{"vulnerability": "cve-2025-2215", "sightings": [{"uuid": "1c98567c-ea51-4715-a114-325ee5ee8ffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22153", "type": "seen", "source": "https://t.me/cvedetector/16216", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22153 - \"Bypass Python Sandboxing in RestrictedPython via Type Confusion\"\", \n  \"Content\": \"CVE ID : CVE-2025-22153 \nPublished : Jan. 23, 2025, 6:15 p.m. | 42\u00a0minutes ago \nDescription : RestrictedPython is a tool that helps to define a subset of the Python language which allows to provide a program input into a trusted environment. Via a type confusion bug in versions of the CPython interpreter starting in 3.11 and prior to 3.13.2 when using `try/except*`, RestrictedPython starting in version 6.0 and prior to version 8.0 could be bypassed. The issue is patched in version 8.0 of RestrictedPython by removing support for `try/except*` clauses. No known workarounds are available. \nSeverity: 7.9 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T19:59:23.000000Z"}, {"uuid": "eac6304e-d7de-47c8-93be-69f4c5cf0fe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22152", "type": "seen", "source": "https://t.me/cvedetector/14968", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22152 - \"Atheos Remote File Inclusion Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-22152 \nPublished : Jan. 10, 2025, 4:15 p.m. | 38\u00a0minutes ago \nDescription : Atheos is a self-hosted browser-based cloud IDE. Prior to v600, the $path and $target parameters are not properly validated across multiple components, allowing an attacker to read, modify, or execute arbitrary files on the server. These vulnerabilities can be exploited through various attack vectors present in multiple PHP files. This vulnerability is fixed in v600. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T18:00:50.000000Z"}, {"uuid": "a59241ba-f099-4c45-b818-a0e9421f6eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22151", "type": "seen", "source": "https://t.me/cvedetector/14882", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22151 - Strawberry GraphQL Relay Type Confusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22151 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Strawberry GraphQL is a library for creating GraphQL APIs. Starting in 0.182.0 and prior to version 0.257.0, a type confusion vulnerability exists in Strawberry GraphQL's relay integration that affects multiple ORM integrations (Django, SQLAlchemy, Pydantic). The vulnerability occurs when multiple GraphQL types are mapped to the same underlying model while using the relay node interface. When querying for a specific type using the global node field (e.g., FruitType:some-id), the resolver may incorrectly return an instance of a different type mapped to the same model (e.g., SpecialFruitType). This can lead to information disclosure if the alternate type exposes sensitive fields and potential privilege escalation if the alternate type contains data intended for restricted access. This vulnerability is fixed in 0.257.0. \nSeverity: 3.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:48.000000Z"}, {"uuid": "e509dc35-2b23-4c1f-81fd-c96197d0169e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22152", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804779585524856", "content": "", "creation_timestamp": "2025-01-10T15:32:06.454149Z"}, {"uuid": "68808286-2680-4970-9053-04f7ef41695a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22151", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113799964021202828", "content": "", "creation_timestamp": "2025-01-09T19:07:26.795787Z"}, {"uuid": "3a395af4-9d45-4585-9c13-b2cd3dd403d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22152", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804792773660712", "content": "", "creation_timestamp": "2025-01-10T15:35:27.662561Z"}, {"uuid": "6a99e629-9321-4926-a78b-0e626359f004", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22152", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffnjnqyqm2k", "content": "", "creation_timestamp": "2025-01-10T16:49:03.380567Z"}, {"uuid": "fe0f9ebe-74ae-4863-81b4-40d7a5104f0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22151", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfdgkb3iwr2y", "content": "", "creation_timestamp": "2025-01-09T19:38:54.633719Z"}, {"uuid": "679f2eee-57e9-476c-99ff-c86c2e225d21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22152", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805082230602977", "content": "", "creation_timestamp": "2025-01-10T16:49:18.387546Z"}, {"uuid": "6fecf93d-a749-486d-a788-71ef8c981632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22150", "type": "seen", "source": "https://bsky.app/profile/tech-trending.bsky.social/post/3lgn4jhna4p2g", "content": "", "creation_timestamp": "2025-01-26T09:31:13.548647Z"}, {"uuid": "3c558f70-9dfe-4d52-a28f-bc688aabf77e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114614853194971118", "content": "", "creation_timestamp": "2025-06-02T17:04:29.545828Z"}, {"uuid": "96e7e20a-bf7b-4ca7-b4a5-c6a4bb064459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.com/post/3lqnb2uw6ts2s", "content": "", "creation_timestamp": "2025-06-02T17:04:30.021474Z"}, {"uuid": "61d357ea-e49b-44f4-b71c-89e8113f6c6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "MISP/1413a78e-c0b3-4092-97e7-909fb9773448", "content": "", "creation_timestamp": "2025-08-14T11:44:23.000000Z"}, {"uuid": "9c449fab-22bb-48b6-b567-9fe67bf3a507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22151", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1035", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22151\n\ud83d\udd39 Description: Strawberry GraphQL is a library for creating GraphQL APIs. Starting in 0.182.0 and prior to version 0.257.0, a type confusion vulnerability exists in Strawberry GraphQL's relay integration that affects multiple ORM integrations (Django, SQLAlchemy, Pydantic). The vulnerability occurs when multiple GraphQL types are mapped to the same underlying model while using the relay node interface. When querying for a specific type using the global node field (e.g., FruitType:some-id), the resolver may incorrectly return an instance of a different type mapped to the same model (e.g., SpecialFruitType). This can lead to information disclosure if the alternate type exposes sensitive fields and potential privilege escalation if the alternate type contains data intended for restricted access. This vulnerability is fixed in 0.257.0.\n\ud83d\udccf Published: 2025-01-09T18:51:18.221Z\n\ud83d\udccf Modified: 2025-01-09T18:51:18.221Z\n\ud83d\udd17 References:\n1. https://github.com/strawberry-graphql/strawberry/security/advisories/GHSA-5xh2-23cc-5jc6\n2. https://github.com/strawberry-graphql/strawberry/commit/526eb82b70451c0e59d5a71ae9b7396f59974bd8", "creation_timestamp": "2025-01-09T19:22:02.000000Z"}, {"uuid": "26a34a59-3fa8-4bf8-8b27-c48872ef30a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22153", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2783", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22153\n\ud83d\udd39 Description: RestrictedPython is a tool that helps to define a subset of the Python language which allows to provide a program input into a trusted environment. Via a type confusion bug in versions of the CPython interpreter starting in 3.11 and prior to 3.13.2 when using `try/except*`, RestrictedPython starting in version 6.0 and prior to version 8.0 could be bypassed. The issue is patched in version 8.0 of RestrictedPython by removing support for `try/except*` clauses. No known workarounds are available.\n\ud83d\udccf Published: 2025-01-23T17:34:27.056Z\n\ud83d\udccf Modified: 2025-01-23T17:34:27.056Z\n\ud83d\udd17 References:\n1. https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-gmj9-h825-chq2\n2. https://github.com/zopefoundation/RestrictedPython/commit/48a92c5bb617a647cffd0dadd4d5cfe626bcdb2f", "creation_timestamp": "2025-01-23T18:03:14.000000Z"}, {"uuid": "536b20f1-eb28-4545-a247-be3118c0f40e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/17763", "content": "\ud83d\udea8CVE-2025-22157: PrivEsc (Privilege Escalation) in Jira Core Data Center\n\nFOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJKSVJBIg%3D%3D\n\nFOFA Query: app=\"JIRA\"\n\nGitHub Advisory: https://github.com/advisories/GHSA-352j-376q-2pmc\n\nResults: 94,656 results", "creation_timestamp": "2025-06-02T17:04:01.000000Z"}, {"uuid": "e83fd594-8c06-4d34-accb-0ebcf2477a0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22152", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lflr2rhs632u", "content": "", "creation_timestamp": "2025-01-13T03:08:17.357309Z"}, {"uuid": "51dfc872-7a82-49c5-a37e-645a78e53a43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22152", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfflotc3c32d", "content": "", "creation_timestamp": "2025-01-10T16:16:09.194064Z"}, {"uuid": "2c2956e1-2785-4283-9469-db5a2e42f582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22153", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggihbmqa42b", "content": "", "creation_timestamp": "2025-01-23T18:16:06.010401Z"}, {"uuid": "6ee47583-43dd-4298-9cb8-5fb569278c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22153", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lggjsbf2pq2e", "content": "", "creation_timestamp": "2025-01-23T18:40:11.514967Z"}, {"uuid": "c3c8b12d-f745-429c-ab36-3f74c4ec1357", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-22157", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114780719785808328", "content": "", "creation_timestamp": "2025-07-02T00:06:32.236076Z"}, {"uuid": "ddb200e7-3f0c-4df5-b61b-529a336dc4db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.com/post/3lsww6dv2mc25", "content": "", "creation_timestamp": "2025-07-02T00:06:39.062691Z"}, {"uuid": "e6bc7143-8827-4bda-b855-e277146fe5e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2215", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7253", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2215\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical was found in Doufox up to 0.2.0. Affected by this vulnerability is an unknown functionality of the file /?s=doudou&amp;c=file&amp;a=list. The manipulation of the argument dir leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-11T23:31:05.962Z\n\ud83d\udccf Modified: 2025-03-11T23:31:05.962Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299287\n2. https://vuldb.com/?ctiid.299287\n3. https://vuldb.com/?submit.512316\n4. https://github.com/sate10/11/issues/1", "creation_timestamp": "2025-03-11T23:40:50.000000Z"}, {"uuid": "2583ce0f-feb9-4a71-922a-a220a09d0dab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/18707", "content": "\ud83d\udea8CVE-2025-22157: Privilege Escalation Vulnerability in Jira Core Data Center\n\nhttps://darkwebinformer.com/cve-2025-22157-privilege-escalation-vulnerability-in-jira-core-data-center/\n\n\u2014\u2014\u2014\u2014\u2014\u2014\n\nFollow @zoomeye_team's official Twitter/X account and send the message \u201cDark Web Informer\u201d via DM to receive an extra 15-day membership.", "creation_timestamp": "2025-07-02T00:06:10.000000Z"}, {"uuid": "2ff4f7f2-7158-498e-b3ce-a012308dcc4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22151", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdfckfbem2i", "content": "", "creation_timestamp": "2025-01-09T19:16:35.579404Z"}, {"uuid": "6f271a97-86c2-4eb6-b3ad-81f8263f5646", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22152", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113804859730039794", "content": "", "creation_timestamp": "2025-01-10T15:52:30.206792Z"}, {"uuid": "722e1ca7-6641-4824-b628-f210117f8122", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22150", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbhijzb7g2w", "content": "", "creation_timestamp": "2025-01-21T18:15:35.967696Z"}, {"uuid": "35bec5d7-5f6d-4929-9706-b2efd46de90f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22153", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878878549057346", "content": "", "creation_timestamp": "2025-01-23T17:36:27.039901Z"}, {"uuid": "1882542b-09db-4cd4-ac3b-613dd594b222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "MISP/1413a78e-c0b3-4092-97e7-909fb9773448", "content": "", "creation_timestamp": "2025-08-06T13:54:20.000000Z"}, {"uuid": "b03a6a13-a6f8-41eb-8e84-9252905de9ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22150", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2434", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22150\n\ud83d\udd39 Description: Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.\n\ud83d\udccf Published: 2025-01-21T17:46:58.872Z\n\ud83d\udccf Modified: 2025-01-21T17:46:58.872Z\n\ud83d\udd17 References:\n1. https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975\n2. https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0\n3. https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a\n4. https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385\n5. https://hackerone.com/reports/2913312\n6. https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f\n7. https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113", "creation_timestamp": "2025-01-21T18:00:46.000000Z"}, {"uuid": "b3cf8f83-8347-42c6-85d7-a350df5e63d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22152", "type": "seen", "source": "https://t.me/CyberBulletin/2056", "content": "\u26a1\ufe0fCVE-2025-22152 (CVSS 9.4): Severe Vulnerabilities Found in Atheos Web-Based IDE.\n\n#CyberBulletin", "creation_timestamp": "2025-01-13T08:00:33.000000Z"}, {"uuid": "777d8394-ef61-49a4-8bcc-dab11dec85f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "https://t.me/DarkWebInformer_News/5974", "content": "\ud83d\udea8 News Alert!\n\nSource: Dark Web Informer - Cyber Threat Intelligence\nTitle: CVE-2025-22157: Privilege Escalation Vulnerability in Jira Core Data Center\nLink: https://darkwebinformer.com/cve-2025-22157-privilege-escalation-vulnerability-in-jira-core-data-center/", "creation_timestamp": "2025-07-02T00:06:03.000000Z"}]}