{"vulnerability": "cve-2025-4122", "sightings": [{"uuid": "edf77e24-f84a-4990-9179-476e92875c5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41226", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17008", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41226\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: VMware\u00a0ESXi contains a denial-of-service vulnerability that occurs when performing a guest operation.\u00a0A malicious actor with guest operation privileges on a VM, who is already authenticated through vCenter Server or ESXi may trigger this issue to create a denial-of-service condition of guest VMs with VMware Tools running and guest operations enabled.\n\ud83d\udccf Published: 2025-05-20T14:24:24.680Z\n\ud83d\udccf Modified: 2025-05-20T16:05:04.910Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717", "creation_timestamp": "2025-05-20T16:40:55.000000Z"}, {"uuid": "b8d2bdf3-60db-42e1-9eb3-a826680e6bba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41228", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19317", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41228\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: VMware ESXi and vCenter Server contain a reflected cross-site scripting vulnerability due to improper input validation.\u00a0A malicious actor with network access to the login page of certain ESXi host or vCenter Server URL paths may exploit this issue to steal cookies or redirect to malicious websites.\n\ud83d\udccf Published: 2025-05-20T14:24:34.436Z\n\ud83d\udccf Modified: 2025-06-24T07:14:21.027Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717", "creation_timestamp": "2025-06-24T07:50:00.000000Z"}, {"uuid": "8d0a9c8a-1042-4779-b7e7-c344343a1b5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41225", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/1166", "content": "\u06a9\u0634\u0641  \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a \u0645\u062c\u0627\u0632\u06cc VMware vCenter Server \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0639\u062f\u0645 \u0627\u0646\u062c\u0627\u0645 \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u0644\u0627\u0632\u0645 \u0628\u0631\u0627\u06cc \u062e\u0646\u062b\u06cc\u200c\u0633\u0627\u0632\u06cc \u0639\u0646\u0627\u0635\u0631 \u0648\u06cc\u0698\u0647 \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u062f\u0631 \u0641\u0631\u0645\u0627\u0646 \u0633\u06cc\u0633\u062a\u0645\u200c\u0639\u0627\u0645\u0644 \n\n \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u062f\u0633\u062a\u0648\u0631\u0627\u062a \u062f\u0644\u062e\u0648\u0627\u0647 \u062e\u0648\u062f \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\nCVE-2025-41225\n\n\u0646\u0635\u0628 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0645\u0639\u062a\u0628\u0631  \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u0634\u0648\u0646\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 \u0648 \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc \u0627\u0632 \u0646\u0641\u0648\u0630 \u0628\u0631\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 (\u0634\u0646\u0627\u0633\u0627\u06cc\u06cc\u060c \u062b\u0628\u062a) \u0648 \u067e\u0627\u0633\u062e \u0628\u0647 \u062a\u0644\u0627\u0634\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc SIEM \u0628\u0631\u0627\u06cc \u0631\u062f\u06cc\u0627\u0628\u06cc \u062a\u0644\u0627\u0634\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u061b\n- \u0628\u0647 \u062d\u062f\u0627\u0642\u0644 \u0631\u0633\u0627\u0646\u062f\u0646 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u06a9\u0627\u0631\u0628\u0631\u061b\n- \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646/\u062d\u0630\u0641 \u062d\u0633\u0627\u0628\u200c\u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u06cc \u0628\u0644\u0627\u0627\u0633\u062a\u0641\u0627\u062f\u0647.\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647\u200c\u0647\u0627:\nhttps://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ICSCERT_IR", "creation_timestamp": "2025-05-23T17:36:52.000000Z"}, {"uuid": "dfb86149-d760-4cc2-8121-3fd36f431d01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41229", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpmd3zhrlt2j", "content": "", "creation_timestamp": "2025-05-20T14:43:05.838804Z"}, {"uuid": "cd6d20cb-8ad9-4e68-8f4c-aa6243956336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41225", "type": "seen", "source": "https://bsky.app/profile/andersonc0d3.bsky.social/post/3lpmdfkawoc2w", "content": "", "creation_timestamp": "2025-05-20T14:48:22.825154Z"}, {"uuid": "35f1557f-c4f2-45b8-a4fc-2ae02233242a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41226", "type": "seen", "source": "https://bsky