{"vulnerability": "cve-2025-2679", "sightings": [{"uuid": "cf2d49a8-c90c-48f5-88e2-fc97e0798ad2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26795", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16299", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26795\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Information into Log File vulnerability in Apache IoTDB JDBC driver.\n\nThis issue affects iotdb-jdbc: from 0.10.0 through 1.3.3, from 2.0.1-beta before 2.0.2.\n\nUsers are recommended to upgrade to version 2.0.2 and 1.3.4, which fix the issue.\n\ud83d\udccf Published: 2025-05-14T10:43:05.586Z\n\ud83d\udccf Modified: 2025-05-14T11:04:03.962Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/bj0ytxr5wg0c4jw8xm7rhfd8ogho0r91", "creation_timestamp": "2025-05-14T11:31:20.000000Z"}, {"uuid": "36ad3e50-56ab-4e91-b903-567914f6c20a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://t.me/cvedetector/18177", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26793 - Hirsch Enterphone MESH Default Credentials Remote Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-26793 \nPublished : Feb. 15, 2025, 3:15 p.m. | 2\u00a0hours, 9\u00a0minutes ago \nDescription : The Web GUI configuration panel of Hirsch (formerly Identiv and Viscount) Enterphone MESH through 2024 ships with default credentials (username freedom, password viscount). The administrator is not prompted to change these credentials on initial configuration, and changing the credentials requires many steps. Attackers can use the credentials over the Internet via mesh.webadmin.MESHAdminServlet to gain access to dozens of Canadian and U.S. apartment buildings and obtain building residents' PII. NOTE: the Supplier's perspective is that the \"vulnerable systems are not following manufacturers' recommendations to change the default password.\" \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-15T18:32:44.000000Z"}, {"uuid": "74c0eb58-ea25-4336-a391-55eef78ce2a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://t.me/cvedetector/18078", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26791 - DOMPurify Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-26791 \nPublished : Feb. 14, 2025, 9:15 a.m. | 49\u00a0minutes ago \nDescription : DOMPurify before 3.2.4 has an incorrect template literal regular expression, sometimes leading to mutation cross-site scripting (mXSS). \nSeverity: 4.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T11:34:37.000000Z"}, {"uuid": "c67c14ef-e704-475a-ade7-5adf96e9007b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26796", "type": "seen", "source": "https://t.me/cvedetector/20874", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26796 - Apache Oozie Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26796 \nPublished : March 22, 2025, 1:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : ** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Oozie.  \n  \nThis issue affects Apache Oozie: all versions.  \n  \nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.  \n  \nNOTE: This vulnerability only affects products that are no longer supported by the maintainer. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-22T17:03:53.000000Z"}, {"uuid": "fe8fbc75-dbd0-481a-9fce-b69091eea6a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://t.me/TheDarkWebInformer/12740", "content": "\ud83d\udea8Critical Security Vulnerability in Hirsch Enterphone MESH\n\n\ud83c\udd94 CVE: CVE-2025-26793\n\ud83d\udca3 CVSS Score: 10\n\ud83d\udcc5 Published Date: 25/02/15\n\u26a0\ufe0f Details: The Web GUI configuration panel of Hirsch (formerly Identiv and Viscount) Enterphone MESH through 2024 ships with default credentials (username freedom, password viscount).\n\nThe administrator is not prompted to change these credentials on initial configuration, and changing the credentials requires many steps.\n\nAttackers can use the credentials over the Internet via mesh.webadmin.MESHAdminServlet to gain access to dozens of Canadian and U.S. apartment buildings and obtain building residents' PII.