{"vulnerability": "CVE-2025-0404", "sightings": [{"uuid": "da2ddd17-8c71-4df6-99e9-146fee1739b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0404", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lflkqtpot42p", "content": "", "creation_timestamp": "2025-01-13T01:15:21.601361Z"}, {"uuid": "25dea716-e276-49f8-88af-8816319c5065", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0404", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lflmc32jbc2b", "content": "", "creation_timestamp": "2025-01-13T01:42:54.437415Z"}, {"uuid": "37f1c99f-abf1-43bf-a995-45d3b6767500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0404", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113818242834218345", "content": "", "creation_timestamp": "2025-01-13T00:35:59.505848Z"}, {"uuid": "8486c22c-f1c0-4d37-97cd-7321700d5db3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0404", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1346", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0404\n\ud83d\udd39 Description: A vulnerability has been found in liujianview gymxmjpa 1.0 and classified as critical. This vulnerability affects the function CoachController of the file src/main/java/com/liujian/gymxmjpa/controller/CoachController.java. The manipulation of the argument coachName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-01-13T00:31:04.945Z\n\ud83d\udccf Modified: 2025-01-13T00:31:04.945Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.291280\n2. https://vuldb.com/?ctiid.291280\n3. https://vuldb.com/?submit.473385\n4. https://github.com/liujianview/gymxmjpa/issues/2\n5. https://github.com/liujianview/gymxmjpa/issues/2#issue-2765760967", "creation_timestamp": "2025-01-13T01:09:13.000000Z"}, {"uuid": "9c5c1eb7-e82d-4e23-adda-34b28d8487ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0404", "type": "seen", "source": "https://t.me/cvedetector/15113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0404 - Liujianview Gymxmjpa SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0404 \nPublished : Jan. 13, 2025, 1:15 a.m. | 36\u00a0minutes ago \nDescription : A vulnerability has been found in liujianview gymxmjpa 1.0 and classified as critical. This vulnerability affects the function CoachController of the file src/main/java/com/liujian/gymxmjpa/controller/CoachController.java. The manipulation of the argument coachName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T02:51:42.000000Z"}]}