.app/profile/andersonc0d3.bsky.social/post/3lpmdfkawoc2w", "content": "", "creation_timestamp": "2025-05-20T14:48:22.893018Z"}, {"uuid": "7f5a5813-3012-472d-8863-20d491bb25ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41227", "type": "seen", "source": "https://bsky.app/profile/andersonc0d3.bsky.social/post/3lpmdfkawoc2w", "content": "", "creation_timestamp": "2025-05-20T14:48:22.960809Z"}, {"uuid": "e0c321db-05cb-4e15-b8df-52292dba3b30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41228", "type": "seen", "source": "https://bsky.app/profile/andersonc0d3.bsky.social/post/3lpmdfkawoc2w", "content": "", "creation_timestamp": "2025-05-20T14:48:23.026825Z"}, {"uuid": "c0fea5b8-8488-452e-a0d1-838426ca46dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41225", "type": "seen", "source": "https://infosec.exchange/users/andersonc0d3/statuses/114540708203094327", "content": "", "creation_timestamp": "2025-05-20T14:48:25.882727Z"}, {"uuid": "70e74ea0-e0b7-4bf0-a3a3-202a7d4e7429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41228", "type": "seen", "source": "https://infosec.exchange/users/andersonc0d3/statuses/114540708203094327", "content": "", "creation_timestamp": "2025-05-20T14:48:26.138032Z"}, {"uuid": "e26b25e9-17ff-4dff-bb8e-5b982acc35a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41226", "type": "seen", "source": "https://infosec.exchange/users/andersonc0d3/statuses/114540708203094327", "content": "", "creation_timestamp": "2025-05-20T14:48:25.970902Z"}, {"uuid": "a2789af9-71b2-42d6-93f4-edc31d5cc4c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41227", "type": "seen", "source": "https://infosec.exchange/users/andersonc0d3/statuses/114540708203094327", "content": "", "creation_timestamp": "2025-05-20T14:48:26.054277Z"}, {"uuid": "9618553b-3ee9-453f-b114-b908b6d27469", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41229", "type": "seen", "source": "https://vulnerability.circl.lu/comment/da6e2e7d-cb96-4560-bf1a-27df4962776e", "content": "", "creation_timestamp": "2025-05-22T07:24:41.759993Z"}, {"uuid": "80ebc00f-0733-42ba-97fd-b6e12d3ef07c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41225", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114540730122481922", "content": "", "creation_timestamp": "2025-05-20T14:54:00.680793Z"}, {"uuid": "bc24ce60-abcd-453f-9b27-e43c3ad50cba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41226", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114540730122481922", "content": "", "creation_timestamp": "2025-05-20T14:54:00.774646Z"}, {"uuid": "81a29838-740e-40af-a609-d35f7fad75b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41227", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114540730122481922", "content": "", "creation_timestamp": "2025-05-20T14:54:00.861221Z"}, {"uuid": "cbf48884-4d08-4bf1-a383-625eba23b7bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41228", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114540730122481922", "content": "", "creation_timestamp": "2025-05-20T14:54:00.945648Z"}, {"uuid": "a75dddfc-4be9-47e4-befe-40b86677c297", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41229", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpmdtiixkds2", "content": "", "creation_timestamp": "2025-05-20T14:58:39.211890Z"}, {"uuid": "cdfcaa12-082e-476b-81e1-83f6fa64b11b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4122", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2eswgzxk2k", "content": "", "creation_timestamp": "2025-04-30T18:00:39.051398Z"}, {"uuid": "af899ba8-869a-4bbe-a978-24d0f48f5d79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41225", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpnmspx7c224", "content": "", "creation_timestamp": "2025-05-21T03:09:28.705158Z"}, {"uuid": "8e23169d-ce87-443a-81a3-a9b441c60eb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41228", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpnmspx7c224", "content": "", "creation_timestamp": "2025-05-21T03:09:28.810540Z"}, {"uuid": "90b120c2-5567-4ab9-858b-7e4873ce56de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41222", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-294-04", "content": "", "creation_timestamp": "2025-10-21T10:00:00.000000Z"}, {"uuid": "99785ec9-47ee-4ed6-8dfc-377672de2ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41223", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-294-04", "content": "", "creation_timestamp": "2025-10-21T10:00:00.000000Z"}, {"uuid": "54b7945c-411f-42b2-942d-49d8b423dc81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41224", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-294-04", "content": "", "creation_timestamp": "2025-10-21T10:00:00.000000Z"}, {"uuid": "58f3a703-bfb2-4010-bf6b-d9e889c219df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4122", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14059", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4122\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. It has been rated as critical. Affected by this issue is the function sub_435E04. The manipulation of the argument host leads to command injection. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-04-30T14:31:03.996Z\n\ud83d\udccf Modified: 2025-04-30T15:03:09.629Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.306602\n2. https://vuldb.com/?ctiid.306602\n3. https://vuldb.com/?submit.560776\n4. https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_JWNR2000v2/Command_injection-sub_435E04-auth_mac/README.md\n5. https://www.netgear.com/", "creation_timestamp": "2025-04-30T15:13:43.000000Z"}, {"uuid": "20441a39-7064-4a82-8304-2e2574dd5214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41229", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16968", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41229\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N)\n\ud83d\udd39 Description: VMware Cloud Foundation\u00a0contains a directory traversal vulnerability.\u00a0A malicious actor with network access to port 443 on VMware Cloud Foundation may exploit this issue to access certain internal services.\n\ud83d\udccf Published: 2025-05-20T12:53:57.430Z\n\ud83d\udccf Modified: 2025-05-20T13:23:40.848Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25733", "creation_timestamp": "2025-05-20T13:40:18.000000Z"}, {"uuid": "8fb9755a-2304-43e4-8fc7-c1b4198c0457", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41227", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19318", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41227\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: VMware ESXi,\u00a0Workstation, and Fusion contain a denial-of-service vulnerability due to certain guest options.\u00a0A malicious actor with non-administrative privileges within a guest operating system may be able to exploit this issue by exhausting memory of the host process leading to a denial-of-service condition.\n\ud83d\udccf Published: 2025-05-20T14:24:29.316Z\n\ud83d\udccf Modified: 2025-06-24T07:13:30.222Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717", "creation_timestamp": "2025-06-24T07:50:01.000000Z"}, {"uuid": "ae1a58a8-bd02-4300-bbd6-63b09bc9cfa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41225", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19319", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41225\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: The vCenter Server contains an authenticated command-execution vulnerability.\u00a0A malicious actor with privileges to create or modify alarms and run script action may exploit this issue to run arbitrary commands on the vCenter Server.\n\ud83d\udccf Published: 2025-05-20T14:24:17.487Z\n\ud83d\udccf Modified: 2025-06-24T07:11:20.683Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717", "creation_timestamp": "2025-06-24T07:50:02.000000Z"}, {"uuid": "4b1a47ff-3b25-4d67-856e-1c93c66f0990", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4122", "type": "seen", "source": "https://t.me/cvedetector/24109", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4122 - Netgear JWNR2000 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4122 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. It has been rated as critical. Affected by this issue is the function sub_435E04. The manipulation of the argument host leads to command injection. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:08.000000Z"}, {"uuid": "5409b4e9-f82f-4799-bc0f-10591a456406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41225", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lppwi7kqgd2a", "content": "", "creation_timestamp": "2025-05-22T01:07:52.897601Z"}, {"uuid": "9d637af1-9994-4bca-a600-a033a38f92ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41229", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114540488102560446", "content": "", "creation_timestamp": "2025-05-20T13:52:27.653464Z"}, {"uuid": "92c12d80-1d0d-4194-a340-3f045bb8c931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41222", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lthfz5udbp2s", "content": "", "creation_timestamp": "2025-07-08T13:32:35.818754Z"}, {"uuid": "5ddebe34-2e5b-4e4c-b3a0-51547ba0d8f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41228", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwa7hpxnv72a", "content": "", "creation_timestamp": "2025-08-12T21:02:31.674052Z"}]}