{"vulnerability": "cve-2025-2626", "sightings": [{"uuid": "03a3d053-5b3a-4310-85d3-36fcaf33ea47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2626", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkyp56yz3s2w", "content": "", "creation_timestamp": "2025-03-22T21:44:27.659728Z"}, {"uuid": "5624c052-bad3-439a-a5fd-68d5b6ac168e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26268", "type": "seen", "source": "https://gist.github.com/ankki-zsyang/6aebe2484fdb05757ecdf164e2184256", "content": "", "creation_timestamp": "2025-04-22T08:22:54.000000Z"}, {"uuid": "8f7f38c6-2183-4dc4-a43d-0e822731574d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26263", "type": "seen", "source": "https://t.me/cvedetector/19173", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26263 - GeoVision ASManager Windows Desktop Application Credentials Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-26263 \nPublished : Feb. 28, 2025, 4:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T19:32:30.000000Z"}, {"uuid": "34c02650-892a-49b9-be49-9ee5ceba802e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26263", "type": "seen", "source": "https://t.me/GithubRedTeam/15676", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-25369\nURL\uff1ahttps://github.com/DRAGOWN/CVE-2025-26263\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-02-26T17:43:25.000000Z"}, {"uuid": "f3360b21-4cdf-4c6e-9501-62082efed084", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2626", "type": "seen", "source": "https://t.me/cvedetector/20882", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2626 - SourceCodester Kortex Lite Advocate Office Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-2626 \nPublished : March 22, 2025, 9:15 p.m. | 24\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This vulnerability affects unknown code of the file edit_case.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-22T22:55:02.000000Z"}, {"uuid": "f5981d6c-2d1e-48af-b1cc-19980118513b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26264", "type": "seen", "source": "Telegram/LfirbBZErsNVvkFEZw1vNqrb9PDUpi_H9o2PpIb1pREaKEWr", "content": "", "creation_timestamp": "2025-03-02T11:44:21.000000Z"}, {"uuid": "80e74947-3f9b-40fa-b884-c8e29d430079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26264", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114083241491741927", "content": "", "creation_timestamp": "2025-02-28T19:49:12.733979Z"}, {"uuid": "06a52fa3-62db-4409-9f60-2d6f9e5c394d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26269", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmzrqzhnnw2v", "content": "", "creation_timestamp": "2025-04-17T18:54:27.836321Z"}, {"uuid": "440b6f83-f722-4115-ae83-e7ad5f7ea77d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26268", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmzrqzkuas2b", "content": "", "creation_timestamp": "2025-04-17T18:54:28.370648Z"}, {"uuid": "0db65658-3640-4011-ae11-319760310c49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26263", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:29.000000Z"}, {"uuid": "f040b3ac-ce40-4cf6-ab8c-641770937936", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26264", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/15681", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-25369\nURL\uff1ahttps://github.com/DRAGOWN/CVE-2025-26264\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-02-26T18:12:45.000000Z"}, {"uuid": "e9dc72cd-01fd-44c3-9217-7c2bf3f6946d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26264", "type": "seen", "source": "https://t.me/cvedetector/19104", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26264 - GeoVision GV-ASWeb Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26264 \nPublished : Feb. 27, 2025, 10:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with \"System Settings\" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T01:08:21.000000Z"}, {"uuid": "a9976db5-4e53-4fe5-8878-138ff4940b98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26264", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5936", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26264\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with \"System Settings\" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T17:14:18.513Z\n\ud83d\udd17 References:\n1. https://github.com/DRAGOWN/CVE-2025-26264", "creation_timestamp": "2025-02-28T17:27:26.000000Z"}, {"uuid": "23dac56c-75ea-474c-ba67-a6e9caa16252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26265", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9378", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26265\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A segmentation fault in openairinterface5g v2.1.0 allows attackers to cause a Denial of Service (DoS) via a crafted UE Context Modification response.\n\ud83d\udccf Published: 2025-03-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-28T15:11:43.885Z\n\ud83d\udd17 References:\n1. https://gitlab.eurecom.fr/oai/openairinterface5g\n2. https://www.sigmobile.org/mobicom/2025/\n3. https://anonymous.4open.science/r/Mobicom-ARCANE-36B7/README.md", "creation_timestamp": "2025-03-28T15:28:53.000000Z"}, {"uuid": "cc697af8-8554-428a-8cc9-6334f8b3652d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26268", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12293", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26268\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: DragonflyDB Dragonfly before 1.27.0 allows authenticated users to cause a denial of service (daemon crash) via a crafted Redis command. The validity of the scan cursor was not checked.