2025-09-03 04:00:00 server3 ALERT: Privilege escalation in kernel call, related to CVE-2025-0197. 2025-06-01 17:00:00 server2 ERROR: Path traversal in file upload, CVE CVE-2025-0203 in GitLab. 2025-06-15 11:00:00 server4 CRITICAL: Arbitrary file deletion attempted via /admin/deleteuser.php, CVE CVE-2025-0168. Blocked. 2025-02-02 05:00:00 server1 CRITICAL: Arbitrary file deletion attempted via /orders/view_order.php, CVE CVE-2025-0199. Blocked. 2025-05-12 05:00:00 server3 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0205. 2025-02-11 07:00:00 server5 ERROR: Failed authentication attempt from 251.70.195.74 exploiting CVE-2025-0203 in build parameter. 2025-02-05 08:00:00 server3 CRITICAL: Arbitrary file deletion attempted via /orders/view_order.php, CVE CVE-2025-0172. Blocked. 2025-07-16 09:00:00 server5 INFO: Vulnerability scan completed. Found CVE-2025-0176 in Kubernetes version 7.0. Severity: HIGH. 2025-06-26 17:00:00 server5 CRITICAL: Arbitrary file deletion attempted via POST /api/history/getDocHistoryContent, CVE CVE-2025-0205. Blocked. 2025-08-19 09:00:00 server5 ALERT: Potential SQL injection attempt detected in Grafana. IP: 95.215.62.129, targeting /orders/view_order.php. Related to CVE-2025-21609 (CRITICAL). 2025-08-19 16:00:00 server5 INFO: RCE attempt via OGNL in Struts app, CVE CVE-2025-0175. Mitigated. 2025-08-29 12:00:00 server4 ERROR: Path traversal in file upload, CVE CVE-2025-0168 in GitLab. 2025-03-09 19:00:00 server5 ERROR: Failed authentication attempt from 30.153.157.233 exploiting CVE-2025-21609 in container runtime. 2025-04-21 09:00:00 server5 ALERT: Potential SQL injection attempt detected in Nginx. IP: 105.35.64.253, targeting kubelet component. Related to CVE-2025-22214 (MEDIUM). 2025-06-19 22:00:00 server1 SECURITY: Patch applied for CVE-2025-0200 on Jenkins. Restarting service. 2025-05-02 08:00:00 server2 ALERT: Potential SQL injection attempt detected in Grafana. IP: 66.22.35.209, targeting /user/search_result2.php. Related to CVE-2025-0174 (MEDIUM). 2025-04-19 04:00:00 server1 SECURITY: SSRF via data source config in Grafana, flagged as CVE-2025-0172. 2025-08-17 13:00:00 server1 INFO: RCE attempt via OGNL in Struts app, CVE CVE-2025-0174. Mitigated. 2025-04-03 20:00:00 server2 AUDIT: Memory corruption in Lua script, potential RCE CVE-2025-0203. 2025-03-07 22:00:00 server2 ALERT: Potential SQL injection attempt detected in Trix Editor. IP: 89.235.122.227, targeting /view.php. Related to CVE-2025-0198 (HIGH). 2025-06-13 20:00:00 server3 DETECTED: XSS payload in link field for Trix Editor, matching CVE-2025-0175 pattern. 2025-04-21 17:00:00 server5 ALERT: Potential SQL injection attempt detected in Redis. IP: 164.219.101.120, targeting RLS policy. Related to CVE-2025-0175 (MEDIUM). 2025-01-26 00:00:00 server5 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0198. 2025-01-24 15:00:00 server2 WARNING: Buffer overflow in HTTP/2 headers detected, potential CVE-2025-0171 exploit. 2025-02-06 10:00:00 server1 AUDIT: User user84 accessed endpoint /view.php, flagged for CVE-2025-0205 risk. 2025-01-01 22:00:00 server1 CRITICAL: Arbitrary file deletion attempted via /orders/view_order.php, CVE CVE-2025-21610. Blocked. 2025-02-23 16:00:00 server4 ALERT: Privilege escalation in kernel call, related to CVE-2025-0202. 2025-01-15 03:00:00 server4 WARNING: Suspicious query parameter '' OR 1=1 --' in request to container runtime. Possible exploitation of CVE-2025-0175. 