{"vulnerability": "cve-2025-2746", "sightings": [{"uuid": "27b564a4-8337-47e5-9939-c82a021a2626", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llcnt6dcbc2m", "content": "", "creation_timestamp": "2025-03-26T20:47:34.574514Z"}, {"uuid": "9c760562-5b5e-42fe-8035-c26623dcc883", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27465", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q3/0", "content": "", "creation_timestamp": "2025-07-01T10:03:58.000000Z"}, {"uuid": "a859f599-e1c9-4cae-8d6c-e609ca2fe0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4950883", "content": "", "creation_timestamp": "2025-10-20T16:19:14.670098Z"}, {"uuid": "fc95e347-5421-48c2-94b9-8707e0927019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:48.000000Z"}, {"uuid": "31998f65-9e41-482b-9193-3a563d4f35a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m5tfyspy7k2b", "content": "", "creation_timestamp": "2025-11-17T14:16:20.151656Z"}, {"uuid": "5f8d0d22-43a3-4b0b-b87c-869462b70793", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/237aa89d-a7f6-4c3d-8d70-c72952d464d4", "content": "", "creation_timestamp": "2026-02-02T12:25:48.637244Z"}, {"uuid": "2c900cef-46ed-482f-a4ce-d23dc079afa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://t.me/NinjaSec/298", "content": "Certainly! Below is a curated list of critical CVEs from 2025 that involve code execution, browser bypasses, and internal service exposure. These are provided strictly for educational purposes to aid in understanding and mitigating such vulnerabilities.\n\n\n\ud83d\udd10 Critical CVEs from 2025 (Educational Use Only)\n\n1. CVE-2025-47241\n\nDescription: Whitelist bypass in the Browser Use automation tool allows attackers to access internal services via crafted URLs.\n\nCVSS Score: 9.3\n\nReference: \n\n\n\n2. CVE-2025-25014\n\nDescription: Prototype pollution in Kibana leads to arbitrary code execution through crafted HTTP requests to machine learning and reporting endpoints.\n\nCVSS Score: 9.1\n\nReference: \n\n\n\n3. CVE-2025-29927\n\nDescription: Authorization bypass in Next.js middleware allows attackers to access protected routes by manipulating internal headers.\n\nCVSS Score: 9.1\n\nReference: \n\n\n\n4. CVE-2025-24813\n\nDescription: \n\nCVSS Score: \n\nReference: \n\n\n\n5. CVE-2025-2783\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n6. CVE-2025-2636\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n7. CVE-2025-2505\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n8. CVE-2025-2746 &amp; CVE-2025-2747\n\nDescription: \n\nCVSS Score: \n\nReference: \n\n\n\n9. CVE-2025-3066\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n10. CVE-2025-46728\n\nDescription: Denial of Service vulnerability in cpp-httplib, potentially exposing servers to service disruptions.\n\nCVSS Score: High\n\nReference: \n\n#HackersFactory", "creation_timestamp": "2025-05-19T12:58:14.000000Z"}, {"uuid": "2f456972-70bc-42fe-b70e-54931e1dc7b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3ll5j5db7mv2p", "content": "", "creation_timestamp": "2025-03-24T19:40:26.483909Z"}, {"uuid": "89d5550f-d39a-4589-9219-3a9addfadcdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lldda6gnu62u", "content": "", "creation_timestamp": "2025-03-27T03:10:38.057600Z"}, {"uuid": "0b74679b-e70f-454f-bae3-fda7dee7f432", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3ll5tz67vhj2c", "content": "", "creation_timestamp": "2025-03-24T22:54:58.024197Z"}, {"uuid": "cfac16f1-0e1e-46ff-b2fb-2b4673767f70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lls27vr5q22i", "content": "", "creation_timestamp": "2025-04-01T23:39:21.270302Z"}, {"uuid": "5e165bd4-3b91-4921-9277-61e5a9316667", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27463", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/168", "content": "", "creation_timestamp": "2025-05-27T18:50:05.000000Z"}, {"uuid": "40c0733b-60e9-4331-a571-398e232d244f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27461", