{"vulnerability": "CVE-2025-0306", "sightings": [{"uuid": "010d77a1-f274-4e93-bf62-9f3cb96a4341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0306", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113796449520188963", "content": "", "creation_timestamp": "2025-01-09T04:13:39.826001Z"}, {"uuid": "ba8db3f1-f696-4ffa-8f19-16236a027f73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0306", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfbsxybuwd2f", "content": "", "creation_timestamp": "2025-01-09T04:15:53.852981Z"}, {"uuid": "bf623273-df92-4565-bab8-ad9cc17c45d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0306", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfbuawpptc2y", "content": "", "creation_timestamp": "2025-01-09T04:38:48.801924Z"}, {"uuid": "404c4626-66c4-4d2e-b802-9f7fe15debf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0306", "type": "seen", "source": "https://t.me/cvedetector/14769", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0306 - Ruby RSASSA-PSS Implementation Forgery and Decryption\", \n  \"Content\": \"CVE ID : CVE-2025-0306 \nPublished : Jan. 9, 2025, 4:15 a.m. | 38\u00a0minutes ago \nDescription : A vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Marvin Attack. This attack allows the attacker to decrypt previously encrypted messages or forge signatures by exchanging a large number of messages with the vulnerable service. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T06:02:40.000000Z"}, {"uuid": "a7e5dcc3-f623-44ff-93e9-792a5ea74cec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0306", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4942", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0306\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Marvin Attack. This attack allows the attacker to decrypt previously encrypted messages or forge signatures by exchanging a large number of messages with the vulnerable service.\n\ud83d\udccf Published: 2025-01-09T04:05:42.194Z\n\ud83d\udccf Modified: 2025-02-21T18:03:34.267Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-0306\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2336100", "creation_timestamp": "2025-02-21T18:18:56.000000Z"}, {"uuid": "4e35a9d0-d970-4685-ba7b-3c60ad17d27b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0306", "type": "seen", "source": "Telegram/orHfN9iURPgbf5_TRp1ZrcAP6UlCotnDHzRFOOskz-xdlp0", "content": "", "creation_timestamp": "2025-01-09T05:30:30.000000Z"}]}