{"vulnerability": "CVE-2025-0395", "sightings": [{"uuid": "fbabfb5d-1ee1-4c50-a2d5-b0d28d14aa44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11554", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0395\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\n\ud83d\udccf Published: 2025-01-22T13:11:30.406Z\n\ud83d\udccf Modified: 2025-04-13T03:00:13.920Z\n\ud83d\udd17 References:\n1. https://www.openwall.com/lists/oss-security/2025/01/22/4\n2. https://sourceware.org/bugzilla/show_bug.cgi?id=32582\n3. https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001\n4. https://sourceware.org/pipermail/libc-announce/2025/000044.html", "creation_timestamp": "2025-04-13T04:52:43.000000Z"}, {"uuid": "381eb599-1a58-4429-97ce-7cfff6129f6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5889", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0395\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\n\ud83d\udccf Published: 2025-01-22T13:11:30.406Z\n\ud83d\udccf Modified: 2025-02-28T13:07:31.672Z\n\ud83d\udd17 References:\n1. https://www.openwall.com/lists/oss-security/2025/01/22/4\n2. https://sourceware.org/bugzilla/show_bug.cgi?id=32582\n3. https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001\n4. https://sourceware.org/pipermail/libc-announce/2025/000044.html", "creation_timestamp": "2025-02-28T13:26:55.000000Z"}, {"uuid": "bfb0a921-d7a8-49e4-9ea3-0a3f27cc5571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgdh7aw6jy2f", "content": "", "creation_timestamp": "2025-01-22T13:15:43.860454Z"}, {"uuid": "54029f43-3637-44f2-bb3a-5f05557419c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgdj3wz7dp2e", "content": "", "creation_timestamp": "2025-01-22T13:49:40.269477Z"}, {"uuid": "84919cd1-4157-42e9-a6ee-ffc9c729266b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://bsky.app/profile/andersonc0d3.bsky.social/post/3lgdj4f7vlk2o", "content": "", "creation_timestamp": "2025-01-22T13:49:56.261806Z"}, {"uuid": "89b9bb2a-b343-4c86-9706-09f56644eb64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgdjt6h7xu23", "content": "", "creation_timestamp": "2025-01-22T14:02:39.689817Z"}, {"uuid": "d0cf105f-84dc-4585-ac73-720f62951dca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3lupieybfp72r", "content": "", "creation_timestamp": "2025-07-24T12:01:31.725449Z"}, {"uuid": "55d2f689-3ba0-48d8-b45b-fa29bbe05df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lzzeuwmlgg2z", "content": "", "creation_timestamp": "2025-09-30T01:31:26.488523Z"}, {"uuid": "5f8489ce-11c1-4193-9d6e-96e2ec1b7d33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://t.me/cvedetector/16091", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0395 - GNU C Library Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0395 \nPublished : Jan. 22, 2025, 1:15 p.m. | 19\u00a0minutes ago \nDescription : When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T14:43:03.000000Z"}, {"uuid": "bd508923-9c91-43d8-8318-a07589420b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgfvmcjfig2t", "content": "", "creation_timestamp": "2025-01-23T12:38:53.691985Z"}, {"uuid": "c6554b56-17d1-437b-9ba4-c4cc053c3728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmnvchls2p2g", "content": "", "creation_timestamp": "2025-04-13T01:25:51.172828Z"}, {"uuid": "28980500-dee5-439f-ad6d-b1e567571d61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lnlvp2joud2m", "content": "", "creation_timestamp": "2025-04-24T23:52:48.102033Z"}, {"uuid": "5e0e08ab-79ab-4dd9-b43e-534a36d8f3e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0395", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2537", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0395\n\ud83d\udd39 Description: When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\n\ud83d\udccf Published: 2025-01-22T13:11:30.406Z\n\ud83d\udccf Modified: 2025-01-22T13:11:30.406Z\n\ud83d\udd17 References:\n1. https://sourceware.org/bugzilla/show_bug.cgi?id=32582", "creation_timestamp": "2025-01-22T14:01:37.000000Z"}]}