{"vulnerability": "cve-2025-1108", "sightings": [{"uuid": "b694a33d-075a-4245-9915-f7fa2635b2c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11085", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5ecmh3tpi32", "content": "", "creation_timestamp": "2025-11-11T14:06:21.633666Z"}, {"uuid": "3b7029c4-72af-47a8-9af0-b50805a1808d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11084", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5eivp5vcl2k", "content": "", "creation_timestamp": "2025-11-11T15:58:17.983805Z"}, {"uuid": "76c8882b-04f4-4bdd-875f-967b8f7e476a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11085", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5ejhly4vd2w", "content": "", "creation_timestamp": "2025-11-11T16:08:18.637755Z"}, {"uuid": "6e543dc2-9eb9-4db6-9f0a-29693099d2a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11085", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5eolv5kggt2", "content": "", "creation_timestamp": "2025-11-11T17:40:54.008536Z"}, {"uuid": "f5c24cf6-ee68-4284-a7a2-31c2fddad450", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11084", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-317-07", "content": "", "creation_timestamp": "2025-11-13T11:00:00.000000Z"}, {"uuid": "26aa8b39-e548-42c7-bb2b-204a54850f39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11085", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-317-07", "content": "", "creation_timestamp": "2025-11-13T11:00:00.000000Z"}, {"uuid": "24def625-1cf9-4caf-b4db-500b700bc272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11086", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3rxmobo6y2q", "content": "", "creation_timestamp": "2025-10-22T13:35:54.660303Z"}, {"uuid": "1515ce0d-bb44-4dd3-9af6-0cf02f8ca33e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11087", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m66gvvgbup2b", "content": "", "creation_timestamp": "2025-11-21T23:31:50.307738Z"}, {"uuid": "d6090eb9-ddff-4c9c-9ecd-e08e373f9388", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11083", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1732", "content": "", "creation_timestamp": "2026-01-23T04:00:00.000000Z"}, {"uuid": "1acf9541-0ed0-41c0-9170-9c72eba774e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1108", "type": "seen", "source": "https://t.me/cvedetector/17490", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1108 - Janto Email Password Reset Replay Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1108 \nPublished : Feb. 7, 2025, 2:15 p.m. | 54\u00a0minutes ago \nDescription : Insufficient data authenticity verification vulnerability in Janto, versions prior to r12. This allows an unauthenticated attacker to modify the content of emails sent to reset the password. To exploit the vulnerability, the attacker must create a POST request by injecting malicious content into the \u2018Xml\u2019 parameter on the \u2018/public/cgi/Gateway.php\u2019 endpoint. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T16:19:41.000000Z"}, {"uuid": "9c1117c6-76f1-42c3-9919-4356954a0efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1108", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113963153480016900", "content": "", "creation_timestamp": "2025-02-07T14:48:40.964283Z"}, {"uuid": "cc816744-bfe6-4e4d-91b5-07e1c4492380", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1108", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhls244wgi2t", "content": "", "creation_timestamp": "2025-02-07T14:16:11.933409Z"}]}