{"vulnerability": "cve-2025-4069", "sightings": [{"uuid": "b02aefc5-c646-4113-9955-9e400bf54bca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-40692", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lymblo7exr2q", "content": "", "creation_timestamp": "2025-09-12T03:02:46.180317Z"}, {"uuid": "852af87d-a153-4a87-99a7-8bfc4a14250d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4069", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lny2ikrv3a22", "content": "", "creation_timestamp": "2025-04-29T19:50:37.507518Z"}, {"uuid": "68df76bc-e7c3-487a-b3ea-9fccb82b13aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-40692", "type": "seen", "source": "https://gist.github.com/Darkcrai86/b599ce139a5d38499377e6877896d32b", "content": "", "creation_timestamp": "2025-09-11T12:35:06.000000Z"}, {"uuid": "694bfea4-f890-4adc-9c74-ff9213784c90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-40690", "type": "seen", "source": "https://gist.github.com/Darkcrai86/f49e5ffff1c3ff0e98479219d5f2e1b6", "content": "", "creation_timestamp": "2025-09-11T12:35:42.000000Z"}, {"uuid": "0af76b92-2f21-4028-b95f-726780bf7156", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-40691", "type": "seen", "source": "https://gist.github.com/Darkcrai86/e133c6ab76b110887bcaf1640e15b183", "content": "", "creation_timestamp": "2025-09-11T12:35:22.000000Z"}, {"uuid": "457ca0c6-4a43-4e20-a5a7-a42244f9c93b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-40692", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lykuk5udol2c", "content": "", "creation_timestamp": "2025-09-11T13:36:35.875233Z"}, {"uuid": "4daef172-1fed-4ca9-a3db-7c9164bced35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-40690", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lykuquscd22i", "content": "", "creation_timestamp": "2025-09-11T13:40:21.225435Z"}, {"uuid": "9b28c6c1-724d-4382-80e4-3f9465f852cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-40695", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lykuyker2z2c", "content": "", "creation_timestamp": "2025-09-11T13:44:38.717497Z"}, {"uuid": "73175a1d-325e-41af-9d5f-465b366ba445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-40696", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lykvkh7nzd2c", "content": "", "creation_timestamp": "2025-09-11T13:54:39.770949Z"}, {"uuid": "6ed88b75-f191-467c-a0c1-82b90af4f87f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-40694", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lykvtfnep62t", "content": "", "creation_timestamp": "2025-09-11T13:59:39.731779Z"}, {"uuid": "ad4f59c0-030b-4ee4-adeb-988cc934a16d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-40691", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lymgkznmyt2q", "content": "", "creation_timestamp": "2025-09-12T04:31:52.954325Z"}, {"uuid": "36ea1316-d5da-417e-8ed9-8c9f3e6ca263", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4069", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13890", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4069\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in code-projects Product Management System 1.0. Affected by this issue is the function add_item. The manipulation of the argument st.productname leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-29T15:31:06.405Z\n\ud83d\udccf Modified: 2025-04-29T17:48:56.628Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.306506\n2. https://vuldb.com/?ctiid.306506\n3. https://vuldb.com/?submit.559516\n4. https://github.com/zzzxc643/cve/blob/main/PRODUCT_MANAGEMENT_SYSTEM.md\n5. https://code-projects.org/", "creation_timestamp": "2025-04-29T18:12:29.000000Z"}, {"uuid": "38eba293-54b8-45a4-9ba6-ef9bc807a4c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-40690", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lymllfehxl2q", "content": "", "creation_timestamp": "2025-09-12T06:01:33.780624Z"}, {"uuid": "9694a9ec-65cf-44e4-9b8a-7e6c93e434f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4069", "type": "seen", "source": "https://t.me/cvedetector/24015", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4069 - Code-projects Product Management System Stack-Based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-4069 \nPublished : April 29, 2025, 4:15 p.m. | 30\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in code-projects Product Management System 1.0. Affected by this issue is the function add_item. The manipulation of the argument st.productname leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-29T19:20:29.000000Z"}]}