2025-05-17 00:00:00 server3 ERROR: Failed authentication attempt from 163.84.159.145 exploiting CVE-2025-0204 in /tmp/framer.txt. 2025-07-12 16:00:00 server3 ERROR: Failed authentication attempt from 140.118.98.220 exploiting CVE-2025-0175 in /user/add_cart.php. 2025-08-22 16:00:00 server3 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0172. 2025-08-07 04:00:00 server5 INFO: Vulnerability scan completed. Found CVE-2025-0201 in Point of Sales System version 8.0. Severity: CRITICAL. 2025-05-28 05:00:00 server1 SECURITY: Patch applied for CVE-2025-22275 on SiYuan Note. Restarting service. 2025-02-25 13:00:00 server3 ALERT: Potential SQL injection attempt detected in Job Recruitment. IP: 53.12.111.183, targeting /view.php. Related to CVE-2025-21609 (CRITICAL). 2025-06-29 05:00:00 server2 WARNING: Suspicious query parameter '' OR 1=1 --' in request to build parameter. Possible exploitation of CVE-2025-22214. 2025-07-10 07:00:00 server4 ALERT: Privilege escalation in kernel call, related to CVE-2025-0202. 2025-05-20 03:00:00 server1 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0176. 2025-02-07 07:00:00 server2 CRITICAL: Arbitrary file deletion attempted via POST /api/history/getDocHistoryContent, CVE CVE-2025-0171. Blocked. 2025-06-23 14:00:00 server2 WARNING: Buffer overflow in HTTP/2 headers detected, potential CVE-2025-0201 exploit. 2025-07-29 14:00:00 server2 INFO: Vulnerability scan completed. Found CVE-2025-0168 in SiYuan Note version 9.0. Severity: HIGH. 2025-07-05 03:00:00 server3 WARNING: Buffer overflow in HTTP/2 headers detected, potential CVE-2025-0173 exploit. 2025-05-22 15:00:00 server5 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0172. 2025-03-19 15:00:00 server5 SECURITY: Patch applied for CVE-2025-0204 on Nginx. Restarting service. 2025-03-30 20:00:00 server4 CRITICAL: Arbitrary file deletion attempted via /admin/deleteuser.php, CVE CVE-2025-0205. Blocked. 2025-03-02 05:00:00 server3 AUDIT: User user8 accessed endpoint container runtime, flagged for CVE-2025-0172 risk. 2025-06-09 08:00:00 server5 SECURITY: SSRF via data source config in Grafana, flagged as CVE-2025-0197. 2025-03-06 18:00:00 server2 ALERT: Potential SQL injection attempt detected in Landray EIS. IP: 75.25.157.100, targeting /tmp/framer.txt. Related to CVE-2025-0171 (HIGH). 2025-01-19 16:00:00 server3 WARNING: Buffer overflow in HTTP/2 headers detected, potential CVE-2025-0173 exploit. 2025-06-19 19:00:00 server3 ERROR: Failed authentication attempt from 125.216.23.146 exploiting CVE-2025-0201 in RLS policy. 2025-01-06 19:00:00 server3 INFO: Vulnerability scan completed. Found CVE-2025-0168 in Grafana version 10.0. Severity: HIGH. 2025-05-21 22:00:00 server1 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0171. 2025-07-29 01:00:00 server2 ERROR: Failed authentication attempt from 55.96.142.32 exploiting CVE-2025-0201 in Lua scripting engine. 2025-06-02 09:00:00 server4 DETECTED: XSS payload in link field for Trix Editor, matching CVE-2025-0172 pattern. 2025-06-17 03:00:00 server1 WARNING: Buffer overflow in HTTP/2 headers detected, potential CVE-2025-0202 exploit. 2025-07-06 23:00:00 server1 AUDIT: User user42 accessed endpoint Message/fi_message_receiver.aspx, flagged for CVE-2025-21610 risk. 2025-01-29 01:00:00 server3 AUDIT: Memory corruption in Lua script, potential RCE CVE-2025-21610. 2025-06-25 11:00:00 server2 ALERT: Privilege escalation in kernel call, related to CVE-2025-0206. 2025-05-04 19:00:00 server3 CRITICAL: Arbitrary file deletion attempted via POST /api/history/getDocHistoryContent, CVE CVE-2025-0198. Blocked. 