{"vulnerability": "cve-2025-2748", "sightings": [{"uuid": "b40429fb-187a-400a-95c4-a73f23bae385", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lxxjpvva6t2o", "content": "", "creation_timestamp": "2025-09-03T21:02:26.895283Z"}, {"uuid": "655adbfc-603c-4b67-bbbc-95aebaafbdb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "published-proof-of-concept", "source": "Telegram/WmTbZAwJq4oeu1oQbw_9scJeNK9TlkQDYUtF5SwroIlUcq4", "content": "", "creation_timestamp": "2025-09-01T15:00:07.000000Z"}, {"uuid": "70e9280b-430d-4da6-915a-aae43ab66036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10981", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27480\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-04-08T17:23:58.678Z\n\ud83d\udccf Modified: 2025-04-08T19:40:38.153Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27480", "creation_timestamp": "2025-04-08T19:47:19.000000Z"}, {"uuid": "ec111b71-a8ae-486a-950e-34f867b620ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/36177", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC for CVE-2025-2748 - Unauthenticated ZIP file upload with embedded SVG for XSS\nURL\uff1ahttps://github.com/xirtam2669/Kentico-Xperience-before-13.0.178---XSS-POC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-09T18:53:15.000000Z"}, {"uuid": "64365ecc-9084-484c-975c-f28c1112eeaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/49855", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aLetting attackers run malicious code without needing a cracked password, user interaction, or even a foothold in your network. That\u2019s CVE-2025-27480\nURL\uff1ahttps://github.com/mrk336/CVE-2025-27480-The-Silent-Gateway-Risk\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-01T11:34:26.000000Z"}, {"uuid": "6dcafdb7-97b8-40db-bfd9-e5cbe0067722", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://t.me/cyberbannews_ir/16404", "content": "\u2b55\u0647\u0634\u062f\u0627\u0631 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a: \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc Critical RCE \u062f\u0631 \u0633\u0631\u0648\u06cc\u0633 Remote Desktop\n\n\ud83d\udd3a\u0627\u062e\u06cc\u0631\u0627\u064b \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc \u0627\u0632 \u0646\u0648\u0639 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (RCE) \u062f\u0631 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc Windows Remote Desktop \u06a9\u0634\u0641 \u0634\u062f\u0647 \u06a9\u0647 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u0647\u0627\u06cc CVE-2025-27480 \u0648 CVE-2025-27482 \u062b\u0628\u062a \u0634\u062f\u0647\u200c\u0627\u0646\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u0646\u062f \u0628\u062f\u0648\u0646 \u0646\u06cc\u0627\u0632 \u0628\u0647 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a\u060c \u06a9\u0646\u062a\u0631\u0644 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0631\u0627 \u062f\u0631 \u062f\u0633\u062a \u0628\u06af\u06cc\u0631\u0646\u062f \u0648 \u06a9\u062f\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u0631\u0627 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f.\n\n\u2b55\ufe0f \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0645\u0627\u0647\u06cc\u062a \u0628\u062f\u0648\u0646 \u0646\u06cc\u0627\u0632 \u0628\u0647 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a\u060c \u062a\u0647\u062f\u06cc\u062f\u06cc \u062c\u062f\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u0648 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0645\u062d\u0633\u0648\u0628 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f. \u063a\u0641\u0644\u062a \u0627\u0632 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0646\u0641\u0648\u0630 \u06af\u0633\u062a\u0631\u062f\u0647\u060c \u0633\u0631\u0642\u062a \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u06cc\u0627 \u0627\u062e\u062a\u0644\u0627\u0644 \u062f\u0631 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627 \u0634\u0648\u062f. \u062d\u062a\u0645\u0627\u064b \u062f\u0631 \u0627\u0633\u0631\u0639 \u0648\u0642\u062a \u0686\u0631\u062e\u0647 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0648\u0635\u0644\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc (Patch Management) \u0631\u0627 \u0641\u0639\u0627\u0644 \u06a9\u0646\u06cc\u062f!