{"vulnerability": "CVE-2025-4901", "sightings": [{"uuid": "5811f11c-991f-4fd0-81a7-77ad5d837745", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49014", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18866", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-49014\n\ud83d\udd25 CVSS Score: 5.5 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: jq is a command-line JSON processor. In version 1.8.0 a heap use after free vulnerability exists within the function f_strflocaltime of /src/builtin.c. This issue has been patched in commit 499c91b, no known fix version exists at time of publication.\n\ud83d\udccf Published: 2025-06-19T15:08:04.875Z\n\ud83d\udccf Modified: 2025-06-19T15:08:04.875Z\n\ud83d\udd17 References:\n1. https://github.com/jqlang/jq/security/advisories/GHSA-rmjp-cr27-wpg2\n2. https://github.com/jqlang/jq/commit/499c91bca9d4d027833bc62787d1bb075c03680e", "creation_timestamp": "2025-06-19T15:41:39.000000Z"}, {"uuid": "9920cb38-9a60-4b86-9e5f-ed9eb6cba0e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49011", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqxkoqhiry2e", "content": "", "creation_timestamp": "2025-06-06T19:23:15.742496Z"}, {"uuid": "5b416b8f-06ee-4211-9b5e-6df6b915e3a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49012", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114633314018963839", "content": "", "creation_timestamp": "2025-06-05T23:19:18.819256Z"}, {"uuid": "f35cc622-7996-44e1-b6c9-2c3d292ff764", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49012", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqvt3bqjlp2r", "content": "", "creation_timestamp": "2025-06-06T02:48:07.839923Z"}, {"uuid": "1418f07d-64cd-4149-87dc-8828faee8286", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49014", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114711005781429046", "content": "", "creation_timestamp": "2025-06-19T16:37:21.098165Z"}, {"uuid": "f37606fc-9779-432d-bae9-a1e7d51ccf4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4901", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16782", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4901\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as problematic was found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected by this vulnerability is the function sub_41E304 of the file /H5/state_view.data of the component HTTP Endpoint. The manipulation leads to information disclosure. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-18T23:31:04.835Z\n\ud83d\udccf Modified: 2025-05-18T23:31:04.835Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309457\n2. https://vuldb.com/?ctiid.309457\n3. https://vuldb.com/?submit.578049\n4. https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/state_view.md\n5. https://www.dlink.com/", "creation_timestamp": "2025-05-18T23:37:40.000000Z"}, {"uuid": "0bd93379-de75-49bc-a220-a3837ada104f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4901", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpifexsqvb2l", "content": "", "creation_timestamp": "2025-05-19T01:13:13.684547Z"}, {"uuid": "28740e7e-979d-486c-aaf6-dddc4f145e31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49014", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lry3hoomq52q", "content": "", "creation_timestamp": "2025-06-19T17:48:44.350469Z"}, {"uuid": "df66b1d9-e49d-4c94-9c4d-b5aa6732cb74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-49010", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mj2tlhrxnc2b", "content": "", "creation_timestamp": "2026-04-09T12:45:08.309662Z"}, {"uuid": "c94e320d-246d-4454-86a9-05bbcfdcb60b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49013", "type": "published-proof-of-concept", "source": "Telegram/wBaWWziweQgkSo7_QapMU6ZNqlsB8QnkMAlvPkvlPpTVY_k", "content": "", "creation_timestamp": "2025-06-09T14:01:05.000000Z"}]}