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114787856061012885", "content": "", "creation_timestamp": "2025-07-03T06:21:23.347371Z"}, {"uuid": "b175796d-e629-467a-b25b-a5883a73bf7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27460", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114787856061012885", "content": "", "creation_timestamp": "2025-07-03T06:21:23.447611Z"}, {"uuid": "b65f73bb-6a1b-40d0-99c2-614b6bee1e26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27465", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lsvwhcmesb22", "content": "", "creation_timestamp": "2025-07-01T14:38:55.146104Z"}, {"uuid": "4429bb3e-28e5-4f0f-926e-2a803cb606f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27462", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lqefammegc2j", "content": "", "creation_timestamp": "2025-05-30T04:25:21.832535Z"}, {"uuid": "6750c840-a142-470e-bcb8-ace13603fab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27464", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lqefammegc2j", "content": "", "creation_timestamp": "2025-05-30T04:25:22.006456Z"}, {"uuid": "2595d5ac-6257-4389-bdd1-1a38213c324d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27463", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lqefammegc2j", "content": "", "creation_timestamp": "2025-05-30T04:25:21.920038Z"}, {"uuid": "1c27c878-d9ef-4fe2-bbb3-b654e00ca3c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27468", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "43ea3e43-efa2-4595-b80c-fcb7e21ba9aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27466", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lylasqe4262g", "content": "", "creation_timestamp": "2025-09-11T17:16:09.069223Z"}, {"uuid": "cbeff052-71bf-44a4-aeb0-cdff4dbe1534", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27466", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lyfqfwfcr627", "content": "", "creation_timestamp": "2025-09-09T12:39:20.191015Z"}, {"uuid": "d8d690c9-a7e3-488b-94af-b5df8688256e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27466", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q3/157", "content": "", "creation_timestamp": "2025-09-09T10:02:48.000000Z"}, {"uuid": "87a0d3c5-203e-4612-b0cb-ec1d11790d84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/237aa89d-a7f6-4c3d-8d70-c72952d464d4", "content": "", "creation_timestamp": "2026-02-02T12:25:48.637244Z"}, {"uuid": "92df6272-4ca5-42a4-93a1-d71ef45a3f20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-multiple-critical-high-vulnerabilities-kentico-xperience-can-lead-remote-code", "content": "", "creation_timestamp": "2026-04-21T05:21:24.000000Z"}, {"uuid": "0d0baead-1db7-4eb7-8e43-ee18df307a2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll5mhfoa3a2w", "content": "", "creation_timestamp": "2025-03-24T20:39:45.704055Z"}, {"uuid": "251adaef-d37e-4a77-9d75-c25cc3fce2b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114219373942955414", "content": "", "creation_timestamp": "2025-03-24T20:48:54.663885Z"}, {"uuid": "0e055071-fb67-4260-b3d0-8f5075ad33d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3llep57giec2x", "content": "", "creation_timestamp": "2025-03-27T16:16:23.223061Z"}, {"uuid": "ef2585d4-487f-4adf-b4f7-2b9aded04e8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27467", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "f41ba028-fd1a-4693-917c-54ed6f7ce0d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27469", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "4f46edea-3711-487e-b62d-f8552f6d8bcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27465", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ltfoe2ubuk2e", "content": "", "creation_timestamp": "2025-07-07T20:56:32.577051Z"}, {"uuid": "4d012e67-bb87-45ee-b955-a302bea9880c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27462", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-4b2a2cfb-440a764efa0a9ca4", "content": "", "creation_timestamp": "2025-05-29T05:44:14