{"vulnerability": "cve-2025-2740", "sightings": [{"uuid": "52ab1cab-0c84-4770-8bda-06f6483ffc54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "published-proof-of-concept", "source": "Telegram/3enB83vBivmCtuCKnIufTidDmfLZ95Nh7V4en_RLHKIkMvY", "content": "", "creation_timestamp": "2026-04-25T07:00:14.000000Z"}, {"uuid": "c8aeda59-7de2-4fcf-ab8b-4000e570fcd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27406", "type": "seen", "source": "https://t.me/cvedetector/21182", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27406 - Icinga Reporting Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27406 \nPublished : March 26, 2025, 4:15 p.m. | 28\u00a0minutes ago \nDescription : Icinga Reporting is the central component for reporting related functionality in the monitoring web frontend and framework Icinga Web 2. A vulnerability present in versions 0.10.0 through 1.0.2 allows to set up a template that allows to embed arbitrary Javascript. This enables the attacker to act on behalf of the user, if the template is being previewed; and act on behalf of the headless browser, if a report using the template is printed to PDF. This issue has been resolved in version 1.0.3 of Icinga Reporting. As a workaround, review all templates and remove suspicious settings. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T18:04:05.000000Z"}, {"uuid": "69de427d-720b-4334-9e0a-7f338cbc9484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2740", "type": "seen", "source": "https://t.me/cvedetector/21054", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2740 - PHPGurukul Old Age Home Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2740 \nPublished : March 25, 2025, 7:15 a.m. | 32\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in PHPGurukul Old Age Home Management System 1.0. Affected is an unknown function of the file /admin/eligibility.php. The manipulation of the argument pagetitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T09:27:27.000000Z"}, {"uuid": "1700ab66-8ce6-4419-a965-f2ded85f602a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://t.me/CyberBulletin/2667", "content": "\u26a1CVE-2025-27407 (CVSS 9.1): Critical GraphQL-Ruby Flaw Exposes Millions to RCE.\n\n#CyberBulletin", "creation_timestamp": "2025-03-17T12:43:13.000000Z"}, {"uuid": "d9f1c4c5-e5f5-4feb-b3bc-635f2b4d061d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkc76ah2kd2p", "content": "", "creation_timestamp": "2025-03-13T23:00:06.983817Z"}, {"uuid": "0acbe270-e68e-4810-a21e-cd13c363febd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkemrmrnvk2o", "content": "", "creation_timestamp": "2025-03-14T22:08:57.256092Z"}, {"uuid": "4ba9ca63-5e1e-4793-b1e5-b9d340edee44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-3e39154e-7e52655bd7735e43", "content": "", "creation_timestamp": "2025-03-16T23:34:06.950766Z"}, {"uuid": "51bec01c-9281-4174-9da1-60e88de4a42b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lk7dk2t5tv2u", "content": "", "creation_timestamp": "2025-03-12T19:40:19.322371Z"}, {"uuid": "6d6f8d9c-1f2a-4094-9344-18cd93716693", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114151188619952651", "content": "", "creation_timestamp": "2025-03-12T19:48:29.031369Z"}, {"uuid": "4b3f2357-e1f4-47c6-b874-3a27582357f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lkko63mhzk2c", "content": "", "creation_timestamp": "2025-03-17T07:49:47.538351Z"}, {"uuid": "5a3044db-d6f6-4b32-a3b6-c93f0b52e087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lofcjxpwjx2v", "content": "", "creation_timestamp": "2025-05-05T02:19:07.782205Z"}, {"uuid": "9732c66a-119c-4837-a25f-6103b9332099", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-27400", "type": "seen", "source": "https://bsky.app/profile/adobedigest.bsky.social/post/3mjkmihxxfn27", "content": "", "creation_timestamp": "2026-04-15T19:20:48.070814Z"}, {"uuid": "a2d3ead2-e074-4e2d-a481-39225696606d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27401", "type": "seen", "source": "https://t.me/cvedetector/19528", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27401 - Tuleap Report Filter Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27401 \nPublished : March 4, 2025, 5:15 p.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Tuleap is an Open Source Suite to improve management of software developments and collaboration. In a standard usages of Tuleap, the issue has a limited impact, it will mostly leave dangling data. However, a malicious user could create and delete reports multiple times to cycle through all the filters of all reports of the instance and delete them. The malicious user only needs to have access to one tracker. This would result in the loss of all criteria filters forcing users and tracker admins to re-create them. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740498975 and Tuleap Enterprise Edition 16.4-6 and 16.3-11. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T20:01:42.000000Z"}, {"uuid": "9d74c4d7-ef80-4299-a974-9db689e4b9a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27408", "type": "seen", "source": "https://t.me/cvedetector/19187", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27408 - \"Manifest Weak Password Hashing Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-27408 \nPublished : Feb. 28, 2025, 6:15 p.m. | 2\u00a0hours, 13\u00a0minutes ago \nDescription : Manifest offers users a one-file micro back end. Prior to version 4.9.1, Manifest employs a weak password hashing implementation that uses SHA3 without a salt. This exposes user passwords to a higher risk of being cracked if an attacker gains access to the database. Without the use of a salt, identical passwords across multiple users will result in the same hash, making it easier for attackers to identify and exploit patterns, thereby accelerating the cracking process. Version 4.9.1 fixes the issue. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T22:03:12.000000Z"}, {"uuid": "47fae8d9-bf1b-4523-aa4a-568849d9cad7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27400", "type": "seen", "source": "https://t.me/cvedetector/19174", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27400 - Magento LTS Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-27400 \nPublished : Feb. 28, 2025, 4:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Versions prior to 20.12.3 and 20.13.1 contain a vulnerability that allows script execution in the admin panel which could lead to cross-site scripting against authenticated admin users. The attack requires an admin user with configuration access, so in practicality it is not very likely to be useful given that a user with this level of access is probably already a full admin. Versions 20.12.3 and 20.13.1 contain a patch for the issue. \nSeverity: 2.9 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T19:32:31.000000Z"}, {"uuid": "38aec284-8f4e-4f50-b449-ef24b29e6002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27408", "type": "seen", "source": "Telegram/rkC0xiO-afiwqxFKTG9UKVojDmgwq9NgpNdwvx_VWlKauePo", "content": "", "creation_timestamp": "2025-03-02T11:45:39.000000Z"}, {"uuid": "fb0c3153-ab1f-40c2-8ad9-a157c316f288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2740", "type": "published-proof-of-concept", "source": "Telegram/1huWIRueQzufqMISTEPMEyKE3aRIFqK3qoq5n6GjRtUUGx0", "content": "", "creation_timestamp": "2025-03-25T08:01:13.000000Z"}, {"uuid": "dc5a211f-74f4-4a35-8d2c-5747b16bfb6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114151081494165899", "content": "", "creation_timestamp": "2025-03-12T19:21:15.360207Z"}, {"uuid": "5073d85d-5240-4a05-8d59-0b4e79a4bc1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27401", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljlf3yqipk2f", "content": "", "creation_timestamp": "2025-03-04T21:15:01.416464Z"}, {"uuid": "65f2ccd2-d3f1-41b3-a2a4-0574dba23678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27407", "type": "seen", "source": "https://bsky.app/profile/obivan.infosec.exchange.ap.brid.gy/post/3llgcckwqzwc2", "content": "", "creation_timestamp": "2025-03-28T07:33:48.717959Z"}, {"uuid": "e2a7d7ea-eec0-4630-b936-818458fee6a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3loelotrb422j", "content": "", "creation_timestamp": "2025-05-04T19:30:16.087747Z"}, {"uuid": "2f5db4b9-0d0e-4371-97ec-003c1e10ac10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2740", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:48.000000Z"}, {"uuid": "bc2ca22c-f46e-4780-9604-1c11216d4696", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27403", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:35.000000Z"}, {"uuid": "a4fbd3db-c011-42d2-83d9-ebda630dca5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27401", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "015e30d6-c623-4931-82f0-1575e6a8920b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27402", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "0e6906b4-467b-425c-bcf5-1ecb0cc18b6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27400", "type": "seen", "source": "MISP/af1fbe07-e10c-40c4-844e-d4419bdf6f80", "content": "", "creation_timestamp": "2025-08-22T13:26:18.000000Z"}, {"uuid": "cf5da177-d369-48c2-a2c9-5ba719302524", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://gist.github.com/alon710/11c45cdfd0d1ad3b473795f1fcfcc7b0", "content": "", "creation_timestamp": "2026-01-24T22:41:13.000000Z"}, {"uuid": "26ba003c-4b1c-46fa-ab24-b2c33980086c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27402", "type": "seen", "source": "https://t.me/cvedetector/19529", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27402 - Tuleap CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27402 \nPublished : March 4, 2025, 5:15 p.