{"vulnerability": "cve-2025-2221", "sightings": [{"uuid": "58ab9d22-4030-48ee-9abd-85865c519759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22214", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-22214.yaml", "content": "", "creation_timestamp": "2026-02-11T09:38:10.000000Z"}, {"uuid": "52bae0dc-e36f-4bac-b2f9-5e644fdaa892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22215", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/671", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22215\n\ud83d\udd39 Description: VMware Aria Automation contains a server-side request forgery (SSRF) vulnerability.\u00a0A malicious actor with \"Organization Member\" access to Aria Automation may exploit this vulnerability enumerate internal services running on the host/network.\n\ud83d\udccf Published: 2025-01-08T06:43:32.023Z\n\ud83d\udccf Modified: 2025-01-08T06:43:32.023Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25312", "creation_timestamp": "2025-01-08T07:38:55.000000Z"}, {"uuid": "515c38dc-2180-474f-aa7c-2e02e5362a1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7225", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22213\n\ud83d\udd25 CVSS Score: 7.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/AU:N)\n\ud83d\udd39 Description: Inadequate checks in the Media Manager allowed users with \"edit\" privileges to change file extension to arbitrary extension, including .php and other potentially executable extensions.\n\ud83d\udccf Published: 2025-03-11T16:07:28.921Z\n\ud83d\udccf Modified: 2025-03-11T19:24:44.754Z\n\ud83d\udd17 References:\n1. https://developer.joomla.org/security-centre/961-20250301-core-malicious-file-uploads-via-media-managere-malicious-file-uploads-via-media-manager.html", "creation_timestamp": "2025-03-11T20:21:15.000000Z"}, {"uuid": "61791940-fefe-4b47-bcaf-27bbe8606881", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22211", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5405", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22211\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A SQL injection vulnerability in the JoomShopping component versions 1.0.0-1.4.3 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the country management area in backend.\n\ud83d\udccf Published: 2025-02-25T21:29:22.929Z\n\ud83d\udccf Modified: 2025-02-25T21:51:40.814Z\n\ud83d\udd17 References:\n1. https://www.webdesigner-profi.de/", "creation_timestamp": "2025-02-25T22:23:46.000000Z"}, {"uuid": "c2acc5e7-7b03-469b-a02b-dddf46a13753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22212", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6548", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22212\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A SQL injection vulnerability in the ConvertForms component versions 1.0.0-1.0.0 - 4.4.9 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the submission management area in backend.\n\ud83d\udccf Published: 2025-03-05T15:15:51.874Z\n\ud83d\udccf Modified: 2025-03-05T15:15:51.874Z\n\ud83d\udd17 References:\n1. https://www.tassos.gr/\n2. https://github.com/AdamWallwork/CVEs/tree/main/2025/CVE-2025-22212", "creation_timestamp": "2025-03-05T15:32:52.000000Z"}, {"uuid": "4983c576-00f3-42ee-b1f0-aa63849b93de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22216", "type": "seen", "source": "https://t.me/cvedetector/16887", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22216 - Citrix UAA Session Hijacking\", \n  \"Content\": \"CVE ID : CVE-2025-22216 \nPublished : Jan. 31, 2025, 6:15 a.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : A UAA configured with multiple identity zones, does not properly validate session information across those zones.  A User authenticated against a corporate IDP can re-use their jsessionid to access other zones. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T09:30:50.000000Z"}, {"uuid": "33537818-70c3-46ce-9cd4-ebcfc3df1b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://t.me/hackyourmom/10370", "content": "\ud83d\udd34 \u0412\u0438\u044f\u0432\u043b\u0435\u043d\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u0443 \u0443\u0440\u0430\u0437\u043b\u0438\u0432\u0456\u0441\u0442\u044c CVE-2025-22217 \u0443 Avi Load Balancer, \u044f\u043a\u0430 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0445\u0430\u043a\u0435\u0440\u0430\u043c \u0447\u0435\u0440\u0435\u0437 SQL-\u0456\u043d'\u0454\u043a\u0446\u0456\u044e \u043e\u0442\u0440\u0438\u043c\u0430\u0442\u0438 \u0434\u043e\u0441\u0442\u0443\u043f \u0434\u043e \u0431\u0430\u0437 \u0434\u0430\u043d\u0438\u0445 \ud83e\udd14 \u0441\u043a\u0443\u043b\u044f \u0432 2025 - \u0442\u0435\u043f\u0435\u0440 \u0432\u0438 \u0431\u0430\u0447\u0438\u043b\u0438 \u0432\u0441\u0435 #cybernews", "creation_timestamp": "2025-01-29T17:23:57.000000Z"}, {"uuid": "17632c2e-4335-4c4e-94ee-c987e91f5988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "https://t.me/cvedetector/16800", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22218 - VMware Aria Operations for Logs Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22218 \nPublished : Jan. 30, 2025, 3:15 p.