2025-09-06 04:00:00 server4 ERROR: Failed authentication attempt from 192.178.220.187 exploiting CVE-2025-0175 in /user/search_result2.php. 2025-05-28 16:00:00 server5 ERROR: Path traversal in file upload, CVE CVE-2025-0204 in GitLab. 2025-08-30 19:00:00 server4 WARNING: Suspicious query parameter '' OR 1=1 --' in request to HTTP/2 implementation. Possible exploitation of CVE-2025-22214. 2025-06-20 01:00:00 server4 SECURITY: SSRF via data source config in Grafana, flagged as CVE-2025-0175. 2025-04-30 04:00:00 server1 ALERT: Potential SQL injection attempt detected in Grafana. IP: 201.77.166.15, targeting HTTP/2 implementation. Related to CVE-2025-0201 (CRITICAL). 2025-09-01 15:00:00 server2 INFO: RCE attempt via OGNL in Struts app, CVE CVE-2025-0175. Mitigated. 2025-02-12 12:00:00 server2 DETECTED: XSS payload in link field for Apache Struts, matching CVE-2025-0198 pattern. 2025-03-14 07:00:00 server2 CRITICAL: Arbitrary file deletion attempted via /admin/deleteuser.php, CVE CVE-2025-0205. Blocked. 2025-04-20 02:00:00 server1 INFO: RCE attempt via OGNL in Struts app, CVE CVE-2025-0198. Mitigated. 2025-08-19 11:00:00 server5 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0200. 2025-07-24 03:00:00 server1 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0174. 2025-07-30 20:00:00 server4 ALERT: Privilege escalation in kernel call, related to CVE-2025-0206. 2025-02-17 22:00:00 server4 SECURITY: Patch applied for CVE-2025-0168 on Jenkins. Restarting service. 2025-09-04 09:00:00 server3 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0198. 2025-04-12 09:00:00 server1 ERROR: Path traversal in file upload, CVE CVE-2025-0204 in GitLab. 2025-03-11 21:00:00 server2 ERROR: Path traversal in file upload, CVE CVE-2025-0168 in GitLab. 2025-01-08 15:00:00 server1 ALERT: Potential SQL injection attempt detected in Chat System. IP: 173.69.232.61, targeting HTTP data source plugin. Related to CVE-2025-0173 (HIGH). 2025-05-22 14:00:00 server3 WARNING: Suspicious query parameter '' OR 1=1 --' in request to /user/search_result2.php. Possible exploitation of CVE-2025-0173. 2025-02-12 20:00:00 server3 AUDIT: User user41 accessed endpoint HTTP/2 implementation, flagged for CVE-2025-0202 risk. 2025-01-22 04:00:00 server5 AUDIT: Memory corruption in Lua script, potential RCE CVE-2025-0175. 2025-07-01 19:00:00 server3 DETECTED: XSS payload in link field for SiYuan Note, matching CVE-2025-0172 pattern. 2025-03-17 07:00:00 server5 ERROR: Path traversal in file upload, CVE CVE-2025-0201 in GitLab. 2025-05-02 04:00:00 server2 ALERT: Privilege escalation in kernel call, related to CVE-2025-22275. 2025-01-12 21:00:00 server2 CRITICAL: Arbitrary file deletion attempted via /orders/view_order.php, CVE CVE-2025-0204. Blocked. 2025-08-27 16:00:00 server5 WARNING: Buffer overflow in HTTP/2 headers detected, potential CVE-2025-0203 exploit. 2025-02-02 22:00:00 server5 AUDIT: Memory corruption in Lua script, potential RCE CVE-2025-0200. 2025-03-26 23:00:00 server4 CRITICAL: Arbitrary file deletion attempted via /orders/view_order.php, CVE CVE-2025-21609. Blocked. 2025-09-06 18:00:00 server2 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0206. 2025-03-13 13:00:00 server5 AUDIT: User user91 accessed endpoint /view.php, flagged for CVE-2025-0200 risk. 2025-04-13 00:00:00 server3 AUDIT: Memory corruption in Lua script, potential RCE CVE-2025-0172. 2025-04-10 17:00:00 server3 CRITICAL: Arbitrary file deletion attempted via /admin/deleteuser.php, CVE CVE-2025-0202. Blocked. 