\n\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc #\u0627\u062e\u062a\u0644\u0627\u0644 #\u0633\u0631\u0642\u062a_\u062f\u0627\u062f\u0647 #\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a #\u0647\u06a9\n\n\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\n\ud83d\udd39\ud83d\udd39 @cyberbannews_ir", "creation_timestamp": "2025-04-22T12:45:18.000000Z"}, {"uuid": "e8f21150-f6d5-47cf-8f1b-967527ae7f4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/3505", "content": "#exploit\n1. CVE-2025-2748:\nXSS To RCE By Abusing Custom File Handlers - Kentico Xperience CMS\nhttps://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748\n\n2. CVE-2025-44228:\nAnyDesk RCE PoC\nhttps://github.com/ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n3. CVE-2025-30065:\nApache Parquet RCE\nhttps://github.com/ron-imperva/CVE-2025-30065-PoC", "creation_timestamp": "2025-04-10T12:05:52.000000Z"}, {"uuid": "34006bf7-688d-4215-a621-34cd706bea22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://t.me/ViralCyber/12553", "content": "\u26a0\ufe0f\u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc\u0647\u0627\u06cc \u0627\u062e\u06cc\u0631 RDS \u063a\u0627\u0641\u0644 \u0646\u0634\u0648\u06cc\u062f!\n\ud83d\udce4\u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc Remote Code Execution (RCE) \u06a9\u0647 \u0627\u062e\u06cc\u0631\u0627 \u062f\u0631 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc Windows Remote Desktop \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u0647\u0627\u06cc CVE-2025-27480 \u0648 CVE-2025-27482 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647 \u0627\u0646\u062f \u0628\u0633\u06cc\u0627\u0631 \u062e\u0637\u0631\u0646\u0627\u06a9 \u0647\u0633\u062a\u0646\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u062f\u0648\u0646 \u0646\u06cc\u0627\u0632 \u0628\u0647 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u062a\u0648\u0633\u0637 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0642\u0627\u0628\u0644 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0647\u0633\u062a\u0646\u062f.\n\ud83d\udce4\u0627\u0632 \u0628\u0647\u200c\u0631\u0648\u0632 \u0628\u0648\u062f\u0646 \u0633\u06cc\u0633\u062a\u0645\u0647\u0627 \u0645\u0637\u0645\u0626\u0646 \u0634\u0648\u06cc\u062f.\n\n\u2709\ufe0f@PingChannel\n\u062e\u0628\u0631\u060c \u062a\u062d\u0644\u06cc\u0644\u060c \u0627\u0646\u062a\u0642\u0627\u062f - \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a\n\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b", "creation_timestamp": "2025-04-22T12:34:03.000000Z"}, {"uuid": "72a67b0d-a6ab-48d2-9742-eb35cced5887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27482", "type": "seen", "source": "https://t.me/ViralCyber/12553", "content": "\u26a0\ufe0f\u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc\u0647\u0627\u06cc \u0627\u062e\u06cc\u0631 RDS \u063a\u0627\u0641\u0644 \u0646\u0634\u0648\u06cc\u062f!\n\ud83d\udce4\u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc Remote Code Execution (RCE) \u06a9\u0647 \u0627\u062e\u06cc\u0631\u0627 \u062f\u0631 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc Windows Remote Desktop \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u0647\u0627\u06cc CVE-2025-27480 \u0648 CVE-2025-27482 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647 \u0627\u0646\u062f \u0628\u0633\u06cc\u0627\u0631 \u062e\u0637\u0631\u0646\u0627\u06a9 \u0647\u0633\u062a\u0646\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u062f\u0648\u0646 \u0646\u06cc\u0627\u0632 \u0628\u0647 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u062a\u0648\u0633\u0637 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0642\u0627\u0628\u0644 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0647\u0633\u062a\u0646\u062f.\n\ud83d\udce4\u0627\u0632 \u0628\u0647\u200c\u0631\u0648\u0632 \u0628\u0648\u062f\u0646 \u0633\u06cc\u0633\u062a\u0645\u0647\u0627 \u0645\u0637\u0645\u0626\u0646 \u0634\u0648\u06cc\u062f.\n\n\u2709\ufe0f@PingChannel\n\u062e\u0628\u0631\u060c \u062a\u062d\u0644\u06cc\u0644\u060c \u0627\u0646\u062a\u0642\u0627\u062f - \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a\n\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b", "creation_timestamp": "2025-04-22T12:34:03.000000Z"}, {"uuid": "198f7ba7-380b-4ca5-9f3b-8a9afb8cd167", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll5t66rlpk2e", "content": "", "creation_timestamp": "2025-03-24T22:39:52.718304Z"}, {"uuid": "45020f5d-b3c0-49af-a902-d5b64f5b01ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-2748", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114263035807744605", "content": "", "creation_timestamp": "2025-04-01T13:52:41.797494Z"}, {"uuid": "e38d1ed8-5946-4e52-9637-551ee9cf7bf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-2748", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114263035807744605", "content": "", "creation_timestamp": "2025-04-01T13:52:41.798402Z"}, {"uuid": "c5b6d5aa-0eab-4ad5-92bc-d23ac605e09a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3llqonigods2h", "content": "", "creation_timestamp": "2025-04-01T10:39:32.813239Z"}, {"uuid": "a81573ff-3ee5-4b1b-95a2-db4154ea9efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-2748.yaml", "content": "", "creation_timestamp": "2025-04-01T11:43:43.000000Z"}, {"uuid": "119f81d9-c82d-4f43-93a6-8ea947f5dfbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27485", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "5f179599-ffa6-4a65-bbf4-d2bf536e3209", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27484", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "450c7483-5a68-4864-b7c4-7067dceb8f99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://krebsonsecurity.com/2025/04/patch-tuesday-april-2025-edition/", "content": "", "creation_timestamp": "2025-04-09T01:09:36.000000Z"}, {"uuid": "3611d36c-2312-4611-990a-5806eab39f3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27482", "type": "seen", "source": "https://krebsonsecurity.com/2025/04/patch-tuesday-april-2025-edition/", "content": "", "creation_timestamp": "2025-04-09T01:09:36.000000Z"}, {"uuid": "d282cfaf-5822-480b-99ca-a5c0bb952342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-45bed739-4cf70d274d3babdb", "content": "", "creation_timestamp": "2025-04-09T07:18:23.055145Z"}, {"uuid": "8d72b1e7-a350-47ed-ae64-b86cf299dc7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27482", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-45bed739-4cf70d274d3babdb", "content": "", "creation_timestamp": "2025-04-09T07:18:23.137236Z"}, {"uuid": "b7b7a1f8-4242-47dc-a7c6-aa2268e84b38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-60e21c13-a8f32a075bc91ac5", "content": "", "creation_timestamp": "2025-04-09T15:30:10.194311Z"}, {"uuid": "9ec92afc-114b-4f9f-80fd-e0919f41ac32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27487", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-60e21c13-a8f32a075bc91ac5", "content": "", "creation_timestamp": "2025-04-09T15:30:10.266222Z"}, {"uuid": "49c3a141-0994-4e28-89ac-d196008134a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27487", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10996", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27487\n\ud83d\udd25 CVSS Score: 8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-04-08T17:24:01.231Z\n\ud83d\udccf Modified: 2025-04-08T19:34:44.953Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27487", "creation_timestamp": "2025-04-08T19:47:38.000000Z"}, {"uuid": "da58a5c5-9080-485c-aec6-a4a048355b5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/452", "content": "Top Security News for Today\n\nJapan Passes Active Cyber Defense Bill  \nhttps://www.tripwire.com/state-of-security/japan-passes-active-cyber-defense-bill\n\nTop Cybersecurity Considerations When Moving Commercial Premises  \nhttps://www.tripwire.com/state-of-security/top-cybersecurity-considerations-when-moving-commercial-premises\n\nReforging Sliver: How Simple Code Edits Can Outmaneuver EDR  \nhttps://www.reddit.com/r/netsec/comments/1joqvup/reforging_sliver_how_simple_code_edits_can/\n\nHarnessing the Power of Named Pipes  \nhttps://www.reddit.com/r/netsec/comments/1jor8nr/harnessing_the_power_of_named_pipes/\n\nCrushFTP Authentication Bypass - CVE-2025-2825 \u2014 ProjectDiscovery Blog  \nhttps://www.reddit.com/r/netsec/comments/1jopz93/crushftp_authentication_bypass_cve20252825/\n\nCell Phone OPSEC for Border Crossings  \nhttps://www.schneier.com/blog/archives/2025/04/cell-phone-opsec-for-border-crossings.html\n\nXSS To RCE By Abusing Custom File Handlers - Kentico Xperience CMS (CVE-2025-2748) - watchTowr Labs  \nhttps://www.reddit.com/r/netsec/comments/1jos2z2/xss_to_rce_by_abusing_custom_file_handlers/\n\nWhen Parameterization Fails: SQL Injection in Nim's db_postgres Module Using Parameterized Queries  \nhttps://www.reddit.com/r/netsec/comments/1joth41/when_parameterization_fails_sql_injection_in_nims/\n\nTransforming Public Sector Security Operations in the AI Era  \nhttps://www.microsoft.com/en-us/security/blog/2025/04/01/transforming-public-sector-security-operations-in-the-ai-era/\n\nImproved Detection Signature for the K8s IngressNightmare Vulnerability  \nhttps://www.reddit.com/r/netsec/comments/1jp9cmt/improved_detection_signature_for_the_k8s/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-04-02T09:30:37.000000Z"}, {"uuid": "84ed7204-eb5a-469b-acf7-f09d257845b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://t.me/cvedetector/20993", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2748 - Kentico Xperience Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2748 \nPublished : March 24, 2025, 7:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : The\u00a0Kentico Xperience application does not fully validate or filter files uploaded via the multiple-file upload functionality, which allows for stored XSS.This issue affects Kentico Xperience through 13.0.178. