{"vulnerability": "CVE-2025-43015", "sightings": [{"uuid": "e7c87835-5c0f-45bb-9841-d587db45e570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43015", "type": "seen", "source": "https://t.me/cvedetector/23253", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43015 - JetBrains RubyMine Remote Port Overwrite\", \n  \"Content\": \"CVE ID : CVE-2025-43015 \nPublished : April 17, 2025, 4:16 p.m. | 2\u00a0hours, 6\u00a0minutes ago \nDescription : In JetBrains RubyMine before 2025.1 remote Interpreter overwrote ports to listen on all interfaces \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T20:30:24.000000Z"}, {"uuid": "27423fb4-9e62-426a-bcbc-defeab155857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43015", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:57.000000Z"}, {"uuid": "6211c5ec-0423-4149-bc2d-905203fc750d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43015", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:40.000000Z"}, {"uuid": "f1f68924-6166-4504-87e5-b30b2e61038b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43015", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12305", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43015\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: In JetBrains RubyMine before 2025.1 remote Interpreter overwrote ports to listen on all interfaces\n\ud83d\udccf Published: 2025-04-17T15:56:05.386Z\n\ud83d\udccf Modified: 2025-04-17T17:23:40.313Z\n\ud83d\udd17 References:\n1. https://www.jetbrains.com/privacy-security/issues-fixed/", "creation_timestamp": "2025-04-17T17:57:43.000000Z"}, {"uuid": "059670fc-2fb2-42f4-9b3d-68b66f0e7252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43015", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114354325777103450", "content": "", "creation_timestamp": "2025-04-17T16:48:59.967431Z"}, {"uuid": "ae76f40b-e17e-48f9-b8aa-2524addb7437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43015", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmzq3dd5gy2a", "content": "", "creation_timestamp": "2025-04-17T18:24:25.509232Z"}]}