker to include and execute arbitrary PHP files on the server. This issue has been patched in version 4.4.1. A temporary workaround involves implementing strict Web Application Firewall (WAF) rules to incoming requests targeting the vulnerable endpoints.\n\ud83d\udccf Published: 2025-06-23T20:48:17.456Z\n\ud83d\udccf Modified: 2025-06-24T17:20:21.802Z\n\ud83d\udd17 References:\n1. https://github.com/ConvoyPanel/panel/security/advisories/GHSA-43g3-qpwq-hfgg\n2. https://github.com/ConvoyPanel/panel/commit/f8d6202f3e4912b65dbd9f80ba625576944ab36c", "creation_timestamp": "2025-06-24T17:49:01.000000Z"}, {"uuid": "80311a6f-3d83-481a-8480-1c23322e1884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52569", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19501", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52569\n\ud83d\udd25 CVSS Score: 6.6 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U)\n\ud83d\udd39 Description: GitForge.jl is a unified interface for interacting with Git \"forges.\" Versions prior to 5.9.1 lack input validation of input validation for user-provided values in certain functions. In the `GitHub.repo()` function, the user can provide any string for the `repo_name` field. These inputs are not validated or safely encoded and are sent directly to the server. This means a user can add path traversal patterns like `../` in the input to access any other endpoints on `api.github.com` that were not intended. Users should upgrade immediately to v5.9.1 or later to receive a patch. All prior versions are vulnerable. No known workarounds are available.\n\ud83d\udccf Published: 2025-06-25T16:41:46.303Z\n\ud83d\udccf Modified: 2025-06-25T16:41:46.303Z\n\ud83d\udd17 References:\n1. https://github.com/JuliaWeb/GitHub.jl/security/advisories/GHSA-jg9p-c3wh-q83x\n2. https://github.com/JuliaWeb/GitHub.jl/pull/224", "creation_timestamp": "2025-06-25T18:06:32.000000Z"}, {"uuid": "a18102ef-89a1-4f75-965c-f2b138559f7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52562", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114773857240569021", "content": "", "creation_timestamp": "2025-06-30T19:01:18.231305Z"}, {"uuid": "9d9dae76-00b8-4083-acb6-05d42269dfa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52562", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lscubowbrb2m", "content": "", "creation_timestamp": "2025-06-24T00:39:24.091720Z"}, {"uuid": "6d35b2da-2355-4754-aa46-8204789a90b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52561", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lscutlsnan2s", "content": "", "creation_timestamp": "2025-06-24T00:49:24.852659Z"}, {"uuid": "21402667-0306-488a-8d50-d913c601ca82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52562", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lsdlj6m5mf2s", "content": "", "creation_timestamp": "2025-06-24T07:35:12.026767Z"}, {"uuid": "89dde89a-1409-44cb-b16b-f67d31991f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3m5jzkgfbhh2b", "content": "", "creation_timestamp": "2025-11-13T20:39:32.447724Z"}, {"uuid": "c8094601-6fc5-408e-a72f-3710c2125a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/Kubernetes.activitypub.awakari.com.ap.brid.gy/post/3m4vmtpvavbw2", "content": "", "creation_timestamp": "2025-11-05T17:58:55.214578Z"}, {"uuid": "a82e83b7-29c2-4a88-a0e8-39cf68e0cedc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3m5rvwzdn3c2o", "content": "", "creation_timestamp": "2025-11-16T23:56:21.360880Z"}, {"uuid": "6985eeda-7452-463f-a3e4-ff8b7b026d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3m4wkasrf2k2t", "content": "", "creation_timestamp": "2025-11-06T02:45:09.272754Z"}, {"uuid": "24c3b948-ea1f-4e36-9ad3-e20b71312dd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6cctc24", "content": "", "creation_timestamp": "2025-11-12T17:17:34.383807Z"}, {"uuid": "84979c89-2724-40d2-9566-c3c271996dfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://gist.github.com/denhamparry/5ab60bf197097628223cf296dd65b22d", "content": "", "creation_timestamp": "2026-04-13T16:47:38.000000Z"}, {"uuid": "223facae-8c13-4879-a90a-964a3c9432af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://t.me/information_security_channel/54431", "content": "Runc Vulnerabilities Can Be Exploited to Escape Containers\nhttps://www.securityweek.com/runc-vulnerabilities-can-be-exploited-to-escape-containers/\n\nThe flaws tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881 have been patched.\nThe post Runc Vulnerabilities Can Be Exploited to Escape Containers (https://www.securityweek.com/runc-vulnerabilities-can-be-exploited-to-escape-containers/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2025-11-10T16:54:08.000000Z"}, {"uuid": "47f05669-921c-4936-a312-8366931e5b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52566", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19297", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52566\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: llama.cpp is an inference of several LLM models in C/C++. Prior to version b5721, there is a signed vs. unsigned integer overflow in llama.cpp's tokenizer implementation (llama_vocab::tokenize) (src/llama-vocab.cpp:3036) resulting in unintended behavior in tokens copying size comparison. Allowing heap-overflowing llama.cpp inferencing engine with carefully manipulated text input during tokenization process. This issue has been patched in version b5721.