.899937Z"}, {"uuid": "6a15468f-0998-49bd-93e7-48bfb1b72bfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27463", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-4b2a2cfb-440a764efa0a9ca4", "content": "", "creation_timestamp": "2025-05-29T05:44:15.000086Z"}, {"uuid": "d3d33542-8044-466f-82d5-bd6fc5b1400f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27464", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-4b2a2cfb-440a764efa0a9ca4", "content": "", "creation_timestamp": "2025-05-29T05:44:15.093268Z"}, {"uuid": "faf6566d-e3d5-415a-87d7-90fdb9acd6b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27464", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114600410672766438", "content": "", "creation_timestamp": "2025-05-31T03:51:33.488946Z"}, {"uuid": "9abec58d-e338-4591-8816-3b422c6685f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27462", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lq5ogdt6ua2m", "content": "", "creation_timestamp": "2025-05-27T12:20:55.913191Z"}, {"uuid": "5f7ea4db-a4ba-4e68-b748-fae56c4a93aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27463", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lq5ogdt6ua2m", "content": "", "creation_timestamp": "2025-05-27T12:20:56.012905Z"}, {"uuid": "01075a37-6278-42d4-972b-cc08a93f2136", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27464", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lq5ogdt6ua2m", "content": "", "creation_timestamp": "2025-05-27T12:20:56.109537Z"}, {"uuid": "31bba9d5-f0ee-4594-8aad-05ffb4f5492e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27462", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lq6nlb2jgy2u", "content": "", "creation_timestamp": "2025-05-27T21:38:26.791659Z"}, {"uuid": "90acc06e-e8f6-4b5d-8654-7dc9ea959fd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27463", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lq6nlb2jgy2u", "content": "", "creation_timestamp": "2025-05-27T21:38:26.894146Z"}, {"uuid": "1311841e-d56a-46cb-8dd7-6f8e83433507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27464", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lq6nlb2jgy2u", "content": "", "creation_timestamp": "2025-05-27T21:38:26.978741Z"}, {"uuid": "b9af920c-7f8a-4c5d-914b-dd332ea96844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27462", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/168", "content": "", "creation_timestamp": "2025-05-27T18:50:05.000000Z"}, {"uuid": "78ac6fef-1fd3-4aaa-ad7d-d2c576b3cca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27464", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/168", "content": "", "creation_timestamp": "2025-05-27T18:50:05.000000Z"}, {"uuid": "d6b0ab53-a712-4c4f-95b7-82fe728ad420", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27460", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3lt23lwyqz3d2", "content": "", "creation_timestamp": "2025-07-03T06:23:55.043812Z"}, {"uuid": "3802ffb5-3f63-436d-a782-0d92d1f3424d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27461", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3lt23lwyqz3d2", "content": "", "creation_timestamp": "2025-07-03T06:23:54.945658Z"}, {"uuid": "80164e8e-ccb8-4b2d-903b-85fbc127adcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27465", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lsvrw3oyo42k", "content": "", "creation_timestamp": "2025-07-01T13:17:42.481337Z"}, {"uuid": "166f6f54-89cd-44d1-8589-71bfd3bdbf50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27461", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lt2zuerr6b2o", "content": "", "creation_timestamp": "2025-07-03T15:23:13.448816Z"}, {"uuid": "8d667b81-32f7-4fdd-99d5-7ce86c51de3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-10-22T12:02:06.000000Z"}, {"uuid": "d4fac36f-9621-4a8e-a660-dd61815536d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m3xrj4i24r2a", "content": "", "creation_timestamp": "2025-10-24T21:02:37.594635Z"}, {"uuid": "3aef552c-3541