\n\nNOTE: the Supplier's perspective is that the \"vulnerable systems are not following manufacturers' recommendations to change the default password.\"\n\nNIST: https://nvd.nist.gov/vuln/detail/CVE-2025-26793", "creation_timestamp": "2025-02-16T03:24:35.000000Z"}, {"uuid": "2c5e61e7-2b0a-42f3-9b86-ffe29380fbad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "Telegram/3GT86BmIcNKWzIPalD8QXNh7Iy10aMGWTShJlXoPqqSkG8AH", "content": "", "creation_timestamp": "2025-02-21T22:10:26.000000Z"}, {"uuid": "c0201a87-6c04-46b4-9ef4-ed7df9087142", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2679", "type": "seen", "source": "Telegram/1ji7ORYlPsQ67IthejQ--Bj4WTA7locBXszKDrQl4LKOZmY", "content": "", "creation_timestamp": "2025-03-24T04:30:46.000000Z"}, {"uuid": "d2f573dd-60d1-4615-95b0-f27ec497c583", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "Telegram/fTTQUt473lpTLYjrc1t9QRlbCBKDAQE_LrWMJyGrA-QyTNc", "content": "", "creation_timestamp": "2025-02-21T15:30:32.000000Z"}, {"uuid": "470a3c51-2f4f-4eb2-b4b3-bb97704afc23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "Telegram/HRFWaDjqeY_fpzeCSqzhWv8A8Iwvwd6ecxXYrypDj23qvzw", "content": "", "creation_timestamp": "2025-02-25T00:00:07.000000Z"}, {"uuid": "f7d9d569-da78-4f0f-971d-7cbba6e103cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "Telegram/CpguYZklIrMAN8zvyX37mcFn7tMfxbwX0jevRlAqdGB16ws", "content": "", "creation_timestamp": "2025-02-22T22:00:06.000000Z"}, {"uuid": "5f04f092-787c-4ae1-bf88-fc2dc660c300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "published-proof-of-concept", "source": "Telegram/6ndUr5ZxDykpKu_nvrei6RMp91VsHhTNsE6qg4K2Cto3_AU", "content": "", "creation_timestamp": "2025-02-15T17:00:23.000000Z"}, {"uuid": "4cf2578c-076a-48a1-a7fb-6916ecfa737e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "https://t.me/true_secator/6794", "content": "\u041f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u043c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043d\u0438\u043c\u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0432\u0435\u043a\u0442\u043e\u0440\u044b \u0430\u0442\u0430\u043a.\n\n1. Chamilo LMS \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u00ab\u0441\u043b\u0435\u043f\u0443\u044e\u00bb \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c SSRF, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0443\u044e Positive Technologies.\n\n2. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430 Exim \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f SQLi, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u043a\u0430\u043a CVE-2025-26794.\n\n3. VulnCheck \u0438\u0437\u0432\u043b\u0435\u043a\u043b\u0430 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0441\u043f\u0438\u0441\u043e\u043a \u0432\u0441\u0435\u0445 CVE, \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044b\u0445 \u0432 \u043d\u0435\u0434\u0430\u0432\u043d\u0435\u0439 \u0443\u0442\u0435\u0447\u043a\u0435 \u043f\u0435\u0440\u0435\u043f\u0438\u0441\u043a\u0438 \u0431\u0430\u043d\u0434\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 BlackBasta.\n\n\u041e\u043d \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 62 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0442\u0430\u043a\u0438\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445, \u043a\u0430\u043a \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u044b, \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0435 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 Microsoft Windows. VulnCheck \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u0433\u0440\u0443\u043f\u043f\u0430 \u0444\u043e\u043a\u0443\u0441\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043d\u0430 CVE \u0441 \u0443\u0436\u0435 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430\u043c\u0438.\n\n4. watchTowr Labs \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u041f\u041e \u0434\u043b\u044f \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Nakivo, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u0438\u0437 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f.