{"vulnerability": "cve-2025-3205", "sightings": [{"uuid": "13125f8f-7e85-4ddb-926b-0e9db15f99b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32051", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14213", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32051\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in libsoup. The libsoup soup_uri_decode_data_uri() function may crash when processing malformed data URI. This flaw allows an attacker to cause a denial of service (DoS).\n\ud83d\udccf Published: 2025-04-03T13:36:50.776Z\n\ud83d\udccf Modified: 2025-05-01T01:48:17.090Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-32051\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2357068", "creation_timestamp": "2025-05-01T02:13:59.000000Z"}, {"uuid": "76dfc8bf-06c1-4612-9827-866d3e5a5896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32054", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10296", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32054\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: In JetBrains IntelliJ IDEA before 2024.3, 2024.2.4 source code could be logged in the idea.log file\n\ud83d\udccf Published: 2025-04-03T16:48:35.468Z\n\ud83d\udccf Modified: 2025-04-03T16:48:35.468Z\n\ud83d\udd17 References:\n1. https://www.jetbrains.com/privacy-security/issues-fixed/", "creation_timestamp": "2025-04-03T17:35:56.000000Z"}, {"uuid": "7656d7ea-4f06-4dd1-97a6-bacdbb5f8d9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32053", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10233", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32053\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)\n\ud83d\udd39 Description: A flaw was found in libsoup. A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read.\n\ud83d\udccf Published: 2025-04-03T13:37:39.054Z\n\ud83d\udccf Modified: 2025-04-03T14:04:16.262Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-32053\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2357070", "creation_timestamp": "2025-04-03T14:35:22.000000Z"}, {"uuid": "7a123e9b-106f-47e6-993b-080e5bc12a0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3205", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10384", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3205\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in CodeAstro Student Grading System 1.0. This affects an unknown part of the file studentsubject.php. The manipulation of the argument studentId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-04T03:00:16.819Z\n\ud83d\udccf Modified: 2025-04-04T03:00:16.819Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303159\n2. https://vuldb.com/?ctiid.303159\n3. https://vuldb.com/?submit.545894\n4. https://github.com/Lanxiy7th/lx_CVE_report-/issues/20\n5. https://codeastro.com/", "creation_timestamp": "2025-04-04T03:35:55.000000Z"}, {"uuid": "655d6125-3a3f-4e36-b920-67704bfea04b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32052", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15833", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32052\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)\n\ud83d\udd39 Description: A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.\n\ud83d\udccf Published: 2025-04-03T13:37:23.109Z\n\ud83d\udccf Modified: 2025-05-09T20:21:41.858Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:4440\n2. https://access.redhat.com/errata/RHSA-2025:4508\n3. https://access.redhat.com/errata/RHSA-2025:4560\n4. https://access.redhat.com/errata/RHSA-2025:4568\n5. https://access.redhat.com/security/cve/CVE-2025-32052\n6. https://bugzilla.redhat.com/show_bug.cgi?id=2357069", "creation_timestamp": "2025-05-09T20:26:05.000000Z"}, {"uuid": "f272d0e3-699d-46b9-9afb-ae4139860bf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32050", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15835", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32050\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in libsoup. The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read.\n\ud83d\udccf Published: 2025-04-03T13:36:29.141Z\n\ud83d\udccf Modified: 2025-05-09T20:16:05.822Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:4440\n2. https://access.redhat.com/errata/RHSA-2025:4508\n3. https://access.redhat.com/errata/RHSA-2025:4560\n4. https://access.redhat.com/errata/RHSA-2025:4568\n5. https://access.redhat.com/security/cve/CVE-2025-32050\n6. https://bugzilla.redhat.com/show_bug.cgi?id=2357067", "creation_timestamp": "2025-05-09T20:26:07.000000Z"}, {"uuid": "a9ca7870-c637-45c2-8a51-6941db493225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32054", "type": "seen", "source": "https://t.me/cvedetector/22013", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32054 - JetBrains IntelliJ IDEA Source Code Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-32054 \nPublished : April 3, 2025, 5:15 p.