{"vulnerability": "CVE-2025-2724", "sightings": [{"uuid": "8c389280-8969-4bb8-b7f6-5d0fdd2b7843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27241", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loinx5lfv72r", "content": "", "creation_timestamp": "2025-05-06T10:21:21.940129Z"}, {"uuid": "62423d82-6234-4695-8b40-2c0268840956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27248", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loinx6hvhk2p", "content": "", "creation_timestamp": "2025-05-06T10:21:26.660525Z"}, {"uuid": "0fc05e32-06d6-48cc-8601-75de0b319e88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27242", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr457crqbm2m", "content": "", "creation_timestamp": "2025-06-08T15:05:18.155081Z"}, {"uuid": "73c6e429-fa0d-4531-82ca-faf54530cffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27240", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lynlfl7ys52x", "content": "", "creation_timestamp": "2025-09-12T15:30:57.660489Z"}, {"uuid": "a5bbeab7-d94b-4c57-9382-a68342c9fe1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27244", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10027", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27244\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: AssetView and AssetView CLOUD contain an issue with acquiring sensitive information from sent data to the developer. If exploited, sensitive information may be obtained by a remote unauthenticated attacker.\n\ud83d\udccf Published: 2025-04-02T03:21:11.828Z\n\ud83d\udccf Modified: 2025-04-02T03:21:11.828Z\n\ud83d\udd17 References:\n1. https://www.hammock.jp/assetview/info/250325.html\n2. https://jvn.jp/en/jp/JVN26321838/", "creation_timestamp": "2025-04-02T03:35:35.000000Z"}, {"uuid": "5b30385a-1e6c-4a4e-99f8-8aff46e1086e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2724", "type": "seen", "source": "https://t.me/cvedetector/21032", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2724 - GNOME libgsf Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2724 \nPublished : March 25, 2025, 2:15 a.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in GNOME libgsf up to 1.14.53. Affected is the function sorting_key_copy. The manipulation of the argument Name leads to out-of-bounds read. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T05:16:38.000000Z"}, {"uuid": "16af9e26-f14d-4bdd-9d80-b6207f722610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27241", "type": "seen", "source": "https://t.me/cvedetector/24571", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27241 - OpenHarmony NULL Pointer Dereference Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27241 \nPublished : May 6, 2025, 9:15 a.m. | 44\u00a0minutes ago \nDescription : in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T12:48:19.000000Z"}, {"uuid": "949b6c47-4fd5-493a-8992-b9f34489be90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27244", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lla5bjp6is2x", "content": "", "creation_timestamp": "2025-03-25T20:46:02.443613Z"}, {"uuid": "3a621ebd-f3bc-40cb-9fe8-50acedd89646", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27247", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr47bgef2n2u", "content": "", "creation_timestamp": "2025-06-08T15:42:16.515703Z"}, {"uuid": "94148162-d8e4-45c9-94a7-26ca082d707f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27248", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15075", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27248\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.\n\ud83d\udccf Published: 2025-05-06T09:03:26.206Z\n\ud83d\udccf Modified: 2025-05-06T09:03:26.206Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md", "creation_timestamp": "2025-05-06T09:21:16.000000Z"}, {"uuid": "c6ae0414-92e3-4588-b31b-88cf8797b0f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27241", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15074", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27241\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.\n\ud83d\udccf Published: 2025-05-06T09:03:33.143Z\n\ud83d\udccf Modified: 2025-05-06T09:03:33.143Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md", "creation_timestamp": "2025-05-06T09:21:15.000000Z"}, {"uuid": "1a257225-55dc-4033-b4b5-3c45b328c29e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2724", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8582", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2724\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as problematic has been found in GNOME libgsf up to 1.14.53. Affected is the function sorting_key_copy. The manipulation of the argument Name leads to out-of-bounds read. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-25T01:31:04.182Z\n\ud83d\udccf Modified: 2025-03-25T01:31:04.182Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300744\n2. https://vuldb.com/?ctiid.300744\n3. https://vuldb.com/?submit.520184\n4. https://www.gnome.org/", "creation_timestamp": "2025-03-25T02:23:20.000000Z"}, {"uuid": "0dda60a9-6f23-4b49-8ca6-ac33041dd938", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27244", "type": "seen", "source": "https://t.me/cvedetector/21843", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27244 - AssetView Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27244 \nPublished : April 2, 2025, 4:15 a.m. | 1\u00a0hour, 50\u00a0minutes ago \nDescription : AssetView and AssetView CLOUD contain an issue with acquiring sensitive information from sent data to the developer. If exploited, sensitive information may be obtained by a remote unauthenticated attacker. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T08:17:48.000000Z"}, {"uuid": "3abe60f1-89dd-47f5-86ce-0b5ff7c6418a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27248", "type": "seen", "source": "https://t.me/cvedetector/24572", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27248 - Huawei OpenHarmony NULL Pointer Dereference DOS\", \n  \"Content\": \"CVE ID : CVE-2025-27248 \nPublished : May 6, 2025, 9:15 a.m. | 44\u00a0minutes ago \nDescription : in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T12:48:22.000000Z"}, {"uuid": "0183c4ef-76ce-49b7-ada4-c6a5d828da25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27244", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llssnkjy7t27", "content": "", "creation_timestamp": "2025-04-02T06:56:29.180032Z"}]}