\n\n\u041e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2024-48248, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043f\u0430\u0440\u043e\u043b\u044f \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u043b\u0438 \u0441\u0430\u043c\u0438\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f. watchTowr \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b \u043e\u0448\u0438\u0431\u043a\u0443, \u043d\u043e \u0442\u0430\u043a \u0438 \u043d\u0435 \u043e\u0442\u0432\u0435\u0442\u0438\u043b \u043d\u0430 \u0435\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435.\n\n5. Cisco \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0442\u0440\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432.\n\n6. \u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 \u0434\u043b\u044f \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e\u0439 \u0440\u0430\u0431\u043e\u0442\u044b \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c Mattermost \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0442\u0440\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n7. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Modat \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0432 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435\u00a0\u0431\u043e\u043b\u0435\u0435 49\u00a0000 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0445 \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c (AMS) \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u043e\u0442\u0440\u0430\u0441\u043b\u044f\u0445 \u0438 \u0441\u0442\u0440\u0430\u043d\u0430\u0445, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0432 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0445 \u0441\u0435\u043a\u0442\u043e\u0440\u0430\u0445, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u0441\u0442\u0430\u043d\u0446\u0438\u0438\u00a0\u0438 \u0432\u043e\u0434\u043e\u043e\u0447\u0438\u0441\u0442\u043d\u044b\u0435 \u0441\u043e\u043e\u0440\u0443\u0436\u0435\u043d\u0438\u044f.\n\n\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u044b\u0435 AMS \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u043b\u0438 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043d\u0435\u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u043e\u0432, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043a \u043d\u0438\u043c \u0434\u043e\u0441\u0442\u0443\u043f.\n\n\u0412 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u0438\u043c\u0435\u043b\u0430\u0441\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0440\u0435\u0434\u0430\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0437\u0430\u043f\u0438\u0441\u0438 \u043e \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u0430\u0445, \u0438\u0437\u043c\u0435\u043d\u044f\u0442\u044c \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438\u043b\u0438 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438 \u0432\u0445\u043e\u0434\u0430 \u0432 \u0437\u0434\u0430\u043d\u0438\u0435.\n\n\u0418\u0437 \u043e\u0431\u0449\u0435\u0433\u043e \u0447\u0438\u0441\u043b\u0430 49 000 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u043d\u044b\u0445 \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 AMS \u0432 \u043c\u0438\u0440\u0435 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e (16 678) \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0432 \u0418\u0442\u0430\u043b\u0438\u0438, \u041c\u0435\u043a\u0441\u0438\u043a\u0435 (5 940) \u0438 \u0412\u044c\u0435\u0442\u043d\u0430\u043c (5 035). \u0412 \u0421\u0428\u0410 Modat \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 1 966 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u043d\u044b\u0445 \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044e \u0441\u0438\u0441\u0442\u0435\u043c