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T22:35:05.000000Z"}, {"uuid": "590892c9-4ad0-46fe-b701-a22673d0476d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "published-proof-of-concept", "source": "Telegram/UniB57STuDvdE48xUY8fEONrPJBrVxr-UljY-0_y9mj8GYk", "content": "", "creation_timestamp": "2025-04-06T10:00:59.000000Z"}, {"uuid": "f1052f15-9f1f-461e-9fb0-e5db78deba16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9788", "content": "XSS To RCE By Abusing Custom File Handlers - Kentico Xperience CMS (CVE-2025-2748)\n\nhttps://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748/", "creation_timestamp": "2025-04-07T22:30:57.000000Z"}, {"uuid": "6b8ab760-8716-4d1b-bd6c-051a15352240", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/12011", "content": "#exploit\n1. CVE-2025-2748:\nXSS To RCE By Abusing Custom File Handlers - Kentico Xperience CMS\nhttps://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748\n\n2. CVE-2025-44228:\nAnyDesk RCE PoC\nhttps://github.com/ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n3. CVE-2025-30065:\nApache Parquet RCE\nhttps://github.com/ron-imperva/CVE-2025-30065-PoC", "creation_timestamp": "2025-04-07T16:10:19.000000Z"}, {"uuid": "3a047c5d-7a0d-4d9f-a368-0b8fc09a0e05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3llqn6gkph42j", "content": "", "creation_timestamp": "2025-04-01T10:13:14.076330Z"}, {"uuid": "5a74c974-fcae-4499-9f85-22cb5450beb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://bsky.app/profile/samilaiho.com/post/3lltd6r6nws26", "content": "", "creation_timestamp": "2025-04-02T11:52:28.049592Z"}, {"uuid": "f3495510-cd03-418c-9937-805f2ed0ab73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-2748", "type": "seen", "source": "https://threatintel.cc/2025/04/02/xss-to-rce-by-abusing.html", "content": "", "creation_timestamp": "2025-04-02T11:23:59.000000Z"}, {"uuid": "4cb1664d-2423-44d6-a738-d39ee145a40e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llubw2ytye2v", "content": "", "creation_timestamp": "2025-04-02T21:02:22.667912Z"}, {"uuid": "85c8af35-17a5-4cd5-b7b9-07d3490865c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lm3c4gfjk62c", "content": "", "creation_timestamp": "2025-04-05T15:54:32.341930Z"}, {"uuid": "5371fdc8-a89b-40fe-95eb-58f35ae5a1b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27481", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114303700058967662", "content": "", "creation_timestamp": "2025-04-08T18:14:08.654351Z"}, {"uuid": "4d8cd332-4db1-4e7e-b01a-1196dcf4676a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114304071588461960", "content": "", "creation_timestamp": "2025-04-08T19:48:37.923629Z"}, {"uuid": "1cae24d7-4993-49bc-8666-321e906e0581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27481", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114304071623027386", "content": "", "creation_timestamp": "2025-04-08T19:48:38.974299Z"}, {"uuid": "aa15fbb6-8919-4698-8c19-4848ebdd2c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27482", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114304071662070939", "content": "", "creation_timestamp": "2025-04-08T19:48:39.434950Z"}, {"uuid": "c13ccf87-d087-4756-af40-6ba33efcac5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27487", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114304071724014436", "content": "", "creation_timestamp": "2025-04-08T19:48:41.834629Z"}, {"uuid": "ea3761f3-ec94-4ebc-87fa-0760921c8b9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27481", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmdbnombmj24", "content": "", "creation_timestamp": "2025-04-08T20:07:39.790934Z"}, {"uuid": "33d9140f-4c60-479d-b56c-41e8d17809d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmdbnopjwz2c", "content": "", "creation_timestamp": "2025-04-08T20:07:40.398455Z"}, {"uuid": "9a6d7716-4f8d-4d3d-80b4-fc9919609697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27487", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmdbnoswu42z", "content": "", "creation_timestamp": "2025-04-08T20:07:41.086521Z"}, {"uuid": "69df1335-70f0-4d6e-809d-449953acfc65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27482", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmdbnovzvg2v", "content": "", "creation_timestamp": "2025-04-08T20:07:41.693245Z"}, {"uuid": "aa85f9f9-189e-4247-a0fd-012d95a4c269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27489", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0109", "content": "", "creation_timestamp": "2025-04-08T16:53:20.000000Z"}, {"uuid": "f4c47228-8964-4fd8-aa08-035c6796908a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-274897", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