{"vulnerability": "CVE-2025-2950", "sightings": [{"uuid": "70340f6f-1fe8-415b-b021-715f78e90ceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29509", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lor2rsvtnf2w", "content": "", "creation_timestamp": "2025-05-09T18:32:23.238137Z"}, {"uuid": "214259bf-c57d-4568-a038-bbfd1b0e116d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2950", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12458", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2950\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM i 7.3, 7.4, 7.5, and 7.5 is vulnerable to a host header injection attack caused by improper neutralization of HTTP header content by IBM Navigator for i. An authenticated user can manipulate the host header in HTTP requests to change domain/IP address which may lead to unexpected behavior.\n\ud83d\udccf Published: 2025-04-18T14:50:21.165Z\n\ud83d\udccf Modified: 2025-04-18T14:50:21.165Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7231320", "creation_timestamp": "2025-04-18T14:59:06.000000Z"}, {"uuid": "5cf8f595-4458-4fc5-9871-196d0a19da89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29509", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15777", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29509\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Jan v0.5.14 and before is vulnerable to remote code execution (RCE) when the user clicks on a rendered link in the conversation, due to opening external website in the app and the exposure of electronAPI, with a lack of filtering of URL when calling shell.openExternal().\n\ud83d\udccf Published: 2025-05-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-09T16:48:42.699Z\n\ud83d\udd17 References:\n1. https://gist.github.com/Suuuuuzy/b8fa2fa083793c460e3686c182f8c4d1\n2. https://drive.google.com/file/d/1qDztNtn2merSjYgPRLWFFXqlXM9tcrjD/view?usp=sharing", "creation_timestamp": "2025-05-09T17:25:40.000000Z"}, {"uuid": "77920f7c-3276-43ae-adbe-1eda20369c94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29504", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llwsmeragb2r", "content": "", "creation_timestamp": "2025-04-03T21:06:31.223142Z"}, {"uuid": "68c947c0-55b4-407f-a31d-2ff78c162813", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29509", "type": "seen", "source": "https://t.me/cvedetector/24960", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29509 - Jan Electron RCE\", \n  \"Content\": \"CVE ID : CVE-2025-29509 \nPublished : May 9, 2025, 5:15 p.m. | 58\u00a0minutes ago \nDescription : Jan v0.5.14 and before is vulnerable to remote code execution (RCE) when the user clicks on a rendered link in the conversation, due to opening external website in the app and the exposure of electronAPI, with a lack of filtering of URL when calling shell.openExternal(). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T20:23:25.000000Z"}, {"uuid": "81632932-d17e-42dd-8732-7db50d819438", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2950", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ln3uu6vercs2", "content": "", "creation_timestamp": "2025-04-18T14:55:33.585055Z"}, {"uuid": "507f0e91-84d8-4c08-8e14-579bc0e2f1f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29504", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10468", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29504\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Insecure Permission vulnerability in student-manage 1 allows a local attacker to escalate privileges via the Unsafe permission verification.\n\ud83d\udccf Published: 2025-04-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-04T15:20:58.512Z\n\ud83d\udd17 References:\n1. https://gitee.com/huang-yk/student-manage/issues/IBQ14H", "creation_timestamp": "2025-04-04T15:36:51.000000Z"}, {"uuid": "b872da61-58c2-48a4-82bd-a0a119039ec4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29504", "type": "seen", "source": "https://t.me/cvedetector/22024", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29504 - Student-Manage Apache Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-29504 \nPublished : April 3, 2025, 8:15 p.m. | 1\u00a0hour ago \nDescription : Insecure Permission vulnerability in student-manage 1 allows a local attacker to escalate privileges via the Unsafe permission verification. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T23:36:22.000000Z"}]}