AMS.", "creation_timestamp": "2025-02-28T17:30:05.000000Z"}, {"uuid": "a85e896f-0099-43b0-bf0f-f93cdab065e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26796", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114211945941667919", "content": "", "creation_timestamp": "2025-03-23T13:19:52.080810Z"}, {"uuid": "9ce46e01-203c-4d7b-82a3-eaf844323021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114001273156390912", "content": "", "creation_timestamp": "2025-02-14T08:23:00.445009Z"}, {"uuid": "8000ece2-06e5-4d1b-9655-1f7e81c0124c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li4uiunptn2a", "content": "", "creation_timestamp": "2025-02-14T09:15:30.817042Z"}, {"uuid": "59ae814e-22a3-46e8-bedd-6abdfd7363ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li4ziaa5wt2v", "content": "", "creation_timestamp": "2025-02-14T10:44:37.909891Z"}, {"uuid": "5453e6b7-5d5d-4d77-94f4-6a6a43109213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3livuyffix22a", "content": "", "creation_timestamp": "2025-02-24T08:00:46.347132Z"}, {"uuid": "3cd05be9-06bf-4231-b944-d2138b6a5ccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lizqvvpi6s2p", "content": "", "creation_timestamp": "2025-02-25T20:58:25.328671Z"}, {"uuid": "ac26d27c-b6f2-4d6a-aa5d-f24c77764734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lip4jhqc3v2v", "content": "", "creation_timestamp": "2025-02-21T15:26:58.717086Z"}, {"uuid": "5c33fbc2-5959-490c-9e81-d8a263ae7f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-24)", "content": "", "creation_timestamp": "2025-06-24T00:00:00.000000Z"}, {"uuid": "94a54399-65d0-42e4-a591-9f403bf2fb5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lrbs3s4awo2i", "content": "", "creation_timestamp": "2025-06-10T21:02:37.224298Z"}, {"uuid": "0400481c-fe1e-4f22-af15-7efd01aa2f34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26795", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/141", "content": "", "creation_timestamp": "2025-05-14T00:48:43.000000Z"}, {"uuid": "09a3a6f1-786b-416a-a4f3-557685ccfdb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "de60ec5a-4d70-4961-9db9-b700d53b2b43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:45.000000Z"}, {"uuid": "3d8cc569-035b-4043-a2f7-c90f062e7f3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1729", "content": "", "creation_timestamp": "2026-01-21T04:00:00.000000Z"}, {"uuid": "6168617f-92ed-4c24-96af-c443576ae0f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4566", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26793\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Web GUI configuration panel of Hirsch (formerly Identiv and Viscount) Enterphone MESH through 2024 ships with default credentials (username freedom, password viscount). The administrator is not prompted to change these credentials on initial configuration, and changing the credentials requires many steps. Attackers can use the credentials over the Internet via mesh.webadmin.MESHAdminServlet to gain access to dozens of Canadian and U.S. apartment buildings and obtain building residents' PII. NOTE: the Supplier's perspective is that the \"vulnerable systems are not following manufacturers' recommendations to change the default password.\"\n\ud83d\udccf Published: 2025-02-15T15:30:24Z\n\ud83d\udccf Modified: 2025-02-15T15:30:24Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26793\n2. https://support.identiv.com/products/physical-access/hirsch\n3. https://www.ericdaigle.ca/posts/breaking-into-dozens-of-apartments-in-five-minutes", "creation_timestamp": "2025-02-15T16:12:21.000000Z"}, {"uuid": "b0f70f8c-b71f-467d-b9dd-260a5d79bd82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2679", "type": "seen", "source": "https://t.me/cvedetector/20933", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2679 - PHPGurukul Bank Locker Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2679 \nPublished : March 24, 2025, 3:15 a.m. | 1\u00a0hour, 35\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /contact-us.php. The manipulation of the argument pagetitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T05:51:33.000000Z"}, {"uuid": "bd8e92e3-49d2-4291-aae0-6243930bac40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "Telegram/czaGu8S4km_P85MjNP9ZSQN56E7iX-k-e4l4SXDRJa_wkmX3", "content": "", "creation_timestamp": "2025-02-15T23:50:18.000000Z"}, {"uuid": "e9be84b4-94d1-415c-b5d1-e28ee7ab6678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2544", "content": "#exploit\n1. CVE-2024-45870,\nCVE-2024-45871,\nCVE-2024-45872:\nBandiview DoS/Stack BoF\nhttps://github.com/bshyuunn/Bandiview-7.05-Vuln-PoC\n\n2. SSRF on Sliver C2 teamserver\nhttps://blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2\n\n3. CVE-2025-26794:\nSQLite (DBM) injection in Exim 4.98\nhttps://github.com/OscarBataille/CVE-2025-26794", "creation_timestamp": "2025-02-24T16:50:09.000000Z"}, {"uuid": "fcf0a0e4-e682-4efd-a949-4fdc6a0a24fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/suboxone_chatroom/9284", "content": "\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 SQLi \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-26794 \u0432 #Exim \u0432\u0435\u0440\u0441\u0438\u0438 4.98 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 ETRN. \n\n\nETRN #',1); ## INSERT SQL HERE ##  /*\n\n\n\u0414\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 4.98.1. \n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0432 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u043f\u043e \u0441\u0441\u044b\u043b\u043a\u0435 https://github.com/OscarBataille/CVE-2025-26794", "creation_timestamp": "2025-04-22T13:47:03.000000Z"}, {"uuid": "3ca9972d-55b9-4027-972f-88f5aa116f40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26794", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3livkbywh622h", "content": "", "creation_timestamp": "2025-02-24T04:49:16.617390Z"}, {"uuid": "ea2388e4-2f9c-40e0-9a2c-389fa6216280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lidxvvuucg2o", "content": "", "creation_timestamp": "2025-02-17T05:05:07.367361Z"}, {"uuid": "48bb33c0-ef23-4954-840b-242f7e210fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lidxvvwwpg2o", "content": "", "creation_timestamp": "2025-02-17T05:05:07.834225Z"}, {"uuid": "16a4d08e-894a-4f1f-a36a-d0a075f2bb7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lidxvyy6362g", "content": "", "creation_timestamp": "2025-02-17T05:05:10.368112Z"}, {"uuid": "74755531-0e64-4058-b883-7c728118177e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lidyfmztl32g", "content": "", "creation_timestamp": "2025-02-17T05:13:54.829492Z"}, {"uuid": "92203aa1-5533-4900-b7b5-3c7da4000d29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lidyfn3urb2q", "content": "", "creation_timestamp": "2025-02-17T05:13:55.318377Z"}, {"uuid": "2b120935-4220-46f8-9a88-90b6ee3eae36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lidyfq57b32g", "content": "", "creation_timestamp": "2025-02-17T05:13:58.057939Z"}, {"uuid": "513f1da4-0bf6-464d-ac44-5a168ff61f40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lidyx3zgph2e", "content": "", "creation_timestamp": "2025-02-17T05:23:40.928808Z"}, {"uuid": "f3edbf65-33e4-46c6-a109-f0b229f097ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lidyx43gmv2l", "content": "", "creation_timestamp": "2025-02-17T05:23:41.461319Z"}, {"uuid": "e40b8b10-574a-4d84-b4c6-8e8d31174db2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lidyx74vj32g", "content": "", "creation_timestamp": "2025-02-17T05:23:44.009169Z"}, {"uuid": "a65ea0ec-6eee-441e-bee4-eba2121ca5b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3livkzlehza2q", "content": "", "creation_timestamp": "2025-02-24T05:02:27.089503Z"}, {"uuid": "bb468d04-f44c-4a74-8f04-80e641f1de2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3livwijfkuc2l", "content": "", "creation_timestamp": "2025-02-24T08:27:43.322896Z"}, {"uuid": "4a069aad-05f5-40ba-be5d-954a35c4e11d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26796", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkxtz7grek26", "content": "", "creation_timestamp": "2025-03-22T13:39:01.460317Z"}, {"uuid": "35594852-a1fb-4227-8cb4-acc9d5bed348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "15459760-09af-4167-b17c-6bf46434dafc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/14860", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-26794: SQLite (DBM) injection in Exim 4.98 - exploit writeup\nURL\uff1ahttps://github.com/OscarBataille/CVE-2025-26794\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-02-22T14:38:41.000000Z"}, {"uuid": "5f6944eb-bce0-4edd-892c-fe48b4289676", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/14881", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-26794: SQLite (DBM) injection in Exim 4.98 - exploit writeup\nURL\uff1ahttps://github.com/Joe-RayG/CVE-2025-24085-Disclosure\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-02-22T17:01:23.000000Z"}, {"uuid": "32eed323-a710-4baf-9006-33d35971f302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1833", "content": "", "creation_timestamp": "2026-04-21T21:00:00.000000Z"}, {"uuid": "ea9410c5-a93b-47a6-8f01-f7c909c7ca05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "https://t.me/cvedetector/18647", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26794 - Exim SQLite SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-26794 \nPublished : Feb. 21, 2025, 1:15 p.m. | 1\u00a0hour, 10\u00a0minutes ago \nDescription : Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T15:35:49.000000Z"}, {"uuid": "cd7050d7-1e0d-4b06-ae59-ee960e8ca102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "Telegram/R-nxp-q3k-UWhpkG2Q_l4TSlzIExSOuHKVYQgizwBMKW410k", "content": "", "creation_timestamp": "2025-02-14T21:08:29.000000Z"}, {"uuid": "7ca858fc-bb02-4967-82f5-485dad17b894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4884", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26794\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection.\n\ud83d\udccf Published: 2025-02-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T13:07:06.316Z\n\ud83d\udd17 References:\n1. https://exim.org\n2. https://www.exim.org/static/doc/security/CVE-2025-26794.txt", "creation_timestamp": "2025-02-21T13:18:11.000000Z"}, {"uuid": "0184e0e4-82ec-4c62-a59b-029044bb7ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "https://t.me/CyberBulletin/2386", "content": "\u26a1Exim Mail Transfer Agent Vulnerable to Remote SQL Injection (CVE-2025-26794), PoC Published.\n\n#CyberBulletin", "creation_timestamp": "2025-02-24T14:36:32.000000Z"}, {"uuid": "6f1440b2-97de-4d1b-8fbe-194e92dbec17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/6798", "content": "#exploit\n1. CVE-2024-45870,\nCVE-2024-45871,\nCVE-2024-45872:\nBandiview DoS/Stack BoF\nhttps://github.com/bshyuunn/Bandiview-7.05-Vuln-PoC\n\n2. SSRF on Sliver C2 teamserver\nhttps://blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2\n\n3. CVE-2025-26794:\nSQLite (DBM) injection in Exim 4.98\nhttps://github.com/OscarBataille/CVE-2025-26794", "creation_timestamp": "2025-02-24T16:50:08.000000Z"}, {"uuid": "428555f1-da12-46e7-89ff-ab8bd2119f30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "Telegram/GkMr7iyoiXstTyITmwgykxUdYxNhxnILhg-WkQZo5SBeoUQ", "content": "", "creation_timestamp": "2025-02-23T00:00:11.000000Z"}, {"uuid": "92d2cab6-9cee-4174-8448-e6b0407337d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1586", "content": "\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 SQLi \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-26794 \u0432 #Exim \u0432\u0435\u0440\u0441\u0438\u0438 4.98 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 ETRN. \n\n\nETRN #',1); ## INSERT SQL HERE ##  /*\n\n\n\u0414\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 4.98.1. \n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0432 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u043f\u043e \u0441\u0441\u044b\u043b\u043a\u0435 https://github.com/OscarBataille/CVE-2025-26794", "creation_timestamp": "2025-02-24T19:43:39.000000Z"}, {"uuid": "a3c54663-417b-4987-adb1-2f4ad2adf9b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11850", "content": "#exploit\n1. CVE-2024-45870,\nCVE-2024-45871,\nCVE-2024-45872:\nBandiview DoS/Stack BoF\nhttps://github.com/bshyuunn/Bandiview-7.05-Vuln-PoC\n\n2. SSRF