{"vulnerability": "cve-2025-2739", "sightings": [{"uuid": "1e98f5f5-254c-4d73-9489-6447d9c581e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27399", "type": "seen", "source": "MISP/24306fae-b16b-4478-9297-d2973cdb583c", "content": "", "creation_timestamp": "2025-08-22T14:52:22.000000Z"}, {"uuid": "b07e98ae-c172-487d-944c-4f0407b4606a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27399", "type": "seen", "source": "https://t.me/cvedetector/19069", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27399 - Mastodon Domain Block Visibility Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27399 \nPublished : Feb. 27, 2025, 6:15 p.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : Mastodon is a self-hosted, federated microblogging platform. In versions prior to 4.1.23, 4.2.16, and 4.3.4, when the visibility for domain blocks/reasons is set to \"users\" (localized English string: \"To logged-in users\"), users that are not yet approved can view the block reasons. Instance admins that do not want their domain blocks to be public are impacted. Versions 4.1.23, 4.2.16, and 4.3.4 fix the issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T20:56:15.000000Z"}, {"uuid": "c6bd7fd4-6f3c-4a03-b0dc-6b5851bad6a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2739", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8610", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2739\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in PHPGurukul Old Age Home Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/manage-services.php. The manipulation of the argument sertitle leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-25T06:00:11.189Z\n\ud83d\udccf Modified: 2025-03-25T06:00:11.189Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300761\n2. https://vuldb.com/?ctiid.300761\n3. https://vuldb.com/?submit.523400\n4. https://github.com/silent1189/Phpgurukul-Old-Age-Home-Management-System-V1.0-SQL-injection/issues/1\n5. https://phpgurukul.com/", "creation_timestamp": "2025-03-25T06:23:48.000000Z"}, {"uuid": "4e94a036-0320-409d-b0c3-470dc99105c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27391", "type": "seen", "source": "https://t.me/cvedetector/22561", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27391 - Apache ActiveMQ Artemis Sensitive Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27391 \nPublished : April 9, 2025, 3:16 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Insertion of Sensitive Information into Log File vulnerability in Apache ActiveMQ Artemis. All the values of the broker properties are\u00a0logged when the org.apache.activemq.artemis.core.config.impl.ConfigurationImpl logger has the\u00a0debug level enabled.  \n  \nThis issue affects Apache ActiveMQ Artemis: from 1.5.1 before 2.40.0. It can be mitigated by restricting log access to only trusted users.  \n  \nUsers are recommended to upgrade to version 2.40.0, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T18:26:46.000000Z"}, {"uuid": "99e52c35-4cec-440b-bf17-3b39898a8eda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27394", "type": "seen", "source": "Telegram/BUC-F_pXySBJlIgXgQmiFYagG3wm0MhpRzVS07GXFjNvPGc", "content": "", "creation_timestamp": "2025-03-11T11:35:11.000000Z"}, {"uuid": "abd89332-1eb3-42b8-87c9-a0f597b2e4e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27392", "type": "seen", "source": "Telegram/7ohonUKXJXc8nNP-FA_LzHo1dYyqTYbEicJy56ekdY_6IuU", "content": "", "creation_timestamp": "2025-03-11T11:35:12.000000Z"}, {"uuid": "c60fe664-47ef-43d7-ae51-48d43f2bac2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27393", "type": "seen", "source": "Telegram/7ohonUKXJXc8nNP-FA_LzHo1dYyqTYbEicJy56ekdY_6IuU", "content": "", "creation_timestamp": "2025-03-11T11:35:12.000000Z"}, {"uuid": "38b2c71a-6712-42eb-a25c-fd9b436f87f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27394", "type": "seen", "source": "Telegram/7ohonUKXJXc8nNP-FA_LzHo1dYyqTYbEicJy56ekdY_6IuU", "content": "", "creation_timestamp": "2025-03-11T11:35:12.000000Z"}, {"uuid": "ec8db0c2-ed10-4ea9-84f1-bd1ea4dc41b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27395", "type": "seen", "source": "Telegram/BUC-F_pXySBJlIgXgQmiFYagG3wm0MhpRzVS07GXFjNvPGc", "content": "", "creation_timestamp": "2025-03-11T11:35:11.000000Z"}, {"uuid": "539f7f67-7f34-4fc5-9b3f-3bf860e6e095", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27396", "type": "seen", "source": "Telegram/BUC-F_pXySBJlIgXgQmiFYagG3wm0MhpRzVS07GXFjNvPGc", "content": "", "creation_timestamp": "2025-03-11T11:35:11.000000Z"}, {"uuid": "c0abef9b-b8a0-479e-acbb-97ceac6772e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2739", "type": "published-proof-of-concept", "source": "Telegram/1huWIRueQzufqMISTEPMEyKE3aRIFqK3qoq5n6GjRtUUGx0", "content": "", "creation_timestamp": "2025-03-25T08:01:13.000000Z"}, {"uuid": "4e37b145-22c3-4ab5-be19-276c395de0d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2739", "type": "seen", "source": "https://t.me/cvedetector/21062", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2739 - PHPGurukul Old Age Home Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2739 \nPublished : March 25, 2025, 6:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Old Age Home Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/manage-services.php. The manipulation of the argument sertitle leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T09:27:39.000000Z"}, {"uuid": "60c6831d-4122-470f-9b2e-f6546c9a0442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27396", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114143638979930528", "content": "", "creation_timestamp": "2025-03-11T11:48:30.659944Z"}, {"uuid": "ec073987-4729-400e-bc24-b8aa810d8c1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27396", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk43e2xghx2e", "content": "", "creation_timestamp": "2025-03-11T12:35:48.905117Z"}, {"uuid": "0ab45d48-611f-47aa-b82d-7e077c7d4923", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27395", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-06", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "9581638c-ca47-4770-84ee-2d9c330cd153", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27392", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-06", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "0587f26e-383a-44a0-a916-ff622fce0ef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27394", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-06", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "61b13937-ea5a-440f-be19-f0c647b15d4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27396", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-06", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "b468c2e6-e208-43b5-9bf6-2a041c2c99b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2739", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll6va3f4n726", "content": "", "creation_timestamp": "2025-03-25T08:49:31.336259Z"}, {"uuid": "3f9325b5-8e6f-49be-a933-e275ae6fe0b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27396", "type": "seen", "source": "https://t.me/cvedetector/20072", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27396 - Siemens SCALANCE Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27396 \nPublished : March 11, 2025, 10:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly limit the elevation of privileges required to perform certain valid functionality.  \nThis could allow an authenticated lowly-privileged remote attacker to escalate their privileges. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T13:26:50.000000Z"}, {"uuid": "ef7a74d7-396a-4594-baa0-c7a481546b73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27395", "type": "seen", "source": "https://t.me/cvedetector/20071", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27395 - Siemens SCALANCE LPE9403 SFTP Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27395 \nPublished : March 11, 2025, 10:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly limit the scope of files accessible through and the privileges of the SFTP functionality.  \nThis could allow an authenticated highly-privileged remote attacker to read and write arbitrary files. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T13:26:46.000000Z"}, {"uuid": "25ca78a0-ab06-4fc6-8770-5ab0263c1f38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27394", "type": "seen", "source": "https://t.me/cvedetector/20070", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27394 - \"Siemens SCALANCE LPE9403 Remote Code Execution Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-27394 \nPublished : March 11, 2025, 10:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly sanitize user input when creating new SNMP users.  \nThis could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T13:26:45.000000Z"}, {"uuid": "6691a4d3-bd0a-409c-ba28-3c297060289b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27393", "type": "seen", "source": "https://t.me/cvedetector/20069", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27393 - Siemens SCALANCE LPE9403 Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27393 \nPublished : March 11, 2025, 10:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly sanitize user input when creating new users.  \nThis could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T13:26:44.000000Z"}, {"uuid": "28a3c4d0-e16b-486f-aa58-120519bcb89a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27392", "type": "seen", "source": "https://t.me/cvedetector/20068", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27392 - Siemens SCALANCE LPE9403 Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27392 \nPublished : March 11, 2025, 10:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly sanitize user input when creating new VXLAN configurations.  \nThis could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T13:26:44.000000Z"}, {"uuid": "b579ef09-9dd8-494b-a127-5250965017f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27398", "type": "seen", "source": "https://t.me/cvedetector/20064", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27398 - SCALANCE LPE9403 Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27398 \nPublished : March 11, 2025, 10:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly neutralize special characters when interpreting user controlled log paths.  \nThis could allow an authenticated highly-privileged remote attacker to execute a limited set of binaries that are already present on the filesystem. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T13:26:38.000000Z"}, {"uuid": "012dded6-3d19-4f30-939d-2f15f9cc536b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27397", "type": "seen", "source": "https://t.me/cvedetector/20062", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27397 - Siemens SCALANCE File Log Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27397 \nPublished : March 11, 2025, 10:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly limit user controlled paths to which logs are written and from where they are read.  \nThis could allow an authenticated highly-privileged remote attacker to read and write arbitrary files in the filesystem, if and only if the malicious path ends with 'log' . \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T13:26:36.000000Z"}, {"uuid": "5848c398-4877-4f47-bc9b-5ef578291e83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27399", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114077225711677534", "content": "", "creation_timestamp": "2025-02-27T18:18:44.751564Z"}, {"uuid": "a2c90ead-cb16-43ae-95c4-b71d05a56273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27393", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-06", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "08d2c96d-5bfe-4a3e-bd15-fcde9a6ac4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27397", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-06", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "8625eb6a-f762-485a-b833-4d6831351294", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27398", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-06", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}]}