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : VMware Aria Operations for Logs contains an information disclosure vulnerability.\u00a0A malicious actor with View Only Admin permissions may be able to read the credentials\u00a0of a VMware product integrated with VMware Aria Operations for Logs \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T18:27:06.000000Z"}, {"uuid": "0158a27f-5b3a-4490-9ef8-a7363203be71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://t.me/cvedetector/16619", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22217 - VMware Avi Load Balancer Blind SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-22217 \nPublished : Jan. 28, 2025, 7:15 p.m. | 19\u00a0minutes ago \nDescription : Avi Load Balancer contains an unauthenticated blind SQL Injection vulnerability which was privately reported to VMware. Patches are available to remediate this vulnerability in affected VMware products.\u00a0  \n  \nA malicious user with network access may be able to use specially crafted SQL queries to gain database access. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T21:17:45.000000Z"}, {"uuid": "27a548f5-bb20-422b-bc8c-43d014c668c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2221", "type": "seen", "source": "https://t.me/cvedetector/20281", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2221 - WordPress WPCOM Member SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2221 \nPublished : March 14, 2025, 7:15 a.m. | 2\u00a0hours ago \nDescription : The WPCOM Member plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018user_phone\u2019 parameter in all versions up to, and including, 1.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T10:51:27.000000Z"}, {"uuid": "b2e014b4-4be7-441a-b34b-33ff1c36e098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22212", "type": "seen", "source": "https://t.me/cvedetector/19645", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22212 - Joomla ConvertForms SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22212 \nPublished : March 5, 2025, 4:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : A SQL injection vulnerability in the ConvertForms component versions 1.0.0-1.0.0 - 4.4.9 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the submission management area in backend. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T18:37:07.000000Z"}, {"uuid": "e124eb31-8526-41f4-899b-e66e226342b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3lguzdpmvf22a", "content": "", "creation_timestamp": "2025-01-29T12:55:37.802752Z"}, {"uuid": "bfaebcfb-f8fb-495f-970f-1186d8cd92ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgv4er5uuc2z", "content": "", "creation_timestamp": "2025-01-29T13:49:54.108475Z"}, {"uuid": "4ce0fcc8-108e-4ce6-8ae1-5fa2c1a9d0ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgv4im2xb22z", "content": "", "creation_timestamp": "2025-01-29T13:52:04.941677Z"}, {"uuid": "1ec28848-9c56-4467-aad1-e3355a49ac49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22219", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgya4xb3t42w", "content": "", "creation_timestamp": "2025-01-30T19:35:04.904927Z"}, {"uuid": "cba07413-3423-46f1-b5d0-75ca5762141d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgya4y2zlv25", "content": "", "creation_timestamp": "2025-01-30T19:35:07.171953Z"}, {"uuid": "af319d8a-edf2-4594-8f04-fc7ba93b9ae5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113919401560233030", "content": "", "creation_timestamp": "2025-01-30T21:21:59.376176Z"}, {"uuid": "ae65c21d-b757-4d7c-bd04-a624cda4443e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22219", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113919401560233030", "content": "", "creation_timestamp": "2025-01-30T21:21:59.423312Z"}, {"uuid": "7e760dfc-4f95-4f4e-bc99-8241ab032742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgufrbg3p324", "content": "", "creation_timestamp": "2025-01-29T07:05:16.764329Z"}, {"uuid": "a8d765f9-39ef-408c-baf9-3e880113ab8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgvqxtdln22c", "content": "", "creation_timestamp": "2025-01-29T19:58:36.073453Z"}, {"uuid": "6a9f1c2f-6b83-483c-8785-faa72ca4c53a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://thehackernews.com/2025/01/broadcom-warns-of-high-severity-sql.html", "content": "", "creation_timestamp": "2025-01-29T04:29:00.000000Z"}, {"uuid": "b08cde2c-fd5b-4ffb-87cb-a01e1d3daffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "https://bsky.app/profile/seifreed.bsky.social/post/3lgxoo4zsue2g", "content": "", "creation_timestamp": "2025-01-30T14:22:34.199998Z"}, {"uuid": "e39cc601-fc2d-4804-9f78-17c95af0bcb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22219", "type": "seen", "source": "https://bsky.app/profile/seifreed.bsky.social/post/3lgxoo4zsue2g", "content": "", "creation_timestamp": "2025-01-30T14:22:34.259137