{"vulnerability": "cve-2025-2158", "sightings": [{"uuid": "a28ed251-2bc9-46bc-b118-58b984299308", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-21589", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3ligbejdupk2n", "content": "", "creation_timestamp": "2025-02-18T02:59:40.713590Z"}, {"uuid": "1cfaf327-880c-42ee-9a9b-8a673ac47fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lkvgfqdeou2k", "content": "", "creation_timestamp": "2025-03-21T14:30:10.948121Z"}, {"uuid": "41cb0bc9-75b1-41af-a403-62c5cf4b214e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljiqilejhk2o", "content": "", "creation_timestamp": "2025-03-03T20:00:57.411795Z"}, {"uuid": "73e249f8-364a-4e48-bd0d-1299850d900d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lige7clrek2l", "content": "", "creation_timestamp": "2025-02-18T03:50:30.978652Z"}, {"uuid": "3af6b14d-c379-4100-ab3a-20e471ea0270", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3lijncalqps27", "content": "", "creation_timestamp": "2025-02-19T11:11:09.887022Z"}, {"uuid": "0179c78c-fe0e-4017-a7fe-8be7c3eef7f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/xc0py.bsky.social/post/3limaitt26s2i", "content": "", "creation_timestamp": "2025-02-20T12:00:10.998378Z"}, {"uuid": "25be1026-431e-4087-ad01-264f2ff4583a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lijojfaqtz2p", "content": "", "creation_timestamp": "2025-02-19T11:33:02.363693Z"}, {"uuid": "be0e1a0a-578b-4e96-96d2-d83c020d6c38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3likkrsxc4c2s", "content": "", "creation_timestamp": "2025-02-19T19:58:53.914736Z"}, {"uuid": "f251324f-b576-4294-8f7e-79a8ccd6a646", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lihdjr5sy62i", "content": "", "creation_timestamp": "2025-02-18T13:11:03.766369Z"}, {"uuid": "502a0634-b7a4-49f5-8132-9824e65047b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3lihdudwqqk2x", "content": "", "creation_timestamp": "2025-02-18T13:17:00.692689Z"}, {"uuid": "9d9fdc62-744e-41e8-be1a-8cd240a94794", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://thehackernews.com/2025/02/juniper-session-smart-routers.html", "content": "", "creation_timestamp": "2025-02-18T11:18:00.000000Z"}, {"uuid": "7c68ebde-422e-415f-bd63-d413ba63f28f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3likp3mrzgw23", "content": "", "creation_timestamp": "2025-02-19T21:15:54.109727Z"}, {"uuid": "75d1a0ba-b56a-4b21-b621-76ee39bf611c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/ehcgroup.bsky.social/post/3liidtx3ed22z", "content": "", "creation_timestamp": "2025-02-18T22:49:27.212661Z"}, {"uuid": "e6e0a414-db23-4adf-bfad-d3ac3d0c9c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3likz77s7es2n", "content": "", "creation_timestamp": "2025-02-20T00:16:51.974232Z"}, {"uuid": "89ba783a-2dc9-42be-b8e8-ee8343d88c09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lir6fxco7422", "content": "", "creation_timestamp": "2025-02-22T11:06:06.949984Z"}, {"uuid": "69c6410b-325d-4525-b4b0-2109cac47562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3liizr6g3ml2x", "content": "", "creation_timestamp": "2025-02-19T05:21:34.849406Z"}, {"uuid": "379d0bf7-67d0-4b2d-888b-5c01cffd652e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/lemagit.bsky.social/post/3lij4yayamp2o", "content": "", "creation_timestamp": "2025-02-19T06:19:13.462848Z"}, {"uuid": "3aad1d99-2f55-4681-8fc0-1132a62e05e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://supportportal.juniper.net/s/article/2025-02-Out-of-Cycle-Security-Bulletin-Session-Smart-Router-Session-Smart-Conductor-WAN-Assurance-Router-API-Authentication-Bypass-Vulnerability-CVE-2025-21589", "content": "", "creation_timestamp": "2025-02-11T06:56:18.515000Z"}, {"uuid": "7a7e3692-8709-4422-8b3b-c3bfb5f4a766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2158", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3losppn2mv2w2", "content": "", "creation_timestamp": "2025-05-10T10:19:37.245330Z"}, {"uuid": "7001019d-1f6b-42b1-94ec-45e179bcda51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21587", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrquo53mdc2e", "content": "", "creation_timestamp": "2025-06-16T20:58:27.343674Z"}, {"uuid": "13c21e2d-fcf1-4608-8945-71f46b2226c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2158", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3losqfxqfin2t", "content": "", "creation_timestamp": "2025-05-10T10:32:02.147969Z"}, {"uuid": "d2db393a-0a89-4535-94f7-44c223b532ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21587", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lotiff2hm22y", "content": "", "creation_timestamp": "2025-05-10T17:41:14.069381Z"}, {"uuid": "47a7b649-dc3e-49d8-96bb-61dcd6c424c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21587", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3loufha4sjx23", "content": "", "creation_timestamp": "2025-05-11T02:21:12.948922Z"}, {"uuid": "dab23ec0-b8fe-4e61-858c-cef9bb86f6bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21587", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lq34qilwf22c", "content": "", "creation_timestamp": "2025-05-26T11:59:09.911474Z"}, {"uuid": "389993f2-50cc-4f66-8685-39c727d62687", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mdgpldwnjd2g", "content": "", "creation_timestamp": "2026-01-27T21:34:16.388280Z"}, {"uuid": "b60df59e-183a-4677-b8c9-37b37ea3b258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "3beb6bec-f794-4baf-a23a-299f3dd4f86d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mdgqlhi4jg2v", "content": "", "creation_timestamp": "2026-01-27T21:52:14.015251Z"}, {"uuid": "95706391-c0a0-45f3-87ca-f6fb2359ff82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21585", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12142", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21585\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and  