{"vulnerability": "cve-2025-3824", "sightings": [{"uuid": "2625046a-f74a-4ddc-a7a4-f02aa02fe5f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38248", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "46b931fc-b0e3-4f0a-a56e-f4a4cd6d4f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38248", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0396/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "280c1353-e54a-41ff-b483-437b36d24deb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38248", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/ubuntu-linux-kernel-multiple-vulnerabilities_20260408", "content": "", "creation_timestamp": "2026-04-07T18:00:00.000000Z"}, {"uuid": "bf06b853-f2cc-454f-a837-6c762b59c347", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38240", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12403", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-38240\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: dp: drm_err =&gt; dev_err in HPD path to avoid NULL ptr\n\nThe function mtk_dp_wait_hpd_asserted() may be called before the\n`mtk_dp-&gt;drm_dev` pointer is assigned in mtk_dp_bridge_attach().\nSpecifically it can be called via this callpath:\n - mtk_edp_wait_hpd_asserted\n - [panel probe]\n - dp_aux_ep_probe\n\nUsing \"drm\" level prints anywhere in this callpath causes a NULL\npointer dereference. Change the error message directly in\nmtk_dp_wait_hpd_asserted() to dev_err() to avoid this. Also change the\nerror messages in mtk_dp_parse_capabilities(), which is called by\nmtk_dp_wait_hpd_asserted().\n\nWhile touching these prints, also add the error code to them to make\nfuture debugging easier.\n\ud83d\udccf Published: 2025-04-18T07:01:32.338Z\n\ud83d\udccf Modified: 2025-04-18T07:01:32.338Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/13ec849fd2eab808ee8eba2625df7ebea3b85edf\n2. https://git.kernel.org/stable/c/57a9fb47551b33cde7b76d17c0072c3b394f4620\n3. https://git.kernel.org/stable/c/2fda391ef7a701748abd7fa32232981b522c1e07\n4. https://git.kernel.org/stable/c/149a5c38436c229950cf1020992ce65c9549bc19\n5. https://git.kernel.org/stable/c/106a6de46cf4887d535018185ec528ce822d6d84", "creation_timestamp": "2025-04-18T07:59:16.000000Z"}, {"uuid": "9c180304-f3a6-4bac-a45e-8514763cf94c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3824", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12613", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3824\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as problematic was found in SourceCodester Web-based Pharmacy Product Management System 1.0. Affected by this vulnerability is an unknown functionality of the file add-product.php. The manipulation of the argument txtprice/txtproduct_name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-20T11:00:09.140Z\n\ud83d\udccf Modified: 2025-04-20T11:00:09.140Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.305731\n2. https://vuldb.com/?ctiid.305731\n3. https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/xss_from_input_with_post.md\n4. https://www.sourcecodester.com/", "creation_timestamp": "2025-04-20T12:01:15.000000Z"}, {"uuid": "a657baa9-573d-4915-b9bb-73a8360bb051", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3824", "type": "seen", "source": "https://t.me/cvedetector/23411", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3824 - SourceCodester Web-based Pharmacy Product Management System Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3824 \nPublished : April 20, 2025, 11:15 a.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : A vulnerability classified as problematic was found in SourceCodester Web-based Pharmacy Product Management System 1.0. Affected by this vulnerability is an unknown functionality of the file add-product.php. The manipulation of the argument txtprice/txtproduct_name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-20T15:23:33.000000Z"}, {"uuid": "1033e77c-6dce-4be9-997d-9f91cb9dafc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38246", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3ltjnyvpawd23", "content": "", "creation_timestamp": "2025-07-09T11:00:56.996661Z"}, {"uuid": "f160735b-db72-43e5-8c7c-aebb3c43ce4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38247", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltk23uaqqi2w", "content": "", "creation_timestamp": "2025-07-09T14:37:20.678579Z"}, {"uuid": "4dc24015-2156-413c-b619-1275d7419a1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38244", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "30710dd2-3886-4a9a-ac22-8a6bae74cbff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-38248", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mi2fvy5bw326", "content": "", "creation_timestamp": "2026-03-27T15:15:16.925118Z"}, {"uuid": "b70a7e7b-47cd-49c9-9fe7-78691612cb5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-38248", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3miltukybcz26", "content": "", "creation_timestamp": "2026-04-03T13:40:17.745764Z"}, {"uuid": "e8497e3d-3d77-44e9-9ec6-331f06e2a2be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38248", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0397/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "73af0a42-407e-4e79-bff3-5fa0113f59fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38246", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ltjnywgzguu2", "content": "", "creation_timestamp": "2025-07-09T11:03:50.390746Z"}, {"uuid": "672dd6ea-3d0a-4f47-9f9b-6524018cb0ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38249", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltjyyhaenx2e", "content": "", "creation_timestamp": "2025-07-09T14:17:32.503319Z"}, {"uuid": "71966468-38df-4b57-821a-0984f1132053", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38246", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltjz4c6stk2t", "content": "", "creation_timestamp": "2025-07-09T14:19:41.459809Z"}, {"uuid": "8d64dc2a-40b2-4c37-8398-f4a24c14e6fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38248", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltjzjse24d2o", "content": "", "creation_timestamp": "2025-07-09T14:27:14.607708Z"}, {"uuid": "580fc7ce-1c05-442b-915c-b6c07e652df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3824", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lnalvhxj63o2", "content": "", "creation_timestamp": "2025-04-20T11:58:17.797774Z"}, {"uuid": "01573e61-0d5c-4ae9-b457-4b438e7a33e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3824", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnaviccjze2r", "content": "", "creation_timestamp": "2025-04-20T14:49:42.307539Z"}]}