Z"}, {"uuid": "89248f31-e1a6-4c3d-a205-8e54fd5b58e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lgz4uhdwlk2a", "content": "", "creation_timestamp": "2025-01-31T04:09:21.785940Z"}, {"uuid": "ef02e5bc-df37-45c1-a544-884e3291c6ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2221", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkdgd6txb426", "content": "", "creation_timestamp": "2025-03-14T10:40:49.139587Z"}, {"uuid": "f17fca20-f3e3-400d-93bb-5da5ce1ec9fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22211", "type": "seen", "source": "MISP/24306fae-b16b-4478-9297-d2973cdb583c", "content": "", "creation_timestamp": "2025-08-22T14:52:23.000000Z"}, {"uuid": "bb4f6423-8f35-4c9d-89b7-842271732a73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-2221", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mjfrbmb4dp2l", "content": "", "creation_timestamp": "2026-04-13T21:03:08.949753Z"}, {"uuid": "4c91925a-116f-467c-989c-666fe6b8b57f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22214", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-27)", "content": "", "creation_timestamp": "2026-02-27T00:00:00.000000Z"}, {"uuid": "3bcb19ba-5efb-4637-9d55-77c17cdc8b93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2221", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-2221.yaml", "content": "", "creation_timestamp": "2026-04-10T14:39:56.000000Z"}, {"uuid": "a4872728-8314-4c53-bccf-aebd913dc94f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22211", "type": "seen", "source": "https://t.me/cvedetector/18935", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22211 - JoomShopping SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-22211 \nPublished : Feb. 25, 2025, 10:15 p.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : A SQL injection vulnerability in the JoomShopping component versions 1.0.0-1.4.3 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the country management area in backend. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-26T01:44:50.000000Z"}, {"uuid": "4cae14fc-f981-46e0-8f01-7b005e7378f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22216", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3613", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22216\n\ud83d\udd25 CVSS Score: 5.4 (CVSS_V3)\n\ud83d\udd39 Description: A UAA configured with multiple identity zones, does not properly validate session information across those zones.  A User authenticated against a corporate IDP can re-use their jsessionid to access other zones.\n\ud83d\udccf Published: 2025-01-31T06:30:53Z\n\ud83d\udccf Modified: 2025-01-31T06:30:53Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-22216\n2. https://www.cloudfoundry.org/blog/cve-2025-22216-uaa-missing-zone-validation", "creation_timestamp": "2025-01-31T08:15:06.000000Z"}, {"uuid": "6a5128b8-5744-4b9a-959a-4102ac73a326", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22216", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3583", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22216\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T06:15:30.090\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://www.cloudfoundry.org/blog/cve-2025-22216-uaa-missing-zone-validation/", "creation_timestamp": "2025-01-31T07:24:00.000000Z"}, {"uuid": "6b0c9360-2620-4af3-9c33-2291231d466a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22215", "type": "seen", "source": "https://t.me/cvedetector/14661", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22215 - VMware Aria Automation SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22215 \nPublished : Jan. 8, 2025, 7:15 a.m. | 40\u00a0minutes ago \nDescription : VMware Aria Automation contains a server-side request forgery (SSRF) vulnerability.\u00a0A malicious actor with \"Organization Member\" access to Aria Automation may exploit this vulnerability enumerate internal services running on the host/network. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T09:07:30.000000Z"}, {"uuid": "0f0e8cc0-9091-4c30-8d3b-7d764d85eb25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "Telegram/mXh_OJUnk-gXPDU2Z0WWh1AhjRLWfEYDzbbN0bczL8NWLw", "content": "", "creation_timestamp": "2025-01-31T10:51:38.000000Z"}, {"uuid": "f1d018da-2b69-48f4-a2e7-543ba9dae3b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "Telegram/I7hBlYecjQXHX3CEL4Xba55jjpwq8LD_3yP1xO04PPK2zg", "content": "", "creation_timestamp": "2025-01-29T08:11:48.000000Z"}, {"uuid": "31ac43d7-ad2c-415c-804f-c5e9fca5bf72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2221", "type": "seen", "source": "Telegram/MoLM8hQiaQO2UtPbaOFwMBQpRxYe0wTCLGhlDqNNXet-jys", "content": "", "creation_timestamp": "2025-03-14T09:00:27.000000Z"}, {"uuid": "14bf6555-ab1d-4679-bf20-e7eb7610c92a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "exploited", "source": "https://t.me/true_secator/6669", "content": "\u041f\u043e \u0443\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c \u0441\u0435\u0433\u043e\u0434\u043d\u044f VMware Avi Load Balancer \u0438 Zyxel CPE.