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protections on tracker fields administrative operations. An attacker could use this vulnerability to trick victims into removing or updating tracker fields. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740414959 and Tuleap Enterprise Edition 16.4-6 and 16.3-11. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T20:01:43.000000Z"}, {"uuid": "16eb0770-e563-480e-a230-d295debb7245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "published-proof-of-concept", "source": "Telegram/qhPRrHWn8CTwbXoQMLYYNZP_eAjB5dIioFkbQ0tlG1td8WQ", "content": "", "creation_timestamp": "2025-12-26T21:00:04.000000Z"}, {"uuid": "2da754d5-4574-456c-8d81-3a95e921f874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "published-proof-of-concept", "source": "Telegram/HrTtUNq5Rdsv8dZdwNssjgzlpOtJ1umCTDCiOjgom1Z9ct0", "content": "", "creation_timestamp": "2025-12-26T19:00:09.000000Z"}, {"uuid": "a6c66542-6f24-4370-bb1f-016c8c560407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27400", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5917", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27400\n\ud83d\udd25 CVSS Score: 2.9 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Versions prior to 20.12.3 and 20.13.1 contain a vulnerability that allows script execution in the admin panel which could lead to cross-site scripting against authenticated admin users. The attack requires an admin user with configuration access, so in practicality it is not very likely to be useful given that a user with this level of access is probably already a full admin. Versions 20.12.3 and 20.13.1 contain a patch for the issue.\n\ud83d\udccf Published: 2025-02-28T15:26:14.265Z\n\ud83d\udccf Modified: 2025-02-28T15:43:37.220Z\n\ud83d\udd17 References:\n1. https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5pxh-89cx-4668\n2. https://github.com/OpenMage/magento-lts/commit/d307e5bf75729a2347dde0952fe9fd9fcd9c6aea\n3. https://github.com/OpenMage/magento-lts/releases/tag/v20.12.3\n4. https://github.com/OpenMage/magento-lts/releases/tag/v20.13.0", "creation_timestamp": "2025-02-28T16:27:02.000000Z"}, {"uuid": "23251414-88b3-4581-9725-227600a390da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27408", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5941", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27408\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Manifest offers users a one-file micro back end. Prior to version 4.9.1, Manifest employs a weak password hashing implementation that uses SHA3 without a salt. This exposes user passwords to a higher risk of being cracked if an attacker gains access to the database. Without the use of a salt, identical passwords across multiple users will result in the same hash, making it easier for attackers to identify and exploit patterns, thereby accelerating the cracking process. Version 4.9.1 fixes the issue.\n\ud83d\udccf Published: 2025-02-28T17:26:15.196Z\n\ud83d\udccf Modified: 2025-02-28T18:11:49.988Z\n\ud83d\udd17 References:\n1. https://github.com/mnfst/manifest/security/advisories/GHSA-h8h6-7752-g28c\n2. https://github.com/mnfst/manifest/commit/3ed6f1324e96ad469ad929d470dcd0cc386c6c69", "creation_timestamp": "2025-02-28T18:26:23.000000Z"}, {"uuid": "2515ae89-a58b-42ae-9e29-860ed935cfba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27402", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6396", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27402\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protections on tracker fields administrative operations. An attacker could use this vulnerability to trick victims into removing or updating tracker fields. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740414959 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.