{"vulnerability": "cve-2025-2676", "sightings": [{"uuid": "ccbb9537-5293-43f8-9a94-68adbdf55c9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26763", "type": "seen", "source": "https://t.me/cvedetector/18729", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26763 - MetaSlider Responsive Slider Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26763 \nPublished : Feb. 22, 2025, 4:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in MetaSlider Responsive Slider by MetaSlider allows Object Injection. This issue affects Responsive Slider by MetaSlider: from n/a through 3.94.0. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T19:10:17.000000Z"}, {"uuid": "ab8a59b0-9c8e-4a79-bd59-c0f1d7735db9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26760", "type": "seen", "source": "https://t.me/cvedetector/18728", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26760 - Wow-Company Calculator Builder PHP Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26760 \nPublished : Feb. 22, 2025, 4:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Wow-Company Calculator Builder allows PHP Local File Inclusion. This issue affects Calculator Builder: from n/a through 1.6.2. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T19:10:16.000000Z"}, {"uuid": "e5449ce9-247d-4345-b09a-3c926b7fcb31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26764", "type": "seen", "source": "https://t.me/cvedetector/18730", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26764 - Enituretechnology Distance Based Shipping Calculator Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26764 \nPublished : Feb. 22, 2025, 4:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : Missing Authorization vulnerability in enituretechnology Distance Based Shipping Calculator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Distance Based Shipping Calculator: from n/a through 2.0.22. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T19:10:18.000000Z"}, {"uuid": "77fc1fd1-e97d-465c-a0f3-8517866c837f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2676", "type": "seen", "source": "https://t.me/cvedetector/20929", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2676 - PHPGurukul Bank Locker Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2676 \nPublished : March 24, 2025, 1:15 a.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file /add-subadmin.php. The manipulation of the argument sadminusername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T04:11:16.000000Z"}, {"uuid": "44a408e1-84fa-44f1-a578-f85fd7e3aa50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26763", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114048796331755571", "content": "", "creation_timestamp": "2025-02-22T17:48:47.158622Z"}, {"uuid": "cdddb246-d331-42cb-95e2-3597017192a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26763", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lis24pnknx2g", "content": "", "creation_timestamp": "2025-02-22T19:22:00.199796Z"}, {"uuid": "47ac34a3-6263-4972-bd1a-e0a7064b3ded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26763", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lisjnzvmb22r", "content": "", "creation_timestamp": "2025-02-23T00:00:08.062328Z"}, {"uuid": "20ac3851-78e6-4ce0-9168-ee55fe51cd72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26769", "type": "seen", "source": "https://t.me/cvedetector/18251", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26769 - Webilia Inc. Vertex Addons for Elementor Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26769 \nPublished : Feb. 17, 2025, 12:15 p.m. | 30\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilia Inc. Vertex Addons for Elementor allows Stored XSS. This issue affects Vertex Addons for Elementor: from n/a through 1.2.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T14:02:15.000000Z"}, {"uuid": "82aa0dc8-0864-4c53-bc64-06317bdcd31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26761", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4710", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26761\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-17T00:40:25.000000Z"}, {"uuid": "d6765130-c90a-4a46-bb78-118404aa751d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26766", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4708", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26766\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-17T00:40:24.000000Z"}, {"uuid": "2308b60b-8141-480e-b732-8e0943ae5909", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26767", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4707", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26767\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-17T00:40:23.000000Z"}, {"uuid": "65423fcc-bb33-4414-86ab-f6ef41839917", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26768", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4706", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26768\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-17T00:40:19.000000Z"}, {"uuid": "67c8de80-3fe1-4dd1-90bc-3b8914185bef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26762", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9125", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26762\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic WooCommerce allows Stored XSS.This issue affects WooCommerce: from n/a through 9.7.0.