{"vulnerability": "cve-2025-27517", "sightings": [{"uuid": "b7f6206c-c1ca-48be-8a6c-a8fdcb1f03de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27517", "type": "seen", "source": "https://t.me/cvedetector/19652", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27517 - \"Volt Livewire Remote Code Execution Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-27517 \nPublished : March 5, 2025, 8:16 p.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : Volt is an elegantly crafted functional API for Livewire. Malicious, user-crafted request payloads could potentially lead to remote code execution within Volt components. This vulnerability is fixed in 1.7.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T22:47:42.000000Z"}, {"uuid": "7ba02055-970a-4358-b5c3-d8c1aaa8e3b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27517", "type": "seen", "source": "https://t.me/CyberBulletin/2553", "content": "\u26a11.08M Downloads at Risk: Volt Fixes Severe RCE Vulnerability (CVE-2025-27517).\n\n#CyberBulletin", "creation_timestamp": "2025-03-10T14:45:04.000000Z"}, {"uuid": "0452cb6c-7657-4677-8711-03a1db3b6080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27517", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lk3cvq25i22p", "content": "", "creation_timestamp": "2025-03-11T05:18:20.740523Z"}, {"uuid": "946fe5fb-288e-4da1-93b8-ef0658ea009c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27517", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3ljytjrg4y22g", "content": "", "creation_timestamp": "2025-03-10T05:37:51.462127Z"}, {"uuid": "f73a047b-9849-44dc-b922-238930bca982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27517", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3ljz32azeus2i", "content": "", "creation_timestamp": "2025-03-10T07:52:24.218238Z"}, {"uuid": "070c5b35-1152-49ee-b39e-3b7b22ef4753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27517", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3ljz7chipv22w", "content": "", "creation_timestamp": "2025-03-10T09:08:31.949801Z"}, {"uuid": "06213fd0-dd1a-4153-99dd-5e6958669ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27517", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljts5jd2s22i", "content": "", "creation_timestamp": "2025-03-08T05:29:49.690689Z"}, {"uuid": "59639923-5027-4c95-88a3-c2eddc2c1665", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27517", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "92b36c50-a50b-440c-ae35-0a7dfa3adbf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27517", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:33.000000Z"}]}