\n\n\u0427\u0442\u043e \u043a\u0430\u0441\u0430\u0435\u043c\u043e \u043f\u0435\u0440\u0432\u043e\u0439 Broadcom \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430 \u043e\u0431 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 VMware Avi Load Balancer, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445.\n\nCVE-2025-22217 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS: 8,6 \u0438 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u0414\u0430\u043d\u0438\u044d\u043b\u043e\u043c \u041a\u0443\u043a\u0443\u0447\u043a\u0430 \u0438 \u041c\u0430\u0442\u0435\u0443\u0448\u043e\u043c \u0414\u0430\u0440\u0434\u0430.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u0438\u043c\u0435\u044e\u0449\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0435\u0442\u0438, \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 SQL-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 VMware Avi Load Balancer 30.1.1 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 30.1.2-2p2), 30.1.2 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 30.1.2-2p2), 30.2.1 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 30.2.1-2p5) \u0438 30.2.2 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 30.2.2-2p2)\n\nBroadcom \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u0432\u0435\u0440\u0441\u0438\u0438 22.x \u0438 21.x \u043d\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-22217.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u044e 30.1.1, \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e 30.1.2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0435\u0440\u0435\u0434 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\u041e\u0431\u0445\u043e\u0434\u043d\u044b\u0445 \u043f\u0443\u0442\u0435\u0439 \u043d\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442.\n\n\u0410 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f 0-day, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0430\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0441\u0435\u0440\u0438\u0438 Zyxel CPE, \u0443\u0436\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u0435\u0442\u0441\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u043c \u043f\u043e\u043f\u044b\u0442\u043a\u0430\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\nGreyNoise \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0435\u0439 \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u0442 \u043a \u043f\u043e\u043b\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u0443\u0442\u0435\u0447\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u043b\u0438 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044e \u0432 \u0441\u0435\u0442\u044c.\n\nCVE-2024-40891 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0435\u0439 \u043a\u043e\u043c\u0430\u043d\u0434 \u0438 \u043d\u0435 \u0431\u044b\u043b\u0430 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0438\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430.\n\n\u041e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0448\u0438\u0431\u043a\u0438 \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430 VulnCheck \u0432 \u0438\u044e\u043b\u0435 2024 \u0433\u043e\u0434\u0430.\n\n\u0422\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u044f GreyNoise \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0430\u0442\u0430\u043a \u0438\u0441\u0445\u043e\u0434\u0438\u043b\u0438 \u0441 \u0434\u0435\u0441\u044f\u0442\u043a\u043e\u0432 IP-\u0430\u0434\u0440\u0435\u0441\u043e\u0432, \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u0438\u0441\u044c \u043d\u0430 \u0422\u0430\u0439\u0432\u0430\u043d\u0435.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Censys, \u0432 \u0441\u0435\u0442\u0438 \u043d\u0430\u0441\u0447\u0438\u0442\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0431\u043e\u043b\u0435\u0435\u00a01500 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\nCVE-2024-40891 \u043e\u0447\u0435\u043d\u044c \u0441\u0445\u043e\u0436\u0430 \u0441 CVE-2024-40890, \u0433\u043b\u0430\u0432\u043d\u043e\u0435 \u043e\u0442\u043b\u0438\u0447\u0438\u0435 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u043f\u0435\u0440\u0432\u0430\u044f \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 Telnet, \u0430 \u0432\u0442\u043e\u0440\u0430\u044f \u2014 \u043d\u0430 HTTP.\n\n\u041e\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0437\u0430\u043f\u0438\u0441\u0438 \u0441\u043b\u0443\u0436\u0431.\n\nVulnCheck \u0441\u043e\u043e\u0431\u0449\u0438\u043b, \u0447\u0442\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430\u0434 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0441 \u0442\u0430\u0439\u0432\u0430\u043d\u044c\u0441\u043a\u043e\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0435\u0439.\n\n\u0412 Zyxel \u043f\u043e\u043a\u0430 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043d\u0435 \u043a\u043e\u043c\u043c\u0435\u043d\u0442\u0438\u0440\u0443\u0435\u0442 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044e.