{"vulnerability": "cve-2025-2678", "sightings": [{"uuid": "90101d1d-b64a-4dce-aa6a-1214cc139d3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://bsky.app/profile/tech-trending.bsky.social/post/3lvnmhmhvrw2d", "content": "", "creation_timestamp": "2025-08-05T11:34:25.940574Z"}, {"uuid": "3c566ac6-17f8-4f57-b56a-d64fc2b23d12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://bsky.app/profile/topickapp.bsky.social/post/3lvoy74rzjp2a", "content": "", "creation_timestamp": "2025-08-06T00:37:06.973131Z"}, {"uuid": "b29cb8a6-f402-49e6-9550-b03252ff5d34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://bsky.app/profile/coo3.bsky.social/post/3lvp4tnzd7e2b", "content": "", "creation_timestamp": "2025-08-06T02:00:09.375315Z"}, {"uuid": "504e1b4e-86ee-4b27-bdc5-efca81f24339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lvp53uises26", "content": "", "creation_timestamp": "2025-08-06T02:04:44.292994Z"}, {"uuid": "9b12837d-c203-46a3-9825-11615363f71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://bsky.app/profile/technews4869.bsky.social/post/3lvpi75bfff2d", "content": "", "creation_timestamp": "2025-08-06T05:23:25.415976Z"}, {"uuid": "821b3cd1-00c8-4537-832e-cfa3a592de71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://bsky.app/profile/azu.bsky.social/post/3lvsvltev2i2z", "content": "", "creation_timestamp": "2025-08-07T14:01:08.945945Z"}, {"uuid": "da1c5ced-fdab-4160-ba01-514b3ce117e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwud7ah54u26", "content": "", "creation_timestamp": "2025-08-20T21:02:37.569311Z"}, {"uuid": "bca383ad-7f33-492e-8919-4c8b283c62d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "Telegram/fYmUSSdRUbWzNR0Ay2biaiGEfW_BIUJrK1R16C_nb4h1XSmo", "content": "", "creation_timestamp": "2025-02-14T21:08:29.000000Z"}, {"uuid": "be41dc16-b3cb-48f6-a5cd-95c6ee145312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26789", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4435", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26789\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Logpoint AgentX before 1.5.0. A vulnerability caused by limited access controls allowed li-admin users to access sensitive information about AgentX Manager in a Logpoint deployment.\n\ud83d\udccf Published: 2025-02-14T09:31:22Z\n\ud83d\udccf Modified: 2025-02-14T09:31:22Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26789\n2. https://servicedesk.logpoint.com/hc/en-us/articles/24749416515741-Unauthorized-information-access-due-to-inadequate-access-controls", "creation_timestamp": "2025-02-14T10:10:43.000000Z"}, {"uuid": "9c5fe8db-b79d-4591-944c-e568d6b86a48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4433", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26788\n\ud83d\udd25 CVSS Score: 8.6 (CVSS_V3)\n\ud83d\udd39 Description: StrongKey FIDO Server before 4.15.1 treats a non-discoverable (namedcredential) flow as a discoverable transaction.\n\ud83d\udccf Published: 2025-02-14T09:31:22Z\n\ud83d\udccf Modified: 2025-02-14T09:31:22Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26788\n2. https://docs.strongkey.com/index.php/skfs-v3/skfs-release-notes", "creation_timestamp": "2025-02-14T10:10:39.000000Z"}, {"uuid": "8bfb420b-bf03-481f-abe2-a3a3c40c3b6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26784", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16337", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26784\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in NAS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. The lack of a length check leads to out-of-bounds writes.\n\ud83d\udccf Published: 2025-05-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-14T17:05:29.862Z\n\ud83d\udd17 References:\n1. https://semiconductor.samsung.com/support/quality-support/product-security-updates/\n2. https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-26784/", "creation_timestamp": "2025-05-14T17:32:07.000000Z"}, {"uuid": "61cefa2c-8ace-47fa-88c4-e72ecbacd145", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26783", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16424", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26783\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in RRC in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, W1000, Modem 5300, and Modem 5400. Incorrect handling of undefined values leads to a Denial of Service.\n\ud83d\udccf Published: 2025-05-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-14T20:39:30.904Z\n\ud83d\udd17 References:\n1. https://semiconductor.samsung.com/support/quality-support/product-security-updates/\n2. https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-26783/", "creation_timestamp": "2025-05-14T21:32:31.000000Z"}, {"uuid": "f593eb0c-821b-4441-9dd8-4b8f2bf2edd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "Telegram/4MAjskc6WgKSvWWxo3ZsX-_RS0rhx40VtT9aQgfqSvz4q9Ah", "content": "", "creation_timestamp": "2025-02-14T10:09:25.000000Z"}, {"uuid": "ba686b24-dac0-4a44-9cf8-da8d4676adf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "Telegram/De2Vux3nHRmvngNpfzoUd6NCBz0vQhXrYtNW9rleS0jSQE8", "content": "", "creation_timestamp": "2025-02-14T09:30:28.000000Z"}, {"uuid": "b3206fd2-b136-405a-a7d4-0eee4e80e872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26789", "type": "seen", "source": "Telegram/QL7EydzqFAZhp45yLE4a_YMuFeQvlDazzsyexsG7L7LYg-V1", "content": "", "creation_timestamp": "2025-02-14T21:08:29.000000Z"}, {"uuid": "09908f2f-c21e-4453-89ed-f46ae3b96957", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26785", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16354", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26785\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in NAS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. The lack of a length check leads to out-of-bounds writes.