9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2025-04-15T20:30:57.314Z\n\ud83d\udccf Modified: 2025-04-16T19:47:52.191Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-16T19:56:27.000000Z"}, {"uuid": "cb874250-ba4b-4705-afc0-a1f1f41154b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21588", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12553", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21588\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.4.0-8.4.4 and  9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2025-04-15T20:30:58.391Z\n\ud83d\udccf Modified: 2025-04-19T00:11:09.849Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-19T00:59:43.000000Z"}, {"uuid": "703feb11-8120-43c7-a370-3502ba8e71a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115973661066458123", "content": "", "creation_timestamp": "2026-01-28T16:27:11.451850Z"}, {"uuid": "0c397637-336c-4301-8ddb-62e3f2e2a69f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21586", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12087", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21586\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC).  Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).\n\ud83d\udccf Published: 2025-04-15T20:30:57.664Z\n\ud83d\udccf Modified: 2025-04-16T15:45:35.054Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-16T15:56:18.000000Z"}, {"uuid": "41d779f5-23ab-4988-a076-52e7d87e265d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21584", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12141", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21584\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and  9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2025-04-15T20:30:56.964Z\n\ud83d\udccf Modified: 2025-04-16T19:48:24.046Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-16T19:56:26.000000Z"}, {"uuid": "6aaf1e18-8555-4491-bf0d-d8e46b1127f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21587", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12182", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21587\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE).  Supported versions that are affected are Oracle Java SE:8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK:17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition:20.3.17 and  21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).\n\ud83d\udccf Published: 2025-04-15T20:30:58.033Z\n\ud83d\udccf Modified: 2025-04-17T03:55:40.045Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-17T04:57:22.000000Z"}, {"uuid": "1ea0ea65-b07c-43ac-b489-982c0f51ed9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://t.me/CyberBulletin/2354", "content": "\u26a1CVE-2025-21589 (CVSS 9.8): Critical Authentication Bypass Flaw in Juniper Session Smart Routers.\n\n#CyberBulletin", "creation_timestamp": "2025-02-20T04:40:29.000000Z"}, {"uuid": "0abdc440-4063-4d13-8b7f-d4cb46cff1e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2158", "type": "seen", "source": "https://t.me/cvedetector/25005", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2158 - WordPress Review Plugin Local File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2158 \nPublished : May 10, 2025, 10:15 a.m. | 24\u00a0minutes ago \nDescription : The WordPress Review Plugin: The Ultimate Solution for Building a Review Website plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 5.3.5 via the Post custom fields. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP file types can be uploaded and included, or pearcmd is enabled on a server with register_argc_argv also enabled. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-10T13:06:46.000000Z"}, {"uuid": "479992fa-72c6-43c2-aa5f-d498b0e6e47b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21583", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12333", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21583\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.4.0 and  9.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2025-04-15T20:30:56.632Z\n\ud83d\udccf Modified: 2025-04-17T19:41:17.601Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-17T19:58:09.000000Z"}, {"uuid": "0047a465-0b19-407b-9602-29c80c0a8143", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2158", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15888", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2158\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The WordPress Review Plugin: The Ultimate Solution for Building a Review Website plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 5.3.5 via the Post custom fields. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP file types can be uploaded and included, or pearcmd is enabled on a server with register_argc_argv also enabled.\n\ud83d\udccf Published: 2025-05-10T09:23:00.814Z\n\ud83d\udccf Modified: 2025-05-10T09:23:00.814Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/a058e6bf-109f-4985-8aad-08858553c4c3?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-review/tags/5.3.5/includes/shortcodes.php\n3. https://plugins.trac.wordpress.org/browser/wp-review/tags/5.3.5/includes/functions.php", "creation_timestamp": "2025-05-10T10:26:21.000000Z"}, {"uuid": "5593d725-f3ef-4fc5-a6ff-f55d6c442cc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://t.me/true_secator/6756", "content": "Juniper \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e\u0431 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 Session Smart Router (SSR), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e\u043c.\n\nCVE-2025-21589 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u0445\u043e\u0434\u0435 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430 \u0438 \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u044b Session Smart Conductor \u0438 WAN Assurance Managed Routers.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c SIRT Juniper, \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u043e\u043a\u0430 \u043d\u0435 \u043d\u0430\u0448\u043b\u0430 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432 SSR-5.6.17, SSR-6.1.12-lts, SSR-6.2.8-lts, SSR-6.3.3-r2 \u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u0445.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0443 \u0430\u0442\u0430\u043a \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Juniper, \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0447\u0430\u0441\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0435 \u0432 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0430\u0445 (\u0432 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u044d\u0442\u043e \u0441\u043b\u0443\u0447\u0430\u043b\u043e\u0441\u044c \u043c\u0435\u043d\u0435\u0435 \u0447\u0435\u043c \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0434\u0435\u043b\u044e \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u043f\u0443\u0441\u043a\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439) \u043a \u0432\u043e\u043f\u0440\u043e\u0441\u0443 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0442\u043d\u0435\u0441\u0442\u0438\u0441\u044c \u0441 \u0434\u043e\u043b\u0436\u043d\u044b\u043c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435\u043c.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430, \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u0435 \u043a Mist Cloud, \u0443\u0436\u0435 \u0431\u044b\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b, \u043d\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0432\u0441\u0435 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0434\u043e \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u041f\u041e.\n\n\u0412 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u0438 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Conductor \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0442\u043e\u043b\u044c\u043a\u043e \u0443\u0437\u043b\u044b Conductor, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0443\u0434\u0435\u0442 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u043e \u043a\u043e \u0432\u0441\u0435\u043c \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u043c. \u041d\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0435 \u0438\u0445 \u0432\u0441\u0435 \u0440\u0430\u0432\u043d\u043e \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c.", "creation_timestamp": "2025-02-19T13:14:25.000000Z"}, {"uuid": "9f063dc3-1105-47d6-ba92-d889f9d67a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://t.me/ton618cyber/2499", "content": "Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication\n\nJuniper Networks patched CVE-2025-21589 (CVSS 9.8), a critical router flaw allowing remote takeovers.\n\nThe Hacker News | thehackernews.com \u2022 Feb 18, 2025", "creation_timestamp": "2025-02-20T05:24:29.000000Z"}, {"uuid": "69ed30aa-6e31-4bd0-b514-fd213644c18e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "seen", "source": "https://t.me/ton618cyber/6745", "content": "Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication\n\nJuniper Networks patched CVE-2025-21589 (CVSS 9.8), a critical router flaw allowing remote takeovers.\n\nThe Hacker News | thehackernews.com \u2022 Feb 18, 2025", "creation_timestamp": "2025-02-20T05:24:28.000000Z"}, {"uuid": "9d50924b-49ec-4169-adf3-667037c68b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21589", "type": "published-proof-of-concept", "source": "Telegram/PgMvzEGNYhnSKqbGC0dlUy3XvK276jbViUF97uA_TOCKzg", "content": "", "creation_timestamp": "2025-02-18T16:18:55.000000Z"}]}