{"vulnerability": "cve-2025-4063", "sightings": [{"uuid": "7af10117-ebc7-4c2b-b6b8-93dcf88dd569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40631", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpc3nxjvxy2o", "content": "", "creation_timestamp": "2025-05-16T13:03:18.325250Z"}, {"uuid": "eb40e4e1-5b29-499b-ae14-e3b53381202e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40630", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpc3nxqnfq2h", "content": "", "creation_timestamp": "2025-05-16T13:03:19.476346Z"}, {"uuid": "82495a1d-6354-4d22-bc77-dbda07c6fb1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40632", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpc3nxxg5d22", "content": "", "creation_timestamp": "2025-05-16T13:03:20.054314Z"}, {"uuid": "dfabe21e-d8c3-406e-935c-1a51f0db452b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40634", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114540507625728849", "content": "", "creation_timestamp": "2025-05-20T13:57:25.643303Z"}, {"uuid": "8df403ad-3049-4580-b0ad-fade7c6907ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4063", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnxn33aab22a", "content": "", "creation_timestamp": "2025-04-29T15:50:28.375146Z"}, {"uuid": "70f5e037-b988-4ca9-be50-89b3697e237a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40634", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114540508710694681", "content": "", "creation_timestamp": "2025-05-20T13:57:42.010657Z"}, {"uuid": "0104ee83-f406-4c4c-b28a-af279a138117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40635", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpme74kp4vy2", "content": "", "creation_timestamp": "2025-05-20T15:06:05.473742Z"}, {"uuid": "b8480902-31f6-4846-9bb3-98abf51d9ded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40634", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lroeg4lzbd22", "content": "", "creation_timestamp": "2025-06-15T21:02:22.374942Z"}, {"uuid": "21f1fd91-8ae2-4965-8f9b-90372347bcde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40634", "type": "seen", "source": "https://bsky.app/profile/hacefresko.com/post/3lpohxk6pl22j", "content": "", "creation_timestamp": "2025-05-21T11:15:22.863065Z"}, {"uuid": "0ba72093-1b44-473b-aace-71849f246913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40630", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-40630.yaml", "content": "", "creation_timestamp": "2025-07-23T08:13:32.000000Z"}, {"uuid": "bb8c5d9c-9c01-4c97-be23-edcf4e6afbc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40631", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16672", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40631\n\ud83d\udd25 CVSS Score: 2 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: HTTP host header injection vulnerability in Icewarp Mail Server affecting version 11.4.0. By modifying the Host header and adding a payload, arbitrary JavaScript code can be executed on page load. The user must interact with a malicious link to be redirected.\n\ud83d\udccf Published: 2025-05-16T11:09:17.351Z\n\ud83d\udccf Modified: 2025-05-16T11:09:17.351Z\n\ud83d\udd17 References:\n1. https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-icewarp-mail-server", "creation_timestamp": "2025-05-16T11:34:52.000000Z"}, {"uuid": "d29e66c3-a3f1-4c4d-a550-4777b7077771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40630", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16673", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40630\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N)\n\ud83d\udd39 Description: Open redirection vulnerability in IceWarp Mail Server affecting version 11.4.0. This vulnerability allows an attacker to redirect a user to any domain by sending a malicious URL to the victim, for example \u201c https://icewarp.domain.com///%2e%2e\u201d https://icewarp.domain.com///%2e%2e\u201d . This vulnerability has been tested in Firefox.\n\ud83d\udccf Published: 2025-05-16T11:08:18.538Z\n\ud83d\udccf Modified: 2025-05-16T11:08:18.538Z\n\ud83d\udd17 References:\n1. https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-icewarp-mail-server", "creation_timestamp": "2025-05-16T11:34:53.000000Z"}, {"uuid": "67f8bf8c-bd52-4b8f-9a43-891dd55a7bd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40635", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16977", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40635\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: SQL injection vulnerability in Comerzzia Backoffice: Sales Orchestrator 3.0.15. This vulnerability allows an attacker to retrieve, create, update and delete databases via the \u2018uidActivity\u2019, \u2018codCompany\u2019 and \u2018uidInstance\u2019 parameters of the \u2018/comerzzia/login\u2019 endpoint.\n\ud83d\udccf Published: 2025-05-20T12:51:57.761Z\n\ud83d\udccf Modified: 2025-05-20T12:51:57.761Z\n\ud83d\udd17 References:\n1. https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-comerzzia", "creation_timestamp": "2025-05-20T13:40:34.000000Z"}, {"uuid": "74e9571a-53b0-4a01-9cb2-b404b923d3b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40630", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3luqgm5lhwr2d", "content": "", "creation_timestamp": "2025-07-24T21:02:26.392874Z"}, {"uuid": "aa647909-b4f7-4c32-9124-10a2b7022862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40632", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16671", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40632\n\ud83d\udd25 CVSS Score: 2 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: Cross-site scripting (XSS) in Icewarp Mail Server affecting version 11.4.0. This vulnerability allows an attacker to modify the \u201clastLogin\u201d cookie with malicious JavaScript code that will be executed when the page is rendered.\n\ud83d\udccf Published: 2025-05-16T11:09:59.590Z\n\ud83d\udccf Modified: 2025-05-16T11:09:59.590Z\n\ud83d\udd17 References:\n1. https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-icewarp-mail-server", "creation_timestamp": "2025-05-16T11:34:51.000000Z"}, {"uuid": "8306e09a-1be1-46f1-8077-ca43db988a7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40633", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16964", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40633\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: A Stored Cross-Site Scripting (XSS) vulnerability has been found in \nKoibox for versions prior to e8cbce2. This vulnerability allows an \nauthenticated attacker to upload an image containing malicious \nJavaScript code as profile picture in the \n'/es/dashboard/clientes/ficha/' endpoint\n\ud83d\udccf Published: 2025-05-20T10:17:00.222Z\n\ud83d\udccf Modified: 2025-05-20T10:17:00.222Z\n\ud83d\udd17 References:\n1. https://www.incibe.es/en/incibe-cert/notices/aviso/stored-cross-site-scripting-xss-koibox", "creation_timestamp": "2025-05-20T10:40:15.000000Z"}, {"uuid": "e4a10299-97b1-4da6-aaad-0e8310b891ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40634", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16965", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40634\n\ud83d\udd25 CVSS Score: 9.2 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Stack-based buffer overflow vulnerability in the 'conn-indicator' binary running as root on the TP-Link Archer AX50 router, in firmware versions prior to 1.0.15 build 241203 rel61480. This vulnerability allows an attacker to execute arbitrary code on the device over LAN and WAN networks.\n\ud83d\udccf Published: 2025-05-20T10:12:16.550Z\n\ud83d\udccf Modified: 2025-05-20T10:12:16.550Z\n\ud83d\udd17 References:\n1. https://www.incibe.es/en/incibe-cert/notices/aviso/stack-based-buffer-overflow-tp-link-archer-ax50", "creation_timestamp": "2025-05-20T10:40:16.000000Z"}, {"uuid": "fc35a371-f982-46ee-a91e-96c6e46d7024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4063", "type": "seen", "source": "https://t.me/cvedetector/24004", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4063 - Code-projects Student Information Management System Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-4063 \nPublished : April 29, 2025, 2:15 p.m. | 21\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Student Information Management System 1.0 and classified as critical. Affected by this issue is the function cancel. The manipulation of the argument first_name/last_name leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-29T16:49:49.000000Z"}]}