\n\ud83d\udccf Published: 2025-05-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-14T16:33:59.869Z\n\ud83d\udd17 References:\n1. https://semiconductor.samsung.com/support/quality-support/product-security-updates/\n2. https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-26785/", "creation_timestamp": "2025-05-14T17:32:26.000000Z"}, {"uuid": "c59ab978-4d4d-4e97-ade9-da751e0ea889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26789", "type": "seen", "source": "https://t.me/cvedetector/18080", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26789 - Logpoint AgentX Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26789 \nPublished : Feb. 14, 2025, 8:15 a.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : An issue was discovered in Logpoint AgentX before 1.5.0. A vulnerability caused by limited access controls allowed li-admin users to access sensitive information about AgentX Manager in a Logpoint deployment. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T11:34:38.000000Z"}, {"uuid": "38eb8738-db1e-4659-8308-5c8bed932329", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2678", "type": "seen", "source": "Telegram/49SDfkIIaCuiGgZfjVeF0mADAK3vvSmh3i9Ko6dUbVF5yIg", "content": "", "creation_timestamp": "2025-03-24T03:30:54.000000Z"}, {"uuid": "31bf1668-f9ad-499c-8981-9fbda10cdd91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2678", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll3vwl6bww2m", "content": "", "creation_timestamp": "2025-03-24T04:24:01.693939Z"}, {"uuid": "5cd53124-8e9f-40d2-acc6-d6f76178a46c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://gist.github.com/getter-io/1ad7f939580a5989518ea7303c0d8d66", "content": "", "creation_timestamp": "2025-12-27T16:58:18.000000Z"}, {"uuid": "fd5e7c56-77a4-4948-ab04-2227eb001314", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4569", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26788\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-14T08:15:31.183\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://docs.strongkey.com/index.php/skfs-v3/skfs-release-notes\n2. https://www.securing.pl/en/cve-2025-26788-passkey-authentication-bypass-in-strongkey-fido-server/", "creation_timestamp": "2025-02-15T17:11:10.000000Z"}, {"uuid": "37337fd3-828d-4099-abf6-43f90ff42c2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://t.me/cvedetector/18079", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26788 - StrongKey FIDO Server Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-26788 \nPublished : Feb. 14, 2025, 8:15 a.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : StrongKey FIDO Server before 4.15.1 treats a non-discoverable (namedcredential) flow as a discoverable transaction. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T11:34:37.000000Z"}, {"uuid": "aea716fd-d929-49ba-a73d-8c47222cc731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2678", "type": "seen", "source": "https://t.me/cvedetector/20935", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2678 - PHPGurukul Bank Locker Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-2678 \nPublished : March 24, 2025, 3:15 a.m. | 1\u00a0hour, 35\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Bank Locker Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /changeimage1.php. The manipulation of the argument editid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T05:51:34.000000Z"}, {"uuid": "f6010ad2-4be4-490d-a062-9a3afbd45581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "Telegram/ADdNux7ySS0pmtrCCNwIh0MLUU2VLVt61_4oWOWKlyFIZjFh", "content": "", "creation_timestamp": "2025-02-15T23:50:18.000000Z"}, {"uuid": "58e21f71-ebfa-4eb8-95dd-eb496331e02a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114001117806184646", "content": "", "creation_timestamp": "2025-02-14T07:43:30.052883Z"}, {"uuid": "026ea9cb-398f-46e7-a2aa-8d1942e4e8d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26789", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114001163436210656", "content": "", "creation_timestamp": "2025-02-14T07:55:06.305323Z"}, {"uuid": "73fdbbde-6545-40f7-bcd7-8f15a9c28efb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li4r6djxlw2g", "content": "", "creation_timestamp": "2025-02-14T08:15:55.567875Z"}, {"uuid": "dc15801d-0142-499d-9dc6-78f91f408381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26789", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li4r6gdwiw2g", "content": "", "creation_timestamp": "2025-02-14T08:15:58.655654Z"}, {"uuid": "0e15d031-3a7b-4355-9e48-b64fcf633173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114001373190356995", "content": "", "creation_timestamp": "2025-02-14T08:48:27.673857Z"}, {"uuid": "37c64108-2686-4d01-a6cb-06ce4ded4913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26788", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li4vbyp57z24", "content": "", "creation_timestamp": "2025-02-14T09:29:33.528494Z"}, {"uuid": "644b7206-8d2f-472d-aee0-f09887a975cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26789", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li4zi7uhv52e", "content": "", "creation_timestamp": "2025-02-14T10:44:37.219711Z"}, {"uuid": "bdd3078f-b042-4e50-b159-d9d47a720840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26783", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp63wiqzud2n", "content": "", "creation_timestamp": "2025-05-14T22:57:33.324740Z"}]}