\n\ud83d\udccf Published: 2025-03-04T17:00:49.077Z\n\ud83d\udccf Modified: 2025-03-04T17:17:56.708Z\n\ud83d\udd17 References:\n1. https://github.com/Enalean/tuleap/security/advisories/GHSA-66pg-cpjf-2mfg\n2. https://github.com/Enalean/tuleap/commit/ea6319e2ad40beeda335af4ccd7a204a6912765c\n3. https://tuleap.net/plugins/tracker/?aid=41857", "creation_timestamp": "2025-03-04T17:34:06.000000Z"}, {"uuid": "3feb04c8-3dfc-48cf-ac6f-9d75851993ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27401", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6395", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27401\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Tuleap is an Open Source Suite to improve management of software developments and collaboration. In a standard usages of Tuleap, the issue has a limited impact, it will mostly leave dangling data. However, a malicious user could create and delete reports multiple times to cycle through all the filters of all reports of the instance and delete them. The malicious user only needs to have access to one tracker. This would result in the loss of all criteria filters forcing users and tracker admins to re-create them. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740498975 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.\n\ud83d\udccf Published: 2025-03-04T16:58:18.478Z\n\ud83d\udccf Modified: 2025-03-04T17:20:34.993Z\n\ud83d\udd17 References:\n1. https://github.com/Enalean/tuleap/security/advisories/GHSA-3rjf-87rf-h8m9\n2. https://github.com/Enalean/tuleap/commit/0070fef5c3b27fd402d3232041c6e03f79a84ffd\n3. https://tuleap.net/plugins/tracker/?aid=41850", "creation_timestamp": "2025-03-04T17:34:05.000000Z"}, {"uuid": "c8e2ebc3-7587-4416-9b25-d3ba644d23e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7367", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27407\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: graphql-ruby is a Ruby implementation of GraphQL. Starting in version 1.11.5 and prior to versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21, loading a malicious schema definition in `GraphQL::Schema.from_introspection` (or `GraphQL::Schema::Loader.load`) can result in remote code execution. Any system which loads a schema by JSON from an untrusted source is vulnerable, including those that use GraphQL::Client to load external schemas via GraphQL introspection. Versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21 contain a patch for the issue.\n\ud83d\udccf Published: 2025-03-12T18:15:57.957Z\n\ud83d\udccf Modified: 2025-03-12T18:42:08.976Z\n\ud83d\udd17 References:\n1. https://github.com/rmosolgo/graphql-ruby/security/advisories/GHSA-q92j-grw3-h492\n2. https://github.com/rmosolgo/graphql-ruby/commit/28233b16c0eb9d0fb7808f4980e061dc7507c4cd\n3. https://github.com/rmosolgo/graphql-ruby/commit/2d2f4ed1f79472f8eed29c864b039649e1de238f\n4. https://github.com/rmosolgo/graphql-ruby/commit/5c5a7b9a9bdce143be048074aea50edb7bb747be\n5. https://github.com/rmosolgo/graphql-ruby/commit/6eca16b9fa553aa957099a30dbde64ddcdac52ca\n6. https://github.com/rmosolgo/graphql-ruby/commit/d0963289e0dab4ea893bbecf12bb7d89294957bb\n7. https://github.com/rmosolgo/graphql-ruby/commit/d1117ae0361d9ed67e0795b07f5c3e98e62f3c7c\n8. https://github.com/rmosolgo/graphql-ruby/commit/e3b33ace05391da2871c75ab4d3b66e29133b367\n9. https://github.com/github-community-projects/graphql-client", "creation_timestamp": "2025-03-12T19:41:15.000000Z"}, {"uuid": "8a73b925-cadf-4d32-b9e9-d5ed27b5289b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27403", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7151", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27403\n\ud83d\udd25 CVSS Score: 7.2 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:L)\n\ud83d\udd39 Description: Ratify is a verification engine as a binary executable and on Kubernetes which enables verification of artifact security metadata and admits for deployment only those that comply with policies the user creates. In a Kubernetes environment, Ratify can be configured to authenticate to a private Azure Container Registry (ACR). The Azure workload identity and Azure managed identity authentication providers are configured in this setup. Users that configure a private ACR to be used with the Azure authentication providers may be impacted by a vulnerability that exists in versions prior to 1.2.3 and 1.3.2. Both Azure authentication providers attempt to exchange an Entra ID (EID) token for an ACR refresh token. However, Ratify\u2019s Azure authentication providers did not verify that the target registry is an ACR. This could have led to the EID token being presented to a non-ACR registry during token exchange. EID tokens with ACR access can potentially be extracted and abused if a user workload contains an image reference to a malicious registry. As of versions 1.2.3 and 1.3.2, the Azure workload identity and Azure managed identity authentication providers are updated to add new validation prior to EID token exchange. Validation relies upon registry domain validation against a pre-configured list of well-known ACR endpoints. EID token exchange will be executed only if at least one of the configured well-known domain suffixes (wildcard support included) matches the registry domain of the image reference.