{"uuid": "5645636d-59f4-4dd6-a9cb-e930fc8c8458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0725", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18195", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0725\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: When libcurl is asked to perform automatic gzip decompression of\ncontent-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,\n**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would\nmake libcurl perform a buffer overflow.\n\ud83d\udccf Published: 2025-02-05T09:18:20.468Z\n\ud83d\udccf Modified: 2025-06-12T16:04:29.956Z\n\ud83d\udd17 References:\n1. https://curl.se/docs/CVE-2025-0725.json\n2. https://curl.se/docs/CVE-2025-0725.html\n3. https://hackerone.com/reports/2956023", "creation_timestamp": "2025-06-12T16:34:37.000000Z"}