on Sliver C2 teamserver\nhttps://blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2\n\n3. CVE-2025-26794:\nSQLi (DBM) injection in Exim 4.98\nhttps://github.com/OscarBataille/CVE-2025-26794", "creation_timestamp": "2025-02-25T11:50:32.000000Z"}, {"uuid": "343c2cf1-346b-420a-93ec-253dfba7a2c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lk2h6ewujf2p", "content": "", "creation_timestamp": "2025-03-10T21:02:03.529864Z"}, {"uuid": "39e7291e-faff-4478-bd4b-bd924998e4d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114008478343567968", "content": "", "creation_timestamp": "2025-02-15T14:55:23.042098Z"}, {"uuid": "76111428-b301-4823-9606-17b3d43755ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li7z3yquxx23", "content": "", "creation_timestamp": "2025-02-15T15:15:46.226329Z"}, {"uuid": "62818680-10c1-4dc2-bdf5-112c34c9ec63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liaghztthq23", "content": "", "creation_timestamp": "2025-02-15T19:15:09.301479Z"}, {"uuid": "2718e3d8-be7c-4efc-b3b1-d44a4b0b50f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114011187994293499", "content": "", "creation_timestamp": "2025-02-16T02:24:30.110062Z"}, {"uuid": "7c4e85b4-56bf-413b-9695-e00fb0b082d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lif4omihv52i", "content": "", "creation_timestamp": "2025-02-17T16:03:11.002844Z"}, {"uuid": "efa51ff2-69b4-4691-bb83-57957e8f0a2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lif4omk6422v", "content": "", "creation_timestamp": "2025-02-17T16:03:11.551003Z"}, {"uuid": "3e537a01-b47d-4672-a3dd-6d260fee2fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lif4oplpwc23", "content": "", "creation_timestamp": "2025-02-17T16:03:14.247681Z"}, {"uuid": "53942ebe-6245-44af-9283-a4035f1f344f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifhxqeywl2z", "content": "", "creation_timestamp": "2025-02-17T19:25:08.118295Z"}, {"uuid": "bc34a63f-dc98-4085-b4c3-d5f1cad13daa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifhxqh3uc2e", "content": "", "creation_timestamp": "2025-02-17T19:25:08.601152Z"}, {"uuid": "00b76c2d-37c9-481f-9398-ac8732063e74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifhxtih3s2e", "content": "", "creation_timestamp": "2025-02-17T19:25:11.274334Z"}, {"uuid": "28c6d857-d2a0-41a7-a41d-5aba66d983d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lifjzq2s6f2a", "content": "", "creation_timestamp": "2025-02-17T20:02:02.637834Z"}, {"uuid": "88c59d43-837a-44b4-9fd0-211c8b5336f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifm47wf552o", "content": "", "creation_timestamp": "2025-02-17T20:39:13.550546Z"}, {"uuid": "1b646b82-5f68-48fc-a1e7-4a3d9bbe7f9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifm47ydxu2e", "content": "", "creation_timestamp": "2025-02-17T20:39:14.074622Z"}, {"uuid": "cc2c82c3-76a2-4ef1-a712-028389b2d47b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifm4ayync2v", "content": "", "creation_timestamp": "2025-02-17T20:39:15.241750Z"}, {"uuid": "a54bb9d3-9c07-4d75-be50-1f2fa06065fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifm4e2ax22v", "content": "", "creation_timestamp": "2025-02-17T20:39:17.851041Z"}, {"uuid": "a576727d-66a6-45e7-9591-38d5c6314d7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifqr476iw2z", "content": "", "creation_timestamp": "2025-02-17T22:02:29.247025Z"}, {"uuid": "55b988eb-0751-4044-8410-fab883020aac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifqr4bdh72i", "content": "", "creation_timestamp": "2025-02-17T22:02:29.817330Z"}, {"uuid": "b24fb0d3-f48b-4523-8720-f036ec38c6da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifqr5bkhz2e", "content": "", "creation_timestamp": "2025-02-17T22:02:31.424701Z"}, {"uuid": "5cb0122d-3518-49b3-b619-01b2230c5b54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifqracnjw2z", "content": "", "creation_timestamp": "2025-02-17T22:02:34.098963Z"}, {"uuid": "9f9c9be9-3e9a-43e3-ad2b-5cd59b5b7971", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifr5rlfzt23", "content": "", "creation