\n\ud83d\udccf Published: 2025-04-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T17:48:47.667Z\n\ud83d\udd17 References:\n1. https://github.com/dragonflydb/dragonfly/issues/4466\n2. https://github.com/dragonflydb/dragonfly/commit/d1fac0f912edb323a2bdd6404c518cda21eac243\n3. https://github.com/dragonflydb/dragonfly/compare/v1.26.4...v1.27.0", "creation_timestamp": "2025-04-17T17:57:23.000000Z"}, {"uuid": "eb7f6d5b-f147-4e28-ac70-322ca4ad76f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26268", "type": "seen", "source": "https://t.me/cvedetector/23273", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26268 - DragonflyDB Redis Command Injection Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-26268 \nPublished : April 17, 2025, 6:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : DragonflyDB Dragonfly before 1.27.0 allows authenticated users to cause a denial of service (daemon crash) via a crafted Redis command. The validity of the scan cursor was not checked. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T23:01:11.000000Z"}, {"uuid": "5f0a368a-bf58-4a18-964b-dd6ab0930186", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26269", "type": "seen", "source": "https://t.me/cvedetector/23267", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26269 - DragonflyDB Lua Library Integer Overflow Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-26269 \nPublished : April 17, 2025, 6:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : DragonflyDB Dragonfly through 1.28.2 allows authenticated users to cause a denial of service (daemon crash) via a Lua library command that references a large negative integer. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T23:01:03.000000Z"}, {"uuid": "2699c214-5fab-4198-b4ed-85fe178a4d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26262", "type": "seen", "source": "https://t.me/cvedetector/24626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26262 - R-fx Networks Linux Malware Detect Arbitrary Code Execution and Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-26262 \nPublished : May 6, 2025, 5:15 p.m. | 50\u00a0minutes ago \nDescription : An issue in the component /internals/functions of R-fx Networks Linux Malware Detect v1.6.5 allows attackers to escalate privileges and execute arbitrary code via supplying a file that contains a crafted filename. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T20:20:18.000000Z"}, {"uuid": "241c72ad-e1dc-4962-b599-d5ee9e662b64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26260", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk7cptr6se2h", "content": "", "creation_timestamp": "2025-03-12T19:25:39.315083Z"}, {"uuid": "5bf892c5-0fe6-4268-a6a8-275eb51ea9dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26264", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lj7cctlqdp2w", "content": "", "creation_timestamp": "2025-02-28T01:53:12.221892Z"}, {"uuid": "e3c81326-af39-4310-bb69-ecbc3bade8b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26269", "type": "seen", "source": "https://gist.github.com/ankki-zsyang/d8215cf6e868d07546eaa5346a884ebd", "content": "", "creation_timestamp": "2025-04-22T08:40:16.000000Z"}, {"uuid": "0e79ad69-69f8-422e-ba16-dbd4c881b209", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26262", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lojis5wt6a2h", "content": "", "creation_timestamp": "2025-05-06T18:21:44.537322Z"}, {"uuid": "e322c2a0-b173-4448-bb77-6f7a3c9ecc65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26260", "type": "seen", "source": "https://t.me/cvedetector/20153", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26260 - Plenti Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26260 \nPublished : March 12, 2025, 4:15 p.m. | 2\u00a0hours, 58\u00a0minutes ago \nDescription : Plenti &lt;=\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-12T20:23:03.000000Z"}, {"uuid": "40601cf5-9f08-4f46-87e2-b192e4239814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26263", "type": "seen", "source": "Telegram/y8lkDRw0hxvFKAbm7r2wbQGUWnSCBfDUs3yFpnnsaLlIO0el", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}, {"uuid": "0b391d20-2428-4cc7-8c31-8950ea2029af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26263", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5919", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26263\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process.\n\ud83d\udccf Published: 2025-02-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T15:37:19.051Z\n\ud83d\udd17 References:\n1. https://www.geovision.com.tw/download/product/GV-ASManager\n2. https://github.com/DRAGOWN/CVE-2025-26263", "creation_timestamp": "2025-02-28T16:27:06.000000Z"}, {"uuid": "43875bb5-1395-4276-b266-f586807b52ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26264", "type": "seen", "source": "Telegram/By0L0qlUYEnvT2rFYEnEKaGfsJLg5yc-Qe9qf1JremOk9zJL", "content": "", "creation_timestamp": "2025-03-02T11:45:38.000000Z"}, {"uuid": "af33d284-6ca1-4202-a8fc-f6c2b5416fde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26264", "type": "published-proof-of-concept", "source": "Telegram/yKcGWhhQJwisJolliiSQ_Vwze7Rv8usdLxIEJwq6Laah_Gw", "content": "", "creation_timestamp": "2025-02-26T22:00:06.000000Z"}, {"uuid": "af8ae268-cee2-4ba0-a47b-e3b8bb82d8ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26263", "type": "published-proof-of-concept", "source": "Telegram/yKcGWhhQJwisJolliiSQ_Vwze7Rv8usdLxIEJwq6Laah_Gw", "content": "", "creation_timestamp": "2025-02-26T22:00:06.000000Z"}]}