2025-04-21 23:00:00 server3 AUDIT: Memory corruption in Lua script, potential RCE CVE-2025-0201. 2025-08-21 10:00:00 server3 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-21610. 2025-06-06 07:00:00 server2 SECURITY: SSRF via data source config in Grafana, flagged as CVE-2025-0205. 2025-07-21 05:00:00 server3 AUDIT: Memory corruption in Lua script, potential RCE CVE-2025-0175. 2025-06-01 04:00:00 server1 ALERT: Privilege escalation in kernel call, related to CVE-2025-22214. 2025-04-15 21:00:00 server4 WARNING: Buffer overflow in HTTP/2 headers detected, potential CVE-2025-0198 exploit. 2025-02-20 01:00:00 server3 SECURITY: SSRF via data source config in Grafana, flagged as CVE-2025-0199. 2025-07-12 06:00:00 server2 DETECTED: XSS payload in link field for Jenkins, matching CVE-2025-21610 pattern. 2025-06-19 02:00:00 server2 INFO: Vulnerability scan completed. Found CVE-2025-0200 in Docker Desktop version 7.0. Severity: HIGH. 2025-01-27 22:00:00 server4 ALERT: Privilege escalation in kernel call, related to CVE-2025-0202. 2025-01-28 01:00:00 server4 INFO: RCE attempt via OGNL in Struts app, CVE CVE-2025-0172. Mitigated. 2025-01-22 10:00:00 server2 AUDIT: User user96 accessed endpoint /view.php, flagged for CVE-2025-21610 risk. 2025-06-14 00:00:00 server2 INFO: RCE attempt via OGNL in Struts app, CVE CVE-2025-0198. Mitigated. 2025-03-27 13:00:00 server4 DETECTED: XSS payload in link field for Redis, matching CVE-2025-22275 pattern. 2025-07-19 02:00:00 server4 SECURITY: SSRF via data source config in Grafana, flagged as CVE-2025-21610. 2025-04-28 18:00:00 server5 CRITICAL: Arbitrary file deletion attempted via /admin/deleteuser.php, CVE CVE-2025-0172. Blocked. 2025-07-28 20:00:00 server4 DETECTED: XSS payload in link field for Job Recruitment, matching CVE-2025-0200 pattern. 2025-05-04 00:00:00 server5 INFO: Vulnerability scan completed. Found CVE-2025-0201 in Point of Sales System version 2.0. Severity: CRITICAL. 2025-09-04 22:00:00 server4 DETECTED: XSS payload in link field for Online Shop, matching CVE-2025-0206 pattern. 2025-02-22 20:00:00 server4 ERROR: Path traversal in file upload, CVE CVE-2025-0171 in GitLab. 2025-05-23 11:00:00 server4 ERROR: Path traversal in file upload, CVE CVE-2025-0197 in GitLab. 2025-07-19 10:00:00 server5 ALERT: Potential SQL injection attempt detected in Chat System. IP: 167.217.152.80, targeting link field. Related to CVE-2025-0172 (HIGH). 2025-01-24 22:00:00 server4 WARNING: Suspicious query parameter '' OR 1=1 --' in request to RLS policy. Possible exploitation of CVE-2025-21609. 2025-08-29 20:00:00 server3 ALERT: Potential SQL injection attempt detected in Grafana. IP: 71.94.95.48, targeting /_parse/_feedback_system.php. Related to CVE-2025-0203 (HIGH). 2025-01-21 15:00:00 server1 ALERT: Privilege escalation in kernel call, related to CVE-2025-0175. 2025-07-06 22:00:00 server5 DETECTED: XSS payload in link field for Online Eyewear Shop, matching CVE-2025-0173 pattern. 2025-04-28 13:00:00 server3 CRITICAL: Arbitrary file deletion attempted via POST /api/history/getDocHistoryContent, CVE CVE-2025-0174. Blocked. 2025-04-17 11:00:00 server2 AUDIT: User user56 accessed endpoint /view.php, flagged for CVE-2025-0175 risk. 2025-02-17 20:00:00 server1 ALERT: Potential SQL injection attempt detected in PostgreSQL. IP: 32.243.33.238, targeting Lua scripting engine. Related to CVE-2025-0176 (HIGH). 2025-02-15 06:00:00 server5 WARNING: Buffer overflow in HTTP/2 headers detected, potential CVE-2025-21609 exploit. 