{"vulnerability": "CVE-2025-1975", "sightings": [{"uuid": "e985cd64-c0c9-4814-9a05-82d83de4d6a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1975", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16669", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1975\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A vulnerability in the Ollama server version 0.5.11 allows a malicious user to cause a Denial of Service (DoS) attack by customizing the manifest content and spoofing a service. This is due to improper validation of array index access when downloading a model via the /api/pull endpoint, which can lead to a server crash.\n\ud83d\udccf Published: 2025-05-16T08:25:57.177Z\n\ud83d\udccf Modified: 2025-05-16T08:25:57.177Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/921ba5d4-f1d0-4c66-9764-4f72dffe7acd", "creation_timestamp": "2025-05-16T09:34:54.000000Z"}, {"uuid": "e75dbc6e-7bc2-4715-92c7-c7562218a772", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1975", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpc3nyfmei2p", "content": "", "creation_timestamp": "2025-05-16T13:03:23.559598Z"}, {"uuid": "924b9ef3-c89f-4bfb-acf2-7eac4ff7bffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1975", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114517516963373383", "content": "", "creation_timestamp": "2025-05-16T12:30:35.958357Z"}]}