{"vulnerability": "CVE-2025-1993", "sightings": [{"uuid": "274d4a62-b8a4-4aac-8b11-61473ff02716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1993", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loqzm2ehkqa2", "content": "", "creation_timestamp": "2025-05-09T18:13:42.684393Z"}, {"uuid": "2ffb7bef-e9f2-470b-b64d-88bf0e44272b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1993", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loqzvtus4fq2", "content": "", "creation_timestamp": "2025-05-09T18:21:32.632345Z"}, {"uuid": "942103f0-ae5a-4349-be52-ec0c4c7a8a9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1993", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lori5n4lwd2n", "content": "", "creation_timestamp": "2025-05-09T22:31:32.767260Z"}, {"uuid": "4290a1a2-a4e6-4db1-a804-f1dc02104a24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1993", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15774", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1993\n\ud83d\udd25 CVSS Score: 5.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: BM App Connect Enterprise Certified Container 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8, 12.9, and 12.10 DesignerAuthoring instances store their flows in a database that is protected by weaker than expected cryptographic algorithms that could be decrypted by a local user.\n\ud83d\udccf Published: 2025-05-09T17:12:10.041Z\n\ud83d\udccf Modified: 2025-05-09T17:12:10.041Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7233054", "creation_timestamp": "2025-05-09T17:25:36.000000Z"}, {"uuid": "040e94b4-d4dd-44b3-bcfd-e3e5efe52c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1993", "type": "seen", "source": "https://t.me/cvedetector/24975", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1993 - IBM App Connect Enterprise Certified Container Cryptographic Weakness\", \n  \"Content\": \"CVE ID : CVE-2025-1993 \nPublished : May 9, 2025, 6:16 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : IBM App Connect Enterprise Certified Container 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8, 12.9, and 12.10 DesignerAuthoring instances store their flows in a database that is protected by weaker than expected cryptographic algorithms that could be decrypted by a local user. \nSeverity: 5.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T22:54:06.000000Z"}]}