{"vulnerability": "CVE-2025-1471", "sightings": [{"uuid": "a6b9f0d6-54f7-4bb6-8ad7-903e1a9cffab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-14713", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3ma6tnfqhia2p", "content": "", "creation_timestamp": "2025-12-17T14:10:07.825701Z"}, {"uuid": "a1a76df3-55a9-4865-b2e0-ad13456465be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-14711", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115719765309665560", "content": "", "creation_timestamp": "2025-12-14T20:18:09.624803Z"}, {"uuid": "f15add6c-da01-41c4-92dc-ef75c16ec6fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-14716", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhfytvmznw2v", "content": "", "creation_timestamp": "2026-03-19T12:28:13.642869Z"}, {"uuid": "1878b087-f88f-4af5-8afd-9ce278c95103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-14715", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3matzuukeyk2c", "content": "", "creation_timestamp": "2025-12-26T00:27:49.511967Z"}, {"uuid": "3a81b88d-bd0a-4652-b17f-22543a20944c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-14719", "type": "seen", "source": "https://gist.github.com/Darkcrai86/e24f6927cb477df0a70907605ddbb879", "content": "", "creation_timestamp": "2026-01-07T10:51:41.000000Z"}, {"uuid": "cc8b9ce6-90e2-42e2-8083-4b6642cd5b85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-14719", "type": "seen", "source": "https://gist.github.com/Darkcrai86/2743e480dc6150b6d27f749a50b270f9", "content": "", "creation_timestamp": "2026-01-07T08:28:21.000000Z"}, {"uuid": "b242922e-d783-4925-b36c-c60e8596f2a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-14716", "type": "seen", "source": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-14716", "content": "", "creation_timestamp": "2026-03-19T10:16:14.000000Z"}, {"uuid": "1ffd5778-4ed2-43f8-bce5-2201a284a05c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1471", "type": "seen", "source": "https://t.me/cvedetector/18640", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1471 - Eclipse OMR z/OS atoe Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-1471 \nPublished : Feb. 21, 2025, 10:15 a.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : In Eclipse OMR versions 0.2.0 to 0.4.0, some of the z/OS atoe print functions use a constant length buffer for string conversion. If the input format string and arguments are larger than the buffer size then buffer overflow occurs.  Beginning in version 0.5.0, the conversion buffers are sized correctly and checked appropriately to prevent buffer overflows. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T13:55:26.000000Z"}, {"uuid": "4f518347-11e2-472e-9cf8-d419b85a50e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1471", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4867", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1471\n\ud83d\udd25 CVSS Score: 7.1 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: In Eclipse OMR versions 0.2.0 to 0.4.0, some of the z/OS atoe print functions use a constant length buffer for string conversion. If the input format string and arguments are larger than the buffer size then buffer overflow occurs.  Beginning in version 0.5.0, the conversion buffers are sized correctly and checked appropriately to prevent buffer overflows.\n\ud83d\udccf Published: 2025-02-21T10:07:22.507Z\n\ud83d\udccf Modified: 2025-02-21T10:07:22.507Z\n\ud83d\udd17 References:\n1. https://github.com/eclipse-omr/omr/pull/7658\n2. https://gitlab.eclipse.org/security/cve-assignement/-/issues/55", "creation_timestamp": "2025-02-21T10:20:14.000000Z"}, {"uuid": "afbcd759-d6a3-4237-9b94-07bd9f10712b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1471", "type": "seen", "source": "Telegram/jZQIbMs2DbG9JBp1YH8MfngIE4kAZSbjbJPZ9v5HwjLx6Cdb", "content": "", "creation_timestamp": "2025-03-06T02:16:33.000000Z"}, {"uuid": "45d10ab1-be54-4adb-a56a-f8794ccf327c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1471", "type": "seen", "source": "Telegram/FX-LaAuoFezZjcu7p1t9tn8bxFxlND6mTDiYThP2jxUViiw9", "content": "", "creation_timestamp": "2025-02-21T12:35:18.000000Z"}, {"uuid": "805251e6-e0a9-4c99-bdc1-6728950d7693", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1471", "type": "published-proof-of-concept", "source": "Telegram/Ay0rbN3NTGvA3dFYzqIN1XCtTL5zwn7Ti8rLPuZyspWq6eE", "content": "", "creation_timestamp": "2025-02-21T12:00:33.000000Z"}]}