\n\ud83d\udccf Published: 2025-03-11T14:16:10.013Z\n\ud83d\udccf Modified: 2025-03-11T14:16:10.013Z\n\ud83d\udd17 References:\n1. https://github.com/ratify-project/ratify/security/advisories/GHSA-44f7-5fj5-h4px\n2. https://github.com/ratify-project/ratify/commit/0ec0c08490e3d672ae64b1a220c90d5484f1c93f\n3. https://github.com/ratify-project/ratify/commit/84c7c48fa76bb9a1c9583635d1e90bc25b1a546c", "creation_timestamp": "2025-03-11T14:39:46.000000Z"}, {"uuid": "d58cef09-b390-47b2-9459-bedc71957eb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2740", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8624", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2740\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in PHPGurukul Old Age Home Management System 1.0. Affected is an unknown function of the file /admin/eligibility.php. The manipulation of the argument pagetitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-25T06:31:05.651Z\n\ud83d\udccf Modified: 2025-03-25T06:31:05.651Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300762\n2. https://vuldb.com/?ctiid.300762\n3. https://vuldb.com/?submit.524733\n4. https://github.com/guimo3/cve/issues/1\n5. https://phpgurukul.com/", "creation_timestamp": "2025-03-25T07:24:03.000000Z"}, {"uuid": "350f1b45-1e67-4a71-833d-6c3cf67f39bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27405", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8869", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27405\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a URL that, once visited by any user, allows to embed arbitrary Javascript into Icinga Web and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings.\n\ud83d\udccf Published: 2025-03-26T15:10:10.288Z\n\ud83d\udccf Modified: 2025-03-26T15:10:10.288Z\n\ud83d\udd17 References:\n1. https://github.com/Icinga/icingaweb2/security/advisories/GHSA-3x37-fjc3-ch8w\n2. https://github.com/Icinga/icingaweb2/releases/tag/v2.11.5\n3. https://github.com/Icinga/icingaweb2/releases/tag/v2.12.3", "creation_timestamp": "2025-03-26T15:26:16.000000Z"}, {"uuid": "984a92c7-be10-4c7b-a9e9-a608cf134878", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27406", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8889", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27406\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Icinga Reporting is the central component for reporting related functionality in the monitoring web frontend and framework Icinga Web 2. A vulnerability present in versions 0.10.0 through 1.0.2 allows to set up a template that allows to embed arbitrary Javascript. This enables the attacker to act on behalf of the user, if the template is being previewed; and act on behalf of the headless browser, if a report using the template is printed to PDF. This issue has been resolved in version 1.0.3 of Icinga Reporting. As a workaround, review all templates and remove suspicious settings.\n\ud83d\udccf Published: 2025-03-26T15:49:45.273Z\n\ud83d\udccf Modified: 2025-03-26T16:15:22.593Z\n\ud83d\udd17 References:\n1. https://github.com/Icinga/icingaweb2-module-reporting/security/advisories/GHSA-7qvq-54vm-r7hx\n2. https://github.com/Icinga/icingaweb2-module-reporting/releases/tag/v1.0.3", "creation_timestamp": "2025-03-26T16:25:23.000000Z"}, {"uuid": "a292c992-9fe2-42ae-b37e-7787f5eda606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27409", "type": "seen", "source": "https://t.me/cvedetector/24110", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27409 - Joplin Server Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27409 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, path traversal is possible in Joplin Server if static file path starts with `css/pluginAssets` or `js/pluginAssets`. The `findLocalFile` function in the `default route` calls `localFileFromUrl` to check for special `pluginAssets` paths. If the function returns a path, the result is returned directly, without checking for path traversal. The vulnerability allows attackers to read files outside the intended directories. This issue has been patched in version 3.3.3. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:09.000000Z"}, {"uuid": "85d47cfe-f9fe-44e1-9d89-364a9406425d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27405", "type": "seen", "source": "https://t.me/cvedetector/21186", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27405 - Icinga Web 2 Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-27405 \nPublished : March 26, 2025, 4:15 p.m. | 28\u00a0minutes ago \nDescription : Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a URL that, once visited by any user, allows to embed arbitrary Javascript into Icinga Web and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T18:04:08.000000Z"}, {"uuid": "62b66283-b310-4d86-b46c-1f89c4e639dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27409", "type": "seen", "source": "Telegram/Gwvh-n-ygZ7AZvt4Z14lI64V1AihU4WxZxoYYl7z1l7jTPI", "content": "", "creation_timestamp": "2025-04-30T17:32:01.000000Z"}, {"uuid": "42430718-3de6-4e53-975e-a81934e2880c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "efa1e6c3-7899-4245-98d7-81a38d4a68e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:28.000000Z"}, {"uuid": "926d13c8-c783-46ac-8b2b-bfa8f186d76f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://gist.github.com/alon710/794b044cfea500e1f5f23253a31d3cc2", "content": "", "creation_timestamp": "2026-01-24T21:25:48.000000Z"}, {"uuid": "62a5b6b9-5a5d-43ab-af24-e27a53e4cdff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27407", "type": "seen", "source": "https://t.me/cvedetector/20168", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27407 - GraphQL-ruby Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27407 \nPublished : March 12, 2025, 7:15 p.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : graphql-ruby is a Ruby implementation of GraphQL. Starting in version 1.11.5 and prior to versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21, loading a malicious schema definition in `GraphQL::Schema.from_introspection` (or `GraphQL::Schema::Loader.load`) can result in remote code execution. Any system which loads a schema by JSON from an untrusted source is vulnerable, including those that use GraphQL::Client to load external schemas via GraphQL introspection. Versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21 contain a patch for the issue. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-12T22:53:44.000000Z"}, {"uuid": "26727505-aa17-4621-98c4-1de91cca893c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27403", "type": "seen", "source": "https://t.me/cvedetector/20086", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27403 - Azure Container Registry Registry Domain Validation Bypass in Ratify\", \n  \"Content\": \"CVE ID : CVE-2025-27403 \nPublished : March 11, 2025, 3:15 p.m. | 1\u00a0hour ago \nDescription : Ratify is a verification engine as a binary executable and on Kubernetes which enables verification of artifact security metadata and admits for deployment only those that comply with policies the user creates. In a Kubernetes environment, Ratify can be configured to authenticate to a private Azure Container Registry (ACR). The Azure workload identity and Azure managed identity authentication providers are configured in this setup. Users that configure a private ACR to be used with the Azure authentication providers may be impacted by a vulnerability that exists in versions prior to 1.2.3 and 1.3.2. Both Azure authentication providers attempt to exchange an Entra ID (EID) token for an ACR refresh token. However, Ratify\u2019s Azure authentication providers did not verify that the target registry is an ACR. This could have led to the EID token being presented to a non-ACR registry during token exchange. EID tokens with ACR access can potentially be extracted and abused if a user workload contains an image reference to a malicious registry. As of versions 1.2.3 and 1.3.2, the Azure workload identity and Azure managed identity authentication providers are updated to add new validation prior to EID token exchange. Validation relies upon registry domain validation against a pre-configured list of well-known ACR endpoints. EID token exchange will be executed only if at least one of the configured well-known domain suffixes (wildcard support included) matches the registry domain of the image reference. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T17:37:30.000000Z"}, {"uuid": "a6581e8e-d6e9-4175-85e0-e5c208f9ccdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27404", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8870", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27404\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a URL that, once visited by any user, allows to embed arbitrary Javascript into Icinga Web and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings.\n\ud83d\udccf Published: 2025-03-26T14:21:05.363Z\n\ud83d\udccf Modified: 2025-03-26T15:10:01.679Z\n\ud83d\udd17 References:\n1. https://github.com/Icinga/icingaweb2/security/advisories/GHSA-c6pg-h955-wf66\n2. https://github.com/Icinga/icingaweb2/releases/tag/v2.11.5\n3. https://github.com/Icinga/icingaweb2/releases/tag/v2.12.3", "creation_timestamp": "2025-03-26T15:26:16.000000Z"}]}