\n\ud83d\udccf Published: 2025-06-24T03:21:19.009Z\n\ud83d\udccf Modified: 2025-06-24T03:21:19.009Z\n\ud83d\udd17 References:\n1. https://github.com/ggml-org/llama.cpp/security/advisories/GHSA-7rxv-5jhh-j6xx\n2. https://github.com/ggml-org/llama.cpp/commit/dd6e6d0b6a4bbe3ebfc931d1eb14db2f2b1d70af", "creation_timestamp": "2025-06-24T03:48:12.000000Z"}, {"uuid": "e493eab2-41d6-44b1-a8b7-e66e2bebd78c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52566", "type": "published-proof-of-concept", "source": "Telegram/xYRYp9RnMrs6asvPZWHHQ0msOulfM9P8474m_eOJ4G31k98", "content": "", "creation_timestamp": "2025-06-24T04:32:30.000000Z"}, {"uuid": "7d1d7290-1b31-4598-b910-d56506392692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52568", "type": "published-proof-of-concept", "source": "Telegram/xYRYp9RnMrs6asvPZWHHQ0msOulfM9P8474m_eOJ4G31k98", "content": "", "creation_timestamp": "2025-06-24T04:32:30.000000Z"}, {"uuid": "8d41eb1a-acf2-4492-bfd1-50693712cd3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52560", "type": "seen", "source": "Telegram/61p3TvgIcQeITUHd25WC7uXKnalG822tf2zquntb02gfO4o", "content": "", "creation_timestamp": "2025-06-24T03:34:31.000000Z"}, {"uuid": "aa0d69f7-4a38-4cd5-8268-d38c292993c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52562", "type": "seen", "source": "Telegram/3KuJxnL-u9Q1MXHm7LBK-vI_Sfp2Lp9FG_xNigrPHhkXm0g", "content": "", "creation_timestamp": "2025-06-23T21:31:05.000000Z"}, {"uuid": "aa741332-ff8b-4a8c-a7e8-79d150edf208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5256", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqat6oa4b3p2", "content": "", "creation_timestamp": "2025-05-28T18:24:13.589101Z"}, {"uuid": "a691ec7a-c08f-444a-bc71-ca073ae73a1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52560", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsdexwtem62a", "content": "", "creation_timestamp": "2025-06-24T05:38:10.449504Z"}, {"uuid": "230c86b9-ce26-4255-bed0-7b11081bd5ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52566", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsdfavbhov2v", "content": "", "creation_timestamp": "2025-06-24T05:43:11.161463Z"}, {"uuid": "98725cd0-1945-433d-b544-1d45bf10fb66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52566", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lsdfjrsfcn2n", "content": "", "creation_timestamp": "2025-06-24T05:48:09.319149Z"}, {"uuid": "1d2b6817-ce83-4cb8-8653-225bf93c85a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52568", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114737562508772975", "content": "", "creation_timestamp": "2025-06-24T09:11:04.240144Z"}, {"uuid": "207dc442-8e89-4c58-a34e-5a6ede303e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52562", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lse64by6xjg2", "content": "", "creation_timestamp": "2025-06-24T13:08:18.110267Z"}, {"uuid": "a08e1545-9c95-4556-80dd-c109ce61841b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52562", "type": "seen", "source": "https://bsky.app/profile/paxioncyber.bsky.social/post/3lsebafaeg22t", "content": "", "creation_timestamp": "2025-06-24T14:04:13.371374Z"}, {"uuid": "8e15d3de-6c04-4739-87f1-a53a5a5e5234", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m4uu364gd32h", "content": "", "creation_timestamp": "2025-11-05T10:35:36.858031Z"}, {"uuid": "b79577fc-9adf-4b24-b098-b836344bc11a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-52565", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m4yzvkz3ung2", "content": "", "creation_timestamp": "2025-11-07T02:30:48.573522Z"}, {"uuid": "d66af97a-1a6e-4de3-b804-a4d525219cf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/crowdcyber.bsky.social/post/3m4zhddekwl2v", "content": "", "creation_timestamp": "2025-11-07T06:30:51.380750Z"}, {"uuid": "5c1575ef-0d01-4132-ad78-f242fc8c83ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m4zlknnvfo2s", "content": "", "creation_timestamp": "2025-11-07T07:46:31.882863Z"}, {"uuid": "9d6e9e5b-c97e-463f-8346-ba163e5fab5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/topickapp.bsky.social/post/3m5frftmbca22", "content": "", "creation_timestamp": "2025-11-12T04:03:09.200024Z"}, {"uuid": "54bd6491-75da-416b-b52f-1ca084fdd52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/technews4869.bsky.social/post/3m5kru4n4r52k", "content": "", "creation_timestamp": "2025-11-14T03:54:27.410211Z"}, {"uuid": "a91ff3d9-6eb3-4a5a-b96a-3660e1832969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3m5dhjbsrlq2m", "content": "", "creation_timestamp": "2025-11-11T06:00:47.972530Z"}, {"uuid": "8ac1c91e-2d24-4681-859d-d3324f2a0acf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/115509020963066977", "content": "", "creation_timestamp": "2025-11-07T15:03:08.504005Z"}, {"uuid": "33f768b2-db22-4d52-ae20-97529989eb89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m52gkem42z2y", "content": "", "creation_timestamp": "2025-11-07T15:49:32.915211Z"}, {"uuid": "e017a388-1ecc-4040-aa8f-e1ca2fcd6b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/115530729480225730", "content": "", "creation_timestamp": "2025-11-11T11:03:52.728645Z"}, {"uuid": "ff6a70f2-b9da-437f-a8ee-d6bd501b2111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/tech-trending.bsky.social/post/3m5ehpotboz2n", "content": "", "creation_timestamp": "2025-11-11T15:37:03.391376Z"}, {"uuid": "4050700f-fceb-46e3-96c2-806d6062cecd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6azss24", "content": "", "creation_timestamp": "2025-11-12T17:17:32.489879Z"}, {"uuid": "d5805a39-52c5-4efd-90d9-d3cce97fb26f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6c7vk24", "content": "", "creation_timestamp": "2025-11-12T17:17:33.779003Z"}, {"uuid": "c109e321-48cb-40bc-847a-b906105e744a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52565", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6cknc24", "content": "", "creation_timestamp": "2025-11-12T17:17:35.627910Z"}]}