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0444\u0438\u043b\u044c\u0442\u0440\u043e\u0432\u0430\u0442\u044c \u0442\u0440\u0430\u0444\u0438\u043a \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u043d\u0435\u043e\u0431\u044b\u0447\u043d\u044b\u0445 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043a \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f Zyxel CPE \u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u043c\u0443 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0443 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u043c\u0438 IP-\u0430\u0434\u0440\u0435\u0441\u0430\u043c\u0438.", "creation_timestamp": "2025-01-29T11:50:05.000000Z"}, {"uuid": "c9b7b6ae-2cd7-490c-b149-d2fa09768735", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22219", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgxuypgrda27", "content": "", "creation_timestamp": "2025-01-30T16:15:51.446454Z"}, {"uuid": "b29fc15c-9617-4b39-a433-9a4a53e3deb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3lguxgqjqlc23", "content": "", "creation_timestamp": "2025-01-29T12:21:32.669980Z"}, {"uuid": "5a296205-ebfc-47ec-bd2c-f21648ed834a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lguxximjpn2j", "content": "", "creation_timestamp": "2025-01-29T12:30:52.534874Z"}, {"uuid": "26fae242-e733-498c-9928-789e6977c0fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113918327772619821", "content": "", "creation_timestamp": "2025-01-30T16:50:56.282282Z"}, {"uuid": "2c6ec776-fabb-4466-abb7-3c53a38abccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lgwcrf4umk2n", "content": "", "creation_timestamp": "2025-01-30T01:16:58.640448Z"}, {"uuid": "df42012c-51d6-4ecc-b51b-a71971fc15f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22216", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgzdy5ywy22i", "content": "", "creation_timestamp": "2025-01-31T06:16:38.843268Z"}, {"uuid": "b3389688-9cec-4756-af85-f82fafe3077f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/113911747663602996", "content": "", "creation_timestamp": "2025-01-29T12:55:29.761153Z"}, {"uuid": "c72686d6-7f47-46fb-ab09-d384103c0a34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "https://thehackernews.com/2025/01/broadcom-patches-vmware-aria-flaws.html", "content": "", "creation_timestamp": "2025-01-31T04:49:00.000000Z"}, {"uuid": "f467582e-cdbe-4e2f-9ea1-f4fa45a59dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lgvtcac2bm2m", "content": "", "creation_timestamp": "2025-01-29T20:40:03.932302Z"}, {"uuid": "537362f5-5b73-4a4e-be9b-82ea7ad2689e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22212", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljnrdrvkdy2s", "content": "", "creation_timestamp": "2025-03-05T19:59:27.228605Z"}, {"uuid": "60eaa019-67cb-42c1-87af-4df1e29d4066", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lmvkcdmmec2y", "content": "", "creation_timestamp": "2025-04-16T02:30:13.712824Z"}, {"uuid": "a0ba33a8-b452-4e36-9538-dbeb5d950ff7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22214", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-19)", "content": "", "creation_timestamp": "2026-02-19T00:00:00.000000Z"}, {"uuid": "47c19dd1-d3b1-4dbe-b3e9-2b1f1190b2e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22210", "type": "seen", "source": "https://t.me/cvedetector/18855", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22210 - Hikashop Joomla SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22210 \nPublished : Feb. 25, 2025, 6:15 a.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : A SQL injection vulnerability in the Hikashop component versions 3.3.0-5.1.4 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the category management area in backend. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-25T09:00:52.000000Z"}, {"uuid": "84067b93-1cff-44b3-8ba1-6572203f7f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22210", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5253", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22210\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A SQL injection vulnerability in the Hikashop component versions 3.3.0-5.1.4 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the category management area in backend.\n\ud83d\udccf Published: 2025-02-25T05:16:48.342Z\n\ud83d\udccf Modified: 2025-02-25T05:16:48.342Z\n\ud83d\udd17 References:\n1. https://www.hikashop.com/", "creation_timestamp": "2025-02-25T06:22:09.000000Z"}, {"uuid": "4a08c94f-5838-40b9-8af8-65d86e232779", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://t.me/ics_cert/1005", "content": "\u0627\u0645\u0631\u0648\u0632\u0647 VMware Avi Load Balancer \u0648 Zyxel CPE \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0647\u0633\u062a\u0646\u062f.