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : In JetBrains IntelliJ IDEA before 2024.3, 2024.2.4 source code could be logged in the idea.log file \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T21:55:51.000000Z"}, {"uuid": "3ef595e1-f8de-4477-97c5-46e273453ee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3205", "type": "seen", "source": "https://t.me/cvedetector/22062", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3205 - CodeAstro Student Grading System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3205 \nPublished : April 4, 2025, 3:15 a.m. | 28\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in CodeAstro Student Grading System 1.0. This affects an unknown part of the file studentsubject.php. The manipulation of the argument studentId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T06:18:03.000000Z"}, {"uuid": "1c7c48bf-cfe1-485e-8943-a3545eb2b06c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32051", "type": "seen", "source": "https://t.me/cvedetector/21979", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32051 - Libsoup Data URI Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-32051 \nPublished : April 3, 2025, 2:15 p.m. | 41\u00a0minutes ago \nDescription : A flaw was found in libsoup. The libsoup soup_uri_decode_data_uri() function may crash when processing malformed data URI. This flaw allows an attacker to cause a denial of service (DoS). \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T17:44:32.000000Z"}, {"uuid": "46f1928e-ed10-42df-995c-0335386e160d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32050", "type": "seen", "source": "https://t.me/cvedetector/21978", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32050 - Libsoup Buffer Under-read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32050 \nPublished : April 3, 2025, 2:15 p.m. | 41\u00a0minutes ago \nDescription : A flaw was found in libsoup. The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T17:44:31.000000Z"}, {"uuid": "80beaa8e-3196-4629-b7ff-de817c467961", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32053", "type": "seen", "source": "https://t.me/cvedetector/21976", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32053 - Libsoup Heap Buffer Over-Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32053 \nPublished : April 3, 2025, 2:15 p.m. | 41\u00a0minutes ago \nDescription : A flaw was found in libsoup. A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T17:44:30.000000Z"}, {"uuid": "a12cef7e-968e-4599-8361-da7a21850b7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32052", "type": "seen", "source": "https://t.me/cvedetector/21975", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32052 - Libsoup Heap Buffer Over-Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32052 \nPublished : April 3, 2025, 2:15 p.m. | 41\u00a0minutes ago \nDescription : A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T17:44:26.000000Z"}, {"uuid": "a8a38ba4-91e6-4e9e-90c8-46c60516babd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32056", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-645abf81-6d0121fb06ee9f87", "content": "", "creation_timestamp": "2025-05-14T05:56:35.302686Z"}, {"uuid": "a99334fb-cf5e-4a15-b3a1-ce893c0cc046", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32057", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-645abf81-6d0121fb06ee9f87", "content": "", "creation_timestamp": "2025-05-14T05:56:35.422181Z"}, {"uuid": "80acef7e-e12e-4950-8f60-9b27f38ef367", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32058", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-645abf81-6d0121fb06ee9f87", "content": "", "creation_timestamp": "2025-05-14T05:56:35.518661Z"}, {"uuid": "71bbc39d-4275-4346-b902-72847a6e3d80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32059", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-645abf81-6d0121fb06ee9f87", "content": "", "creation_timestamp": "2025-05-14T05:56:35.617479Z"}, {"uuid": "f0329b34-a669-489f-8ab1-295c8f9180e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-32058", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mez5mclpwi2f", "content": "", "creation_timestamp": "2026-02-16T22:58:28.097141Z"}, {"uuid": "d662d16d-b9e3-4212-b335-235010c853f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-32059", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mez5m4363z2h", "content": "", "creation_timestamp": "2026-02-16T22:58:21.285746Z"}, {"uuid": "a9e49023-c173-467d-aaf6-ca3a17ed6b3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32052", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114274523381930955", "content": "", "creation_timestamp": "2025-04-03T14:34:09.034137Z"}, {"uuid": "85213315-e18f-4a4c-8144-4b4d07a4a29c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32052", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114274523381930955", "content": "", "creation_timestamp": "2025-04-03T14:34:09.035896Z"}, {"uuid": "43307a37-a22b-48e6-997c-1327a949e336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32053", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llw6jwlezr2o", "content": "", "creation_timestamp": "2025-04-03T15:07:15.332747Z"}, {"uuid": "38e16c3e-a7e5-4ee7-b608-6352e2f6afe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32051", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llw6jwqtaw2x", "content": "", "creation_timestamp": "2025-04-03T15:07:15.928035Z"}, {"uuid": "9dc9f9b1-f690-40f8-a9ca-be7576cb87a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32052", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llw6jwxjzp2f", "content": "", "creation_timestamp": "2025-04-03T15:07:17.188461Z"}, {"uuid": "db17ad3c-78dc-4e71-b492-ea38f5bb13b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32050", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llw6jx6sqa24", "content": "", "creation_timestamp": "2025-04-03T15:07:18.298745Z"}, {"uuid": "68427637-87f4-48a9-9d36-ce6638f5cea8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32056", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-d85938e6-e6afb3a032a3100c", "content": "", "creation_timestamp": "2025-04-14T16:51:01.931720Z"}]}