0109", "content": "", "creation_timestamp": "2025-04-08T16:53:20.000000Z"}, {"uuid": "bb6dc835-7653-4860-9ac2-1599a9c01a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27487", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "1b999660-812a-40ec-b36a-35060c110278", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27481", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "965236a7-bf44-4af6-9617-143872087183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27482", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "44279cd5-79af-4dfa-aca7-faa9420d992f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27483", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "b4ff70b5-038e-4cd6-8f14-26f3a0535834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27489", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "b6035a01-e06d-4a18-88c2-1aafd50fbfe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "976a5450-1646-47f4-a6d6-800e5047e5fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27486", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "e8bb5026-47ba-481b-b587-bff3e0075609", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27483", "type": "seen", "source": "https://infosec.exchange/users/wdormann/statuses/114378804966922705", "content": "", "creation_timestamp": "2025-04-22T00:34:19.395766Z"}, {"uuid": "369358f3-c63d-4d93-9e0e-3f1640dd9f4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27483", "type": "seen", "source": "https://bsky.app/profile/wdormann.infosec.exchange.ap.brid.gy/post/3lnegmokqwq32", "content": "", "creation_timestamp": "2025-04-22T00:34:40.363031Z"}, {"uuid": "a0270941-8192-4770-affe-d20d8c5bb2bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://bsky.app/profile/c1b3r53cur1ty.bsky.social/post/3lnjbikz2xw2f", "content": "", "creation_timestamp": "2025-04-23T22:45:54.540079Z"}, {"uuid": "88815fbd-a047-476a-9e8a-f993aa6808e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-274886", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0156", "content": "", "creation_timestamp": "2025-05-13T17:10:10.000000Z"}, {"uuid": "82dede49-98da-4357-9ec5-74f1fd608312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:38.000000Z"}, {"uuid": "d30281d3-d769-47bf-8998-18fe995e8b8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:37.000000Z"}, {"uuid": "b3c7528c-c785-4f89-b6cb-54d0ec338891", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/77a1b8aa-f86f-4c74-af5b-7e082c7ae3de", "content": "", "creation_timestamp": "2025-04-10T11:32:21.060085Z"}, {"uuid": "48ef5611-592d-460e-b264-93ea506be0bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27482", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/77a1b8aa-f86f-4c74-af5b-7e082c7ae3de", "content": "", "creation_timestamp": "2025-04-10T11:32:21.060085Z"}, {"uuid": "89c4a411-ec02-4208-98ee-5372298b870d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10632", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32370\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L)\n\ud83d\udd39 Description: Kentico Xperience before 13.0.178 has a specific set of allowed ContentUploader file extensions for unauthenticated uploads; however, because .zip is processed through TryZipProviderSafe, there is additional functionality to create files with other extensions. NOTE: this is a separate issue not necessarily related to SVG or XSS.\n\ud83d\udccf Published: 2025-04-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-06T06:50:42.609Z\n\ud83d\udd17 References:\n1. https://devnet.kentico.com/download/hotfixes\n2. https://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748/", "creation_timestamp": "2025-04-06T07:38:01.000000Z"}, {"uuid": "987a4d1f-9e3e-4481-9904-febc9feacd5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27482", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10989", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27482\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-04-08T17:23:59.900Z\n\ud83d\udccf Modified: 2025-04-08T19:36:55.815Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27482", "creation_timestamp": "2025-04-08T19:47:29.000000Z"}, {"uuid": "daaf9a4b-2a80-413a-b3a5-a2d5fed04350", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27483", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10993", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27483\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-04-08T17:24:00.564Z\n\ud83d\udccf Modified: 2025-04-08T19:35:30.618Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27483", "creation_timestamp": "2025-04-08T19:47:35.000000Z"}, {"uuid": "e34f7644-b0b6-490c-8976-4ee5b2ef24c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27481", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10987", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27481\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-04-08T17:23:59.303Z\n\ud83d\udccf