2025-06-19 05:00:00 server1 INFO: Vulnerability scan completed. Found CVE-2025-0172 in Trix Editor version 6.0. Severity: HIGH. 2025-07-11 05:00:00 server5 ERROR: Failed authentication attempt from 14.207.79.61 exploiting CVE-2025-0203 in /orders/view_order.php. 2025-04-25 18:00:00 server1 SECURITY: Patch applied for CVE-2025-22275 on Windows Kernel. Restarting service. 2025-04-10 21:00:00 server5 INFO: RCE attempt via OGNL in Struts app, CVE CVE-2025-0173. Mitigated. 2025-01-09 12:00:00 server3 SECURITY: SSRF via data source config in Grafana, flagged as CVE-2025-0197. 2025-03-28 13:00:00 server2 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0174. 2025-05-23 19:00:00 server3 INFO: Vulnerability scan completed. Found CVE-2025-0203 in Online Shop version 4.0. Severity: HIGH. 2025-06-24 03:00:00 server2 ERROR: Path traversal in file upload, CVE CVE-2025-0198 in GitLab. 2025-03-25 06:00:00 server5 DETECTED: XSS payload in link field for Grafana, matching CVE-2025-0175 pattern. 2025-06-09 21:00:00 server4 WARNING: Suspicious query parameter '' OR 1=1 --' in request to /api/history/getDocHistoryContent. Possible exploitation of CVE-2025-0175. 2025-01-03 16:00:00 server5 AUDIT: Memory corruption in Lua script, potential RCE CVE-2025-21609. 2025-08-20 10:00:00 server2 DETECTED: XSS payload in link field for Nginx, matching CVE-2025-0172 pattern. 2025-06-10 05:00:00 server5 INFO: Container escape attempt blocked in Docker, CVE CVE-2025-0198. 2025-08-27 04:00:00 server2 ALERT: Potential SQL injection attempt detected in Redis. IP: 227.67.25.87, targeting /user/search_result2.php. Related to CVE-2025-0176 (HIGH). 2025-07-20 14:00:00 server2 ERROR: Failed authentication attempt from 10.244.134.118 exploiting CVE-2025-0176 in Security Reference Monitor. 2025-06-05 20:00:00 server1 WARNING: Suspicious query parameter '' OR 1=1 --' in request to /user/add_cart.php. Possible exploitation of CVE-2025-0171. 2025-01-22 11:00:00 server4 INFO: RCE attempt via OGNL in Struts app, CVE CVE-2025-0199. Mitigated. 2025-08-05 14:00:00 server3 ERROR: Path traversal in file upload, CVE CVE-2025-0203 in GitLab. 2025-06-27 23:00:00 server2 AUDIT: User user90 accessed endpoint /api/history/getDocHistoryContent, flagged for CVE-2025-0197 risk. 2025-06-03 03:00:00 server1 ERROR: Path traversal in file upload, CVE CVE-2025-0175 in GitLab. 2025-04-05 17:00:00 server2 AUDIT: Memory corruption in Lua script, potential RCE CVE-2025-0197. 2025-03-26 22:00:00 server5 DETECTED: XSS payload in link field for Trix Editor, matching CVE-2025-0171 pattern. 2025-08-19 10:00:00 server3 WARNING: Buffer overflow in HTTP/2 headers detected, potential CVE-2025-0197 exploit. 2025-03-22 10:00:00 server1 AUDIT: User user20 accessed endpoint OGNL Expression Handler, flagged for CVE-2025-0206 risk. 2025-02-25 19:00:00 server1 AUDIT: Memory corruption in Lua script, potential RCE CVE-2025-0197. 2025-03-18 03:00:00 server5 ALERT: Privilege escalation in kernel call, related to CVE-2025-0176. 2025-02-12 03:00:00 server3 ERROR: Path traversal in file upload, CVE CVE-2025-21609 in GitLab. 2025-04-20 11:00:00 server2 SECURITY: SSRF via data source config in Grafana, flagged as CVE-2025-0173. 2025-01-30 23:00:00 server4 WARNING: Suspicious query parameter '' OR 1=1 --' in request to /tmp/framer.txt. Possible exploitation of CVE-2025-22275. 2025-06-05 17:00:00 server1 SECURITY: Patch applied for CVE-2025-0197 on Trix Editor. Restarting service. 2025-04-13 13:00:00 server1 INFO: Vulnerability scan completed. Found CVE-2025-0176 in SiYuan Note version 10.0. Severity: HIGH.