-4be5-b6f7-b939f4d52d22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m3qa4bhbx526", "content": "", "creation_timestamp": "2025-10-21T21:02:34.847567Z"}, {"uuid": "acaaf533-5f24-4d2e-a186-7efceab68760", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27466", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lynqavxqvs2i", "content": "", "creation_timestamp": "2025-09-12T16:57:52.417948Z"}, {"uuid": "9ee29e19-5395-4867-af87-6d38813e3c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27467", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10994", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27467\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-04-08T17:23:56.402Z\n\ud83d\udccf Modified: 2025-04-08T19:35:16.001Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27467", "creation_timestamp": "2025-04-08T19:47:36.000000Z"}, {"uuid": "37f1bfde-9ea4-41d6-be39-2467ea899b9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27468", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16236", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27468\n\ud83d\udd25 CVSS Score: 7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper privilege management in Windows Secure Kernel Mode allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-05-13T16:58:47.262Z\n\ud83d\udccf Modified: 2025-05-13T20:13:33.750Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27468", "creation_timestamp": "2025-05-13T20:31:19.000000Z"}, {"uuid": "c0d1a234-bf62-4dc0-97c2-f98285f9af22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://t.me/NinjaSec/299", "content": "Code execution, and bypass vulnerabilities \u2014 for educational purposes only:\n\n\n1. CVE-2025-47241 \u2013 Whitelist bypass in Browser Use tool (CVSS 9.3)\n2. CVE-2025-25014 \u2013 Prototype pollution in Kibana (CVSS 9.1)\n3. CVE-2025-29927 \u2013 Next.js middleware authorization bypass (CVSS 9.1)\n4. CVE-2025-24813 \u2013 Apache Tomcat path traversal RCE (Critical)\n5. CVE-2025-2783 \u2013 Chrome Mojo use-after-free (High)\n6. CVE-2025-2636 \u2013 WordPress InstaWP plugin LFI (High)\n7. CVE-2025-2505 \u2013 WordPress Age Gate plugin LFI (High)\n8. CVE-2025-2746 \u2013 Kentico CMS auth bypass (CVSS 9.8)\n9. CVE-2025-2747 \u2013 Kentico CMS staging sync auth bypass (CVSS 9.8)\n10. CVE-2025-3066 \u2013 Chrome Site Isolation use-after-free (High)\n11. CVE-2025-46728 \u2013 cpp-httplib DoS vulnerability\n12. CVE-2025-12345 \u2013 Buffer overflow in XYZ app (CVSS 9.0)\n13. CVE-2025-12346 \u2013 SQL injection in ABC web app (CVSS 8.5)\n14. CVE-2025-12347 \u2013 XSS in DEF platform (CVSS 7.8)\n15. CVE-2025-12348 \u2013 Auth bypass in GHI system (CVSS 9.2)\n16. CVE-2025-12349 \u2013 RCE in JKL service via crafted packets (CVSS 9.5)\n17. CVE-2025-12350 \u2013 Privilege escalation in MNO app (CVSS 8.7)\n18. CVE-2025-12351 \u2013 Info disclosure in PQR system (CVSS 7.5)\n19. CVE-2025-12352 \u2013 DoS in STU server (CVSS 6.8)\n20. CVE-2025-12353 \u2013 Directory traversal in VWX app (CVSS 8.0)\n21. CVE-2025-12354 \u2013 Command injection in YZA tool (CVSS 9.1)\n22. CVE-2025-12355 \u2013 Insecure deserialization in BCD lib (CVSS 9.3)\n23. CVE-2025-12356 \u2013 CSRF in EFG portal (CVSS 7.2)\n24. CVE-2025-12357 \u2013 Memory corruption in HIJ driver (CVSS 8.9)\n25. CVE-2025-12358 \u2013 Improper auth in KLM API (CVSS 9.0)\n\n#HackersFactory", "creation_timestamp": "2025-05-07T15:48:27.000000Z"}, {"uuid": "5649baf4-c29f-416d-8396-da3c4c006b3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2746", "type": "seen", "source": "https://t.me/cvedetector/20997", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2746 - Kentico Xperience Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2746 \nPublished : March 24, 2025, 7:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server password handling of empty SHA1 usernames in digest authentication. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.172. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T22:35:11.000000Z"}]}