Modified: 2025-04-08T19:37:28.223Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27481", "creation_timestamp": "2025-04-08T19:47:27.000000Z"}, {"uuid": "5e49a55b-5ee2-48b2-b05e-d2ce6f893ceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27488", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16182", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27488\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use of hard-coded credentials in Windows Hardware Lab Kit allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-05-13T16:58:55.126Z\n\ud83d\udccf Modified: 2025-05-13T18:13:57.657Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27488", "creation_timestamp": "2025-05-13T18:30:48.000000Z"}, {"uuid": "1e192b96-6b84-4eea-a561-b5e476d69111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/69", "content": "", "creation_timestamp": "2025-08-30T01:05:55.000000Z"}, {"uuid": "3aac62b8-8236-481d-af2b-4806fa3f9aef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27482", "type": "seen", "source": "https://t.me/cyberbannews_ir/16404", "content": "\u2b55\u0647\u0634\u062f\u0627\u0631 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a: \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc Critical RCE \u062f\u0631 \u0633\u0631\u0648\u06cc\u0633 Remote Desktop\n\n\ud83d\udd3a\u0627\u062e\u06cc\u0631\u0627\u064b \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc \u0627\u0632 \u0646\u0648\u0639 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (RCE) \u062f\u0631 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc Windows Remote Desktop \u06a9\u0634\u0641 \u0634\u062f\u0647 \u06a9\u0647 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u0647\u0627\u06cc CVE-2025-27480 \u0648 CVE-2025-27482 \u062b\u0628\u062a \u0634\u062f\u0647\u200c\u0627\u0646\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u0646\u062f \u0628\u062f\u0648\u0646 \u0646\u06cc\u0627\u0632 \u0628\u0647 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a\u060c \u06a9\u0646\u062a\u0631\u0644 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0631\u0627 \u062f\u0631 \u062f\u0633\u062a \u0628\u06af\u06cc\u0631\u0646\u062f \u0648 \u06a9\u062f\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u0631\u0627 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f.\n\n\u2b55\ufe0f \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0645\u0627\u0647\u06cc\u062a \u0628\u062f\u0648\u0646 \u0646\u06cc\u0627\u0632 \u0628\u0647 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a\u060c \u062a\u0647\u062f\u06cc\u062f\u06cc \u062c\u062f\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u0648 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0645\u062d\u0633\u0648\u0628 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f. \u063a\u0641\u0644\u062a \u0627\u0632 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0646\u0641\u0648\u0630 \u06af\u0633\u062a\u0631\u062f\u0647\u060c \u0633\u0631\u0642\u062a \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u06cc\u0627 \u0627\u062e\u062a\u0644\u0627\u0644 \u062f\u0631 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627 \u0634\u0648\u062f. \u062d\u062a\u0645\u0627\u064b \u062f\u0631 \u0627\u0633\u0631\u0639 \u0648\u0642\u062a \u0686\u0631\u062e\u0647 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0648\u0635\u0644\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc (Patch Management) \u0631\u0627 \u0641\u0639\u0627\u0644 \u06a9\u0646\u06cc\u062f!\n\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc #\u0627\u062e\u062a\u0644\u0627\u0644 #\u0633\u0631\u0642\u062a_\u062f\u0627\u062f\u0647 #\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a #\u0647\u06a9\n\n\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\n\ud83d\udd39\ud83d\udd39 @cyberbannews_ir", "creation_timestamp": "2025-04-22T12:45:18.000000Z"}, {"uuid": "039c19db-3899-4690-a360-4eed93b55f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27482", "type": "seen", "source": "https://t.me/kasperskyb2b/1694", "content": "\ud83d\udd2c \u0410\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u0438\u0439 Patch Tuesday: \u043b\u0443\u0447\u0448\u0435\u0435, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u0432\u043f\u0435\u0440\u0435\u0434\u0438!