\n\n\u062f\u0631 \u0631\u0627\u0628\u0637\u0647 \u0628\u0627 \u0645\u0648\u0631\u062f \u0627\u0648\u0644\u060c Broadcom \u0627\u0632 \u06a9\u0634\u0641 \u06cc\u06a9 \u0645\u0634\u06a9\u0644 \u062c\u062f\u06cc \u062f\u0631 VMware Avi Load Balancer \u062e\u0628\u0631 \u062f\u0627\u062f \u06a9\u0647 \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u062a\u0648\u0633\u0637 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u06cc\u0645\u0646 \u0628\u0647 \u067e\u0627\u06cc\u06af\u0627\u0647 \u062f\u0627\u062f\u0647 \u0645\u0648\u0631\u062f \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u06af\u06cc\u0631\u062f.\n\nCVE-2025-22217 \u062f\u0627\u0631\u0627\u06cc \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS 8.6 \u0627\u0633\u062a \u0648 \u062a\u0648\u0633\u0637 \u0645\u062d\u0642\u0642\u06cc\u0646 Daniel Kukuczka \u0648 Mateusz Darda \u06a9\u0634\u0641 \u0634\u062f.\n\n \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0628\u0627 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0634\u0628\u06a9\u0647 \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u067e\u0631\u0633 \u0648 \u062c\u0648\u0647\u0627\u06cc SQL \u0633\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u0648\u06cc\u0698\u0647 \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u067e\u0627\u06cc\u06af\u0627\u0647 \u062f\u0627\u062f\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u062f.\n\n\u0627\u06cc\u0646 \u0627\u0634\u06a9\u0627\u0644 \u0628\u0631 VMware Avi Load Balancer 30.1.1 (\u0631\u0641\u0639 \u0634\u062f\u0647 \u062f\u0631 30.1.2-2p2)\u060c 30.1.2 (\u0631\u0641\u0639 \u0634\u062f\u0647 \u062f\u0631 30.1.2-2p2)\u060c 30.2.1 (\u0631\u0641\u0639 \u0634\u062f\u0647 \u062f\u0631 30.2.1-2p5) \u0648 30.2.2-2.2p (\u0631\u0641\u0639 \u0634\u062f\u0647 \u062f\u0631 30.1.2-2p2) \u0648 30.2.2-2.2 (\u0631\u0641\u0639 \u0634\u062f\u0647 \u062f\u0631 30.1.2-2p2) \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc \u06af\u0630\u0627\u0631\u062f.\n\nBroadcom \u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u0634\u0627\u0631\u0647 \u06a9\u0631\u062f \u06a9\u0647 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc 22.x \u0648 21.x \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 CVE-2025-22217 \u0642\u0631\u0627\u0631 \u0646\u0645\u06cc\u200c\u06af\u06cc\u0631\u0646\u062f.\n\n\u06a9\u0627\u0631\u0628\u0631\u0627\u0646\u06cc \u06a9\u0647 \u0646\u0633\u062e\u0647 30.1.1 \u0631\u0627 \u0627\u062c\u0631\u0627 \u0645\u06cc \u06a9\u0646\u0646\u062f\u060c \u0628\u0627\u06cc\u062f \u0642\u0628\u0644 \u0627\u0632 \u0627\u0639\u0645\u0627\u0644 \u0627\u0635\u0644\u0627\u062d\u060c \u0627\u0628\u062a\u062f\u0627 \u0628\u0647 30.1.2 \u06cc\u0627 \u062c\u062f\u06cc\u062f\u062a\u0631 \u0627\u0631\u062a\u0642\u0627 \u062f\u0647\u0646\u062f.\n\n\u0647\u06cc\u0686 \u0631\u0627\u0647 \u062d\u0644\u06cc \u0648\u062c\u0648\u062f \u0646\u062f\u0627\u0631\u062f.\n\n\u0648 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc 0day \u0645\u0647\u0645\u06cc \u06a9\u0647 \u0628\u0631 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u0633\u0631\u06cc Zyxel CPE \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc\u200c\u06af\u0630\u0627\u0631\u0646\u062f\u060c \u062f\u0631 \u062d\u0627\u0644 \u062d\u0627\u0636\u0631 \u0628\u0647 \u0637\u0648\u0631 \u0641\u0639\u0627\u0644 \u062f\u0631 \u062d\u0627\u0644 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0647\u0633\u062a\u0646\u062f.\n\nGreyNoise \u06af\u0632\u0627\u0631\u0634 \u0645\u06cc \u062f\u0647\u062f \u06a9\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc \u062a\u0648\u0627\u0646\u0646\u062f \u0627\u0632 \u0622\u0646 \u0628\u0631\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc \u062f\u0633\u062a\u0648\u0631\u0627\u062a \u062f\u0644\u062e\u0648\u0627\u0647 \u0628\u0631 \u0631\u0648\u06cc \u062f\u0633\u062a\u06af\u0627\u0647 \u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u0646\u062f \u06a9\u0647 \u0645\u0646\u062c\u0631 \u0628\u0647 \u0628\u0647 \u062e\u0637\u0631 \u0627\u0641\u062a\u0627\u062f\u0646 \u06a9\u0627\u0645\u0644 \u0633\u06cc\u0633\u062a\u0645\u060c \u0646\u0634\u062a \u062f\u0627\u062f\u0647 \u0647\u0627 \u06cc\u0627 \u0646\u0641\u0648\u0630 \u0628\u0647 \u0634\u0628\u06a9\u0647 \u0645\u06cc \u0634\u0648\u062f.\n\nCVE-2024-40891 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u062a\u0632\u0631\u06cc\u0642 \u0641\u0631\u0645\u0627\u0646 \u0627\u0633\u062a \u0648 \u0628\u0647 \u0637\u0648\u0631 \u0639\u0645\u0648\u0645\u06cc \u0641\u0627\u0634 \u0646\u0634\u062f\u0647 \u06cc\u0627 \u062b\u0627\u0628\u062a \u0646\u0634\u062f\u0647 \u0627\u0633\u062a.\n\n\u0648\u062c\u0648\u062f \u0627\u06cc\u0646 \u0628\u0627\u06af \u0628\u0631\u0627\u06cc \u0627\u0648\u0644\u06cc\u0646 \u0628\u0627\u0631 \u062a\u0648\u0633\u0637 VulnCheck \u062f\u0631 \u062c\u0648\u0644\u0627\u06cc 2024 \u06af\u0632\u0627\u0631\u0634 \u0634\u062f.\n\n\u062a\u0644\u0647 \u0645\u062a\u0631\u06cc \u06af\u0631\u06cc \u0646\u0648\u06cc\u0632 \u0646\u0634\u0627\u0646 \u0645\u06cc \u062f\u0647\u062f \u06a9\u0647 \u062a\u0644\u0627\u0634 \u0647\u0627\u06cc \u062d\u0645\u0644\u0647 \u0627\u0632 \u062f\u0647 \u0647\u0627 \u0622\u062f\u0631\u0633 IP \u0633\u0631\u0686\u0634\u0645\u0647 \u06af\u0631\u0641\u062a\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0628\u06cc\u0634\u062a\u0631 \u0622\u0646\u0647\u0627 \u062f\u0631 \u062a\u0627\u06cc\u0648\u0627\u0646 \u0628\u0648\u062f\u0646\u062f.