\n\ud83d\udccf Published: 2025-03-27T15:52:22.683Z\n\ud83d\udccf Modified: 2025-03-27T16:17:11.478Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/woocommerce/vulnerability/wordpress-woocommerce-plugin-9-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T16:26:47.000000Z"}, {"uuid": "9501f37c-fb52-436e-9f10-b16fa002e724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2676", "type": "published-proof-of-concept", "source": "Telegram/TxYF2rNxgao0QlSERqOAIAGczvgtgedogrr1QU2ew4YiRfY", "content": "", "creation_timestamp": "2025-03-24T02:31:04.000000Z"}, {"uuid": "1c64f72a-bd66-4179-9562-11cd121daca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26763", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114054070460495673", "content": "", "creation_timestamp": "2025-02-23T16:10:03.308204Z"}, {"uuid": "b52ea973-0dc1-47f7-8895-afe210d8056b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2676", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll3vwkwvpj2w", "content": "", "creation_timestamp": "2025-03-24T04:24:00.547955Z"}, {"uuid": "8de78be8-aa67-4809-be7a-d5ca509e5559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26769", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114019106704298845", "content": "", "creation_timestamp": "2025-02-17T11:58:18.903323Z"}, {"uuid": "bd443cbd-1f91-4227-86a2-ab578f43c11b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26769", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3liepya2vv72y", "content": "", "creation_timestamp": "2025-02-17T12:15:55.041477Z"}, {"uuid": "caf36b33-8bc4-4aa4-b6c0-328bed68752a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26769", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liezyx3vq42e", "content": "", "creation_timestamp": "2025-02-17T15:15:20.413678Z"}, {"uuid": "87b56060-4866-466c-98cb-28e93b8e1be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26765", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4709", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26765\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-17T00:40:24.000000Z"}, {"uuid": "9657a701-010f-4e29-bb32-93130478209b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26764", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5034", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26764\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Missing Authorization vulnerability in enituretechnology Distance Based Shipping Calculator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Distance Based Shipping Calculator: from n/a through 2.0.22.\n\ud83d\udccf Published: 2025-02-22T15:52:47.845Z\n\ud83d\udccf Modified: 2025-02-22T15:52:47.845Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/distance-based-shipping-calculator/vulnerability/wordpress-distance-based-shipping-calculator-plugin-2-0-22-settings-change-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-22T16:25:02.000000Z"}, {"uuid": "d9c66e16-dcc4-4128-add2-a8a67bbae375", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26760", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5036", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26760\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Wow-Company Calculator Builder allows PHP Local File Inclusion. This issue affects Calculator Builder: from n/a through 1.6.2.\n\ud83d\udccf Published: 2025-02-22T15:52:47.316Z\n\ud83d\udccf Modified: 2025-02-22T15:52:47.316Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/calculator-builder/vulnerability/wordpress-calculator-builder-plugin-1-6-2-local-file-inclusion-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-22T16:25:04.000000Z"}, {"uuid": "3aa6ee85-b228-4e84-89f2-567b9dc84244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26763", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5035", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26763\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Deserialization of Untrusted Data vulnerability in MetaSlider Responsive Slider by MetaSlider allows Object Injection. This issue affects Responsive Slider by MetaSlider: from n/a through 3.94.0.\n\ud83d\udccf Published: 2025-02-22T15:52:47.516Z\n\ud83d\udccf Modified: 2025-02-22T15:52:47.516Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/ml-slider/vulnerability/wordpress-slider-gallery-and-carousel-by-metaslider-image-slider-video-slider-plugin-3-94-0-php-object-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-22T16:25:03.000000Z"}, {"uuid": "d5d93d98-b298-405a-8f88-cc9800e2c883", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26761", "type": "seen", "source": "https://t.me/cvedetector/18206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26761 - HashThemes Easy Elementor Addons Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26761 \nPublished : Feb. 16, 2025, 11:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Easy Elementor Addons allows DOM-Based XSS. This issue affects Easy Elementor Addons: from n/a through 2.1.5. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T01:29:25.000000Z"}, {"uuid": "1ff51477-e110-45f8-ae74-0294d1095321", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26767", "type": "seen", "source": "https://t.me/cvedetector/18200", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26767 - Themeum Qubely Stored Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26767 \nPublished : Feb. 16, 2025, 11:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Qubely \u2013 Advanced Gutenberg Blocks allows Stored XSS. This issue affects Qubely \u2013 Advanced Gutenberg Blocks: from n/a through 1.8.12. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T01:29:18.000000Z"}, {"uuid": "009e05c4-f1ea-49ef-8343-18bc872b6d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26766", "type": "seen", "source": "https://t.me/cvedetector/18199", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26766 - VaultDweller Leyka Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26766 \nPublished : Feb. 16, 2025, 11:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VaultDweller Leyka allows Stored XSS. This issue affects Leyka: from n/a through 3.31.8. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T01:29:18.000000Z"}, {"uuid": "be156d2e-5783-464a-ba64-8d1a06c6238c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26768", "type": "seen", "source": "https://t.me/cvedetector/18198", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26768 - What3words CSRF Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26768 \nPublished : Feb. 16, 2025, 11:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in what3words what3words Address Field allows Stored XSS. This issue affects what3words Address Field: from n/a through 4.0.15. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T01:29:17.000000Z"}, {"uuid": "22c21e72-26c6-42d4-b0dd-b77e4e765d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26765", "type": "seen", "source": "https://t.me/cvedetector/18197", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26765 - Enituretechnology Distance Based Shipping Calculator Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26765 \nPublished : Feb. 16, 2025, 11:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Missing Authorization vulnerability in enituretechnology Distance Based Shipping Calculator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Distance Based Shipping Calculator: from n/a through 2.0.22. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T01:29:16.000000Z"}, {"uuid": "16a0d658-5376-4124-b115-4cbe63a1bf84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26763", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3litrvi5hlk2r", "content": "", "creation_timestamp": "2025-02-23T12:00:06.923183Z"}, {"uuid": "4b64b5d8-3451-47b7-8019-dff025b1d492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26761", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114016102210739070", "content": "", "creation_timestamp": "2025-02-16T23:14:13.879133Z"}, {"uuid": "7c6f50b1-cfa8-44ae-b6f3-373763a76cad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26765", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114016102225300876", "content": "", "creation_timestamp": "2025-02-16T23:14:14.186508Z"}, {"uuid": "ca41c724-9ffa-4b9c-bd55-42693429806f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26766", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114016102239466875", "content": "", "creation_timestamp": "2025-02-16T23:14:14.365215Z"}, {"uuid": "29083ce5-f583-421f-a30a-af324266f48a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26767", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114016102254909216", "content": "", "creation_timestamp": "2025-02-16T23:14:15.031807Z"}, {"uuid": "c2402b79-e598-49bd-9aed-41d5eb89ca24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26761", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lideg4cfec2i", "content": "", "creation_timestamp": "2025-02-16T23:16:15.839796Z"}, {"uuid": "3da8f7c4-5838-4819-bdeb-a3da462f4403", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26765", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lideg6j23e2o", "content": "", "creation_timestamp": "2025-02-16T23:16:18.218877Z"}, {"uuid": "dbb6b41f-761c-4496-888a-1a810e25ea3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26766", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lidegapxrx2n", "content": "", "creation_timestamp": "2025-02-16T23:16:20.573766Z"}, {"uuid": "6c03e37a-030b-42ad-ae35-169438a17613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26767", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lidegdc36b2p", "content": "", "creation_timestamp": "2025-02-16T23:16:23.249875Z"}, {"uuid": "08a3babe-8b8f-4372-ad82-5a26ddd74feb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26768", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lidegfjb2p2n", "content": "", "creation_timestamp": "2025-02-16T23:16:25.504803Z"}, {"uuid": "455e46e7-b571-48a1-899a-0aa63eedaa11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26768", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114016161254010886", "content": "", "creation_timestamp": "2025-02-16T23:29:16.247491Z"}, {"uuid": "2212305b-5f1d-4772-9391-f180978a7d38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26768", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lidq4jgmbw2a", "content": "", "creation_timestamp": "2025-02-17T02:45:39.154805Z"}, {"uuid": "dfbe93dc-0620-4ba4-b83d-c7b511de85d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26761", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lidq4k4j2b2z", "content": "", "creation_timestamp": "2025-02-17T02:45:42.016848Z"}, {"uuid": "fe2cea35-07de-4e98-91da-dfc99e53a566", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26767", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lidq4kctu724", "content": "", "creation_timestamp": "2025-02-17T02:45:43.149643Z"}, {"uuid": "b245c366-ed79-4985-a653-40c6161a9f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26766", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lidq4kg62g2a", "content": "", "creation_timestamp": "2025-02-17T02:45:43.667963Z"}, {"uuid": "70d0810d-6bde-4c52-a941-46d22d33803d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26765", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lidq4ktjvj2e", "content": "", "creation_timestamp": "2025-02-17T02:45:45.985899Z"}, {"uuid": "9f3ecb95-17d8-4611-b8a5-0b56369f99a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26761", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:43.000000Z"}, {"uuid": "3bbeb472-c1b2-429d-8505-8208f911c19c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26765", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:43.000000Z"}, {"uuid": "2e710cad-8b80-48e2-8a27-5a98ac2df86f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26767", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "83eb8e4d-8a2d-40f0-9897-074c0cd602da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26768", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "1334e6d1-93ce-4fa4-a037-fad10a1f527b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26766", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}]}