\n\nMicrosoft \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u043a\u0440\u0443\u043f\u043d\u044b\u0439 \u043f\u0430\u043a\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439, \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0432 134 \u0434\u0435\u0444\u0435\u043a\u0442\u0430 (\u0438\u0437 \u043d\u0438\u0445 10 \u2014 \u0432 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445). \u041e\u0434\u043d\u0430 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u043c, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u043c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 ransomware, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u044b \u0440\u0430\u043d\u0435\u0435 \u043d\u0435 \u0431\u044b\u043b\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b. \u041d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u043e\u0439 \u043d\u043e\u0432\u0438\u043d\u043a\u043e\u0439 \u044d\u0442\u043e\u0433\u043e \u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u0441\u0442\u0430\u043b\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f Windows 11, \u0434\u043b\u044f \u043c\u043d\u043e\u0433\u0438\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0443\u043a\u0430\u0437\u0430\u043d\u043e, \u0447\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Windows 10 \u0431\u0443\u0434\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u00ab\u043f\u043e\u0437\u0436\u0435\u00bb.  \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Microsoft \u0434\u0430\u043b\u0430 \u0434\u043b\u044f \u043c\u043d\u043e\u0433\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043e\u0446\u0435\u043d\u043a\u0443 \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u043b\u0438\u0447\u0430\u0435\u0442\u0441\u044f \u043e\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u0430 CVSS3.1. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0431\u043e\u043b\u044c\u0448\u0435 \u0447\u0435\u043c \u0432 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445 \u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430\u0445 \u0441\u0434\u0435\u043b\u0430\u043d\u0430 \u043f\u043e\u043f\u0440\u0430\u0432\u043a\u0430 \u043d\u0430 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043b\u0438\u0448\u044c 11 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u043e\u0446\u0435\u043d\u043a\u0443 critical, 2 \u2014 low, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u2014 important. 49 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, 31 \u2014 \u043a RCE, 17 \u2014 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 14 \u2014 \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438, 9 \u2014 \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 3 \u2014  spoofing.\n\n\n\u0417\u0438\u0440\u043e\u0434\u0435\u0439 \u043d\u0430 \u0441\u043b\u0443\u0436\u0431\u0435 RansomEXX\nCVE-2025-29824 (7.8) \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 use after free \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 CLFS \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e system.  \n\u0414\u0435\u0444\u0435\u043a\u0442\u043e\u043c \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0441\u0430\u043c\u043e\u0439 Microsoft \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 RansomEXX/Storm-2460, \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u044f \u043d\u0430 \u043f\u043e\u0440\u0430\u0436\u0451\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0431\u044d\u043a\u0434\u043e\u0440 PipeMagic \u0438 \u043f\u043e\u0432\u044b\u0448\u0430\u044f \u0435\u0433\u043e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u0412\u043f\u0440\u043e\u0447\u0435\u043c, \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u0432\u0438\u0434\u0438\u0442 \u043d\u0435\u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u0446\u0435\u043b\u0435\u0432\u044b\u0435 \u0430\u0442\u0430\u043a\u0438. \u041c\u044b \u043f\u0438\u0441\u0430\u043b\u0438 \u043e\u0431 \u044d\u0442\u043e\u043c \u0412\u041f\u041e \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443, \u0430\u0442\u0430\u043a\u0438 \u0441 \u0435\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0438\u043c\u0435\u043b\u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u043e\u043b\u043d \u0432 \u0440\u0430\u0437\u043d\u044b\u0445 \u0441\u0442\u0440\u0430\u043d\u0430\u0445. \u0421\u0430\u043c\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CLFS \u0438\u043c\u0435\u043d\u043d\u043e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 \u2014 \u0445\u043e\u0440\u043e\u0448\u043e \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043d\u0430\u043c\u0438 \u0444\u0435\u043d\u043e\u043c\u0435\u043d, \u043c\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 5 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e \u043d\u0438\u0445 \u0432 Microsoft.