\n\n\u0637\u0628\u0642 \u06af\u0632\u0627\u0631\u0634 Censys\u060c \u0628\u06cc\u0634 \u0627\u0632 1500 \u062f\u0633\u062a\u06af\u0627\u0647 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u062f\u0631 \u0634\u0628\u06a9\u0647 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f .\n\nCVE-2024-40891 \u0628\u0633\u06cc\u0627\u0631 \u0634\u0628\u06cc\u0647 \u0628\u0647 CVE-2024-40890 \u0627\u0633\u062a\u060c \u062a\u0641\u0627\u0648\u062a \u0627\u0635\u0644\u06cc \u0627\u06cc\u0646 \u0627\u0633\u062a \u06a9\u0647 \u0627\u0648\u0644\u06cc \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 Telnet \u0648 \u062f\u0648\u0645\u06cc \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 HTTP \u0627\u0633\u062a.\n\n \u0647\u0631 \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0646\u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u0646\u062f \u062a\u0627 \u062f\u0633\u062a\u0648\u0631\u0627\u062a \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062d\u0633\u0627\u0628\u200c\u0647\u0627\u06cc \u0633\u0631\u0648\u06cc\u0633 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f.\n\nVulnCheck \u06af\u0641\u062a \u06a9\u0647 \u062f\u0631 \u062d\u0627\u0644 \u0647\u0645\u06a9\u0627\u0631\u06cc \u0628\u0627 \u0634\u0631\u06a9\u062a \u062a\u0627\u06cc\u0648\u0627\u0646\u06cc \u062f\u0631 \u0631\u0648\u0646\u062f \u0627\u0641\u0634\u0627 \u0627\u0633\u062a.\n\nZyxel \u0647\u0646\u0648\u0632 \u062f\u0631 \u0645\u0648\u0631\u062f \u0627\u06cc\u0646 \u0648\u0636\u0639\u06cc\u062a \u0627\u0638\u0647\u0627\u0631 \u0646\u0638\u0631 \u0646\u06a9\u0631\u062f\u0647 \u0627\u0633\u062a.\n\n\u0628\u0647 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u06a9\u0647 \u062a\u0631\u0627\u0641\u06cc\u06a9 \u0631\u0627 \u0628\u0631\u0627\u06cc \u062f\u0631\u062e\u0648\u0627\u0633\u062a \u0647\u0627\u06cc HTTP \u063a\u06cc\u0631\u0645\u0639\u0645\u0648\u0644 \u0628\u0647 \u0631\u0627\u0628\u0637 \u0647\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a Zyxel CPE \u0641\u06cc\u0644\u062a\u0631 \u06a9\u0646\u0646\u062f \u0648 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0631\u0627\u0628\u0637 \u0627\u062f\u0627\u0631\u06cc \u0631\u0627 \u0628\u0647 \u0622\u062f\u0631\u0633 \u0647\u0627\u06cc IP \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u0645\u062d\u062f\u0648\u062f \u06a9\u0646\u0646\u062f.\n\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-02-07T10:00:26.000000Z"}, {"uuid": "ede9e1b0-9080-4edd-ac8b-c607aa5a8733", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22219", "type": "seen", "source": "https://t.me/cvedetector/16790", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22219 - VMware Aria Operations for Logs XSS Stored\", \n  \"Content\": \"CVE ID : CVE-2025-22219 \nPublished : Jan. 30, 2025, 4:15 p.m. | 48\u00a0minutes ago \nDescription : VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with non-administrative privileges may be able to inject a malicious script that  (can perform stored cross-site scripting) may lead to arbitrary operations as admin\u00a0user. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T18:26:51.000000Z"}, {"uuid": "8d6deb1c-b5e7-4184-aea2-4c3feb11ecb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22214", "type": "seen", "source": "https://t.me/cvedetector/14090", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22214 - Landray EIS Web Application SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-22214 \nPublished : Jan. 2, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Landray EIS 2001 through 2006 allows Message/fi_message_receiver.aspx?replyid= SQL injection. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T05:52:55.000000Z"}, {"uuid": "4dfeb77a-4485-40cf-a95a-b99eb9e5acdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://t.me/thehackernews/6248", "content": "\ud83d\udea8 WATCH OUT: A new vulnerability, CVE-2025-22217, in VMware Avi Load Balancer could give attackers full access to your databases!\n\nNo workarounds\u2014only updates will protect you.\n\nRunning affected versions? Learn more: https://thehackernews.com/2025/01/broadcom-warns-of-high-severity-sql.html", "creation_timestamp": "2025-01-29T07:22:42.000000Z"}, {"uuid": "c8ffdb77-4f2f-4566-9460-f1e3f2277142", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22214", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/315", "content": "CVE-2025-22214\n\nGET /Message/fi_message_receiver.aspx?replyid=1%20and%201=@@version--+ HTTP/1.1\n\n#exploit #poc #SQL", "creation_timestamp": "2025-01-08T10:03:09.000000Z"}, {"uuid": "6696d6a4-a4e7-442d-bb4e-ba720c88f0db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22215", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lfcp25455k2v", "content": "", "creation_timestamp": "2025-01-09T12:38:11.190226Z"}, {"uuid": "3a913214-5b1d-45d2-86c5-3f77b6c37bb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22214", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leq7oqewyk25", "content": "", "creation_timestamp": "2025-01-02T04:15:27.162685Z"}, {"uuid": "7967501d-bc92-47d5-8bb8-6384c0e7c7b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22214", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3leqesws6ib2g", "content": "", "creation_timestamp": "2025-01-02T05:47:18.056895Z"}, {"uuid": "fd7974fb-17f7-4417-8f22-3a21bce4da2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22214", "type": "seen", "source": "https://mastodon.social/users/hrbrmstr/statuses/113758373534487716", "content": "", "creation_timestamp": "2025-01-02T10:50:26.690065Z"}, {"uuid": "6928591c-be77-46e4-96a7-32f24c22d1f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22214", "type": "seen", "source": "https://bsky.app/profile/hrbrmstr.mastodon.social.ap.brid.gy/post/3leqvrevf45y2", "content": "", "creation_timestamp": "2025-01-02T10:51:33.267047Z"}, {"uuid": "50e13524-af67-4386-b27d-c6557019e53e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22215", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf7ml7z4ar2e", "content": "", "creation_timestamp": "2025-01-08T07:16:03.881206Z"}, {"uuid": "4681f8e4-6220-4f69-a5fa-0c0f24130c3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22215", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7rqqwjmt2g", "content": "", "creation_timestamp": "2025-01-08T08:48:40.855807Z"}, {"uuid": "1ed4fe32-e181-4657-af0d-4b9dcbb8237d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgxrnvsxdy2e", "content": "", "creation_timestamp": "2025-01-30T15:16:07.657505Z"}, {"uuid": "87d1f285-dce9-4b6b-be9d-7ecf5d1d933c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-22216", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113921401906770867", "content": "", "creation_timestamp": "2025-01-31T05:50:41.863849Z"}, {"uuid": "b95fbb65-7216-4186-99a3-32c96c6a2aab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgt64aflsx2f", "content": "", "creation_timestamp": "2025-01-28T19:15:35.044870Z"}, {"uuid": "a9c1c07e-cb8b-48ef-9ad2-8414085762a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/seifreed.bsky.social/post/3lgt6hwxgq42k", "content": "", "creation_timestamp": "2025-01-28T19:22:07.757719Z"}, {"uuid": "455badde-8206-4492-8adc-601b47b834b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22216", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgzi4pmofc2w", "content": "", "creation_timestamp": "2025-01-31T07:30:50.278953Z"}, {"uuid": "34327a1e-a309-4780-81ac-5b2adc6b701e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113907945396892439", "content": "", "creation_timestamp": "2025-01-28T20:49:39.453481Z"}, {"uuid": "c25bfd5f-dbb9-474b-860b-987085ab4c87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-5e34ce14-99365f6ffddfa91c", "content": "", "creation_timestamp": "2025-01-31T07:41:25.717180Z"}, {"uuid": "8e481a91-0079-47b6-a47f-51dcfd7afa03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22219", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-5e34ce14-99365f6ffddfa91c", "content": "", "creation_timestamp": "2025-01-31T07:41:25.770052Z"}, {"uuid": "b65249a2-2282-48f8-9655-e295aece756e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-5e34ce14-99365f6ffddfa91c", "content": "", "creation_timestamp": "2025-01-31T07:41:26.070505Z"}, {"uuid": "0d7c2993-12f1-4ff0-b052-ec76fa55c917", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113912632267283246", "content": "", "creation_timestamp": "2025-01-29T16:40:28.431895Z"}, {"uuid": "9004f766-4a4f-4255-9a78-bbc35433af76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22218", "type": "seen", "source": "https://bsky.app/profile/fisjkars.bsky.social/post/3lh2jnulsyc2x", "content": "", "creation_timestamp": "2025-01-31T17:30:56.734709Z"}, {"uuid": "ce4dfa37-1a4b-4a52-a065-47e3a5ff9763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lguadoxl3r2m", "content": "", "creation_timestamp": "2025-01-29T05:28:12.777053Z"}, {"uuid": "fd5b5de0-5ec5-4444-887a-7660160a7175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lguaf5fk5222", "content": "", "creation_timestamp": "2025-01-29T05:29:04.184197Z"}, {"uuid": "ea1b3f50-3ab7-473a-a94b-06c24e6b7d91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3lgxgzbkzdb2c", "content": "", "creation_timestamp": "2025-01-30T12:05:38.901387Z"}, {"uuid": "3b8445e1-e7d6-44bb-b9a1-44132b6bbdeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lgubiwurvs2h", "content": "", "creation_timestamp": "2025-01-29T05:49:02.859832Z"}, {"uuid": "459ece50-be1a-4040-bac1-3cc28e550c71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113907434704963944", "content": "", "creation_timestamp": "2025-01-28T18:38:39.160231Z"}, {"uuid": "2608b8cb-d143-43d1-9a00-3f2bc413c70b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22217", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907442876297445", "content": "", "creation_timestamp": "2025-01-28T18:40:44.030889Z"}]}