_timestamp": "2025-02-17T22:09:34.453089Z"}, {"uuid": "1f338a16-f106-45aa-b0bc-cd243e153a6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifr5rnamt23", "content": "", "creation_timestamp": "2025-02-17T22:09:35.000198Z"}, {"uuid": "07f6ab9b-4021-441e-b785-ac7120ebc4e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifr5uo4bi2w", "content": "", "creation_timestamp": "2025-02-17T22:09:37.861812Z"}, {"uuid": "5fdc9938-3520-443f-bec7-323b1092988e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifsamnb5r2o", "content": "", "creation_timestamp": "2025-02-17T22:29:03.893058Z"}, {"uuid": "5cbe5fbb-75c3-4ec6-926f-2b58d9aef670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifsamoz6t2g", "content": "", "creation_timestamp": "2025-02-17T22:29:04.428923Z"}, {"uuid": "216acef4-ee4a-4274-9c19-97ea06339b7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lifsapqkuf2v", "content": "", "creation_timestamp": "2025-02-17T22:29:07.379638Z"}, {"uuid": "3a92d345-11a1-4fbf-b9b1-f51869f91d5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3liktatmz6o2b", "content": "", "creation_timestamp": "2025-02-19T22:30:23.237176Z"}, {"uuid": "7ecfdfaf-4dd3-4869-bc23-e898df701b56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26795", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp4tncrgl7p2", "content": "", "creation_timestamp": "2025-05-14T11:00:15.717302Z"}, {"uuid": "5e63482a-cbfa-4e7a-9624-8bd381efb408", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26795", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lp4yxlojbg2s", "content": "", "creation_timestamp": "2025-05-14T12:31:41.553389Z"}, {"uuid": "f86d38c5-283f-4e02-a0b1-859e490522e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26790", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mdl6omhgqv2j", "content": "", "creation_timestamp": "2026-01-29T16:15:11.219976Z"}, {"uuid": "1a1de737-f0ab-4ae3-9554-a667a6e77258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "Telegram/0bRfJSeBlp6vzURpP_3ixCuFmuQ1BEJ7M8KtQr6_hqRGyNY", "content": "", "creation_timestamp": "2025-10-31T09:00:04.000000Z"}, {"uuid": "93390f38-4e75-42fc-bc8b-2ade1cc40ffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/57662", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aSQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only.\nURL\uff1ahttps://github.com/XploitGh0st/CVE-2025-26794-exploit\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-10-31T04:44:17.000000Z"}, {"uuid": "875b6bd4-63a0-4563-b7a4-ea21df27c194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4441", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26791\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-14T09:15:08.067\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://ensy.zip/posts/dompurify-323-bypass/\n2. https://github.com/cure53/DOMPurify/commit/d18ffcb554e0001748865da03ac75dd7829f0f02\n3. https://github.com/cure53/DOMPurify/releases/tag/3.2.4\n4. https://nsysean.github.io/posts/dompurify-323-bypass/", "creation_timestamp": "2025-02-14T11:15:45.000000Z"}, {"uuid": "b1cca647-3354-4b41-a41e-65da735d6bf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4434", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26791\n\ud83d\udd25 CVSS Score: 4.7 (CVSS_V3)\n\ud83d\udd39 Description: DOMPurify before 3.2.4 has an incorrect template literal regular expression, sometimes leading to mutation cross-site scripting (mXSS).\n\ud83d\udccf Published: 2025-02-14T09:31:22Z\n\ud83d\udccf Modified: 2025-02-14T09:31:22Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26791\n2. https://github.com/cure53/DOMPurify/commit/d18ffcb554e0001748865da03ac75dd7829f0f02\n3. https://ensy.zip/posts/dompurify-323-bypass\n4. https://github.com/cure53/DOMPurify/releases/tag/3.2.4\n5. https://nsysean.github.io/posts/dompurify-323-bypass", "creation_timestamp": "2025-02-14T10:10:41.000000Z"}, {"uuid": "6d66eeb1-3325-4ff1-87c8-5178a9d13d70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-28)", "content": "", "creation_timestamp": "2026-04-28T00:00:00.000000Z"}]}