\n\n\u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\u0425\u043e\u0442\u044f \u0443 \u043c\u043d\u043e\u0433\u0438\u0445 \u043e\u043f\u0430\u0441\u043d\u043e \u0432\u044b\u0433\u043b\u044f\u0434\u044f\u0449\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0420\u0435\u0434\u043c\u043e\u043d\u0434 \u043e\u0446\u0435\u043d\u0438\u043b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u043a\u0430\u043a \u043c\u0435\u043d\u0435\u0435 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u0443\u044e \u0438\u0437-\u0437\u0430 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0431\u0435\u0434\u0438\u0442\u044c \u0432 \u0433\u043e\u043d\u043a\u0435 (race condition), \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0445 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u044b \u0438\u043b\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c, \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e.\nCVE-2025-26663/CVE-2025-26670 \u2014 RCE \u0432  Windows LDAP, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443. \nCVE-2025-29809 \u2014 \u0443\u0442\u0435\u0447\u043a\u0430 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 Kerberos \u0432 \u043e\u0431\u0445\u043e\u0434 Windows Defender Credential Guard. \u041a\u0440\u043e\u043c\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u043f\u0430\u0442\u0447\u0430 \u043d\u0430\u0434\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u0438 \u0437\u0430\u043d\u043e\u0432\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0442\u044c \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0438 VBS.\nCVE-2025-27480/CVE-2025-27482 \u2014 RCE \u0432 Remote Desktop Services, \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0434\u043e\u043b\u0436\u0435\u043d \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u0442\u044c\u0441\u044f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0432 \u0440\u043e\u043b\u0438 \u0448\u043b\u044e\u0437\u0430 Remote Desktop.\nCVE-2025-27740 \u2014 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 Active Directory Certificate Services, \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u0430\u0434\u043c\u0438\u043d\u0430. \nCVE-2025-26686 \u2014 RCE TCP/IP. \u0416\u0435\u0440\u0442\u0432\u0430 \u0434\u043e\u043b\u0436\u043d\u0430 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0437\u0430\u043f\u0440\u043e\u0441 \u043d\u0430 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 DHCPv6, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043f\u0430\u043a\u0435\u0442 \u0432 \u043e\u0442\u0432\u0435\u0442. \nCVE-2025-27752 / CVE-2025-29791 \u2014 RCE \u0432 Excel, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0435 \u0447\u0435\u0440\u0435\u0437 \u043f\u0430\u043d\u0435\u043b\u044c \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430. \u0411\u043e\u043d\u0443\u0441\u043e\u043c \u2014 CVE-2025-27745, -27748, -27749, \u0432\u0441\u0435 \u0432 Office \u0431\u0435\u0437 \u0443\u043a\u0430\u0437\u0430\u043d\u0438\u044f \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432, \u0442\u043e\u0436\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0435 \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440.\n\n#\u043f\u0430\u0442\u0447\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 #Microsoft @\u041f2\u0422", "creation_timestamp": "2025-04-09T09:10:24.000000Z"}, {"uuid": "8598dace-0b04-49a9-a0d6-675d6ac8c23a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/8800", "content": "#exploit\n1. CVE-2025-2748:\nXSS To RCE By Abusing Custom File Handlers - Kentico Xperience CMS\nhttps://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748\n\n2. CVE-2025-44228:\nAnyDesk RCE PoC\nhttps://github.com/ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n3. CVE-2025-30065:\nApache Parquet RCE\nhttps://github.com/ron-imperva/CVE-2025-30065-PoC", "creation_timestamp": "2025-04-10T12:05:52.000000Z"}, {"uuid": "08394e74-0232-42d4-9ec4-7b72948e74ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://bsky.app/profile/mariusavram.bsky.social/post/3llraotyeds2c", "content": "", "creation_timestamp": "2025-04-01T16:02:26.118131Z"}, {"uuid": "214e24b4-e5f6-4cc1-9e5a-9090805d4f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3llrnab35ic2g", "content": "", "creation_timestamp": "2025-04-01T19:46:54.880271Z"}, {"uuid": "0482fbc0-56e1-44b7-99e1-b9fca469872e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2748", "type": "exploited", "source": "https://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748/", "content": "", "creation_timestamp": "2025-04-01T11:21:05.092566Z"}, {"uuid": "bd21e934-2b38-489c-a1ce-ec129f0fe784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27480", "type": "seen", "source": "https://bsky.app/profile/technofeed.bsky.social/post/3lo3nsfuoqp2x", "content": "", "creation_timestamp": "2025-05-01T06:14:04.750321Z"}, {"uuid": "69fc76cf-437e-487b-9543-5f737979a028", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27488", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}]}