{"vulnerability": "CVE-2025-2151", "sightings": [{"uuid": "28faf634-79ad-4f55-b724-f66e9a14263c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21510", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrnarp7l2n", "content": "", "creation_timestamp": "2025-01-21T21:17:11.376941Z"}, {"uuid": "26ed4988-a1f3-4e66-a459-ea0a605ad653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21511", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrndblai2j", "content": "", "creation_timestamp": "2025-01-21T21:17:13.987764Z"}, {"uuid": "3a085c09-c7b2-495a-9b51-6aba8c88dc97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21512", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrnfs2532h", "content": "", "creation_timestamp": "2025-01-21T21:17:16.727743Z"}, {"uuid": "5bb970f3-46ba-43f7-9149-f0e1b82d8e17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21513", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrniafkq2t", "content": "", "creation_timestamp": "2025-01-21T21:17:19.237633Z"}, {"uuid": "b3af693c-e074-4a52-b54f-90f335926061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21514", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrnkmvbx2j", "content": "", "creation_timestamp": "2025-01-21T21:17:21.642633Z"}, {"uuid": "421f16cc-41f1-4f63-9d38-922aea484e29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21515", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrnmxfy32h", "content": "", "creation_timestamp": "2025-01-21T21:17:24.149352Z"}, {"uuid": "d6c6971c-dbfc-4ba9-a8dc-5379ec2ffc88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21516", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrnpdwj62f", "content": "", "creation_timestamp": "2025-01-21T21:17:26.696735Z"}, {"uuid": "467871c4-c284-4ca1-87a4-5d3f64ef44bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21517", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrnrzfiz2w", "content": "", "creation_timestamp": "2025-01-21T21:17:29.462425Z"}, {"uuid": "aa6c5216-2f4d-4bac-9d93-2553835c0d93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21518", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrnuaxvo2f", "content": "", "creation_timestamp": "2025-01-21T21:17:31.856417Z"}, {"uuid": "7df0fdce-8c2f-49c3-9a0b-ff28c0b19dd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21519", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrnwr63c2e", "content": "", "creation_timestamp": "2025-01-21T21:17:34.651573Z"}, {"uuid": "0ba40b2e-7c1f-4d5b-aa7d-bd90a2627477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21516", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113868546710583802", "content": "", "creation_timestamp": "2025-01-21T21:48:56.004230Z"}, {"uuid": "1d67bad0-0848-4c27-aab0-1a2db5eebb6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21515", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113868546656745677", "content": "", "creation_timestamp": "2025-01-21T21:48:56.909801Z"}, {"uuid": "95f8f59c-1bc2-4d12-804a-410d9922dedb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21515", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgbuclsr5f2e", "content": "", "creation_timestamp": "2025-01-21T22:04:59.357173Z"}, {"uuid": "63ccdebe-bdc2-4814-9e1d-8d45a3f24259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21516", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgbucm6i632u", "content": "", "creation_timestamp": "2025-01-21T22:05:01.331537Z"}, {"uuid": "eeb6dd83-df41-4172-a335-0a1813ca1cc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2151", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115967546585034449", "content": "", "creation_timestamp": "2026-01-27T14:32:11.947485Z"}, {"uuid": "2c6582eb-c134-4cea-aadb-d85acfe24378", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2151", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116006091122241082", "content": "", "creation_timestamp": "2026-02-03T09:54:35.143581Z"}, {"uuid": "5e8ba2ad-bea3-44db-afe8-ea2095fda617", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2151", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115718420525322650", "content": "", "creation_timestamp": "2025-12-14T14:36:09.871359Z"}, {"uuid": "b1a39f76-b3ad-4dc9-b6bd-92d184252d1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2151", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljzv7ipdxd2k", "content": "", "creation_timestamp": "2025-03-10T15:40:33.477943Z"}, {"uuid": "53aace69-52d8-490e-807f-fdad53f08316", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2151", "type": "seen", "source": "https://t.me/cvedetector/19962", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2151 - Assimp Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2151 \nPublished : March 10, 2025, 1:15 p.m. | 1\u00a0hour, 57\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::GetNextLine in the library ParsingUtils.h of the component File Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T16:32:01.000000Z"}, {"uuid": "382ec664-10a4-4cfc-9d62-77bc933b12f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21518", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2614", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21518\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2025-01-21T20:53:03.419Z\n\ud83d\udccf Modified: 2025-01-22T18:39:20.152Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-01-22T19:02:51.000000Z"}, {"uuid": "8481fb3f-0d69-4f12-8b5a-e158bea51e95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21510", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2745", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21510\n\ud83d\udd39 Description: Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC).  Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\n\ud83d\udccf Published: 2025-01-21T20:52:59.628Z\n\ud83d\udccf Modified: 2025-01-23T15:58:32.436Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-01-23T16:02:45.000000Z"}, {"uuid": "c3632a36-0ddc-4e0b-b394-6f93663c0d1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21516", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2620", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21516\n\ud83d\udd39 Description: Vulnerability in the Oracle Customer Care product of Oracle E-Business Suite (component: Service Requests).  Supported versions that are affected are 12.2.5-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Customer Care.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Customer Care accessible data as well as  unauthorized access to critical data or complete access to all Oracle Customer Care accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).\n\ud83d\udccf Published: 2025-01-21T20:53:02.395Z\n\ud83d\udccf Modified: 2025-01-22T18:32:05.932Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-01-22T19:02:59.000000Z"}, {"uuid": "13dceaac-b1d4-4f3a-804c-8371aa1af73b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21519", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2615", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21519\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2025-01-21T20:53:03.812Z\n\ud83d\udccf Modified: 2025-01-22T18:38:29.588Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-01-22T19:02:52.000000Z"}, {"uuid": "5ace5a4d-88a6-4c3c-841c-c32ba034710e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21511", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2756", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21511\n\ud83d\udd39 Description: Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC).  Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\n\ud83d\udccf Published: 2025-01-21T20:53:00.184Z\n\ud83d\udccf Modified: 2025-01-23T15:46:54.768Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-01-23T16:03:03.000000Z"}, {"uuid": "31510020-620a-42be-8f64-def235dc0f11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2151", "type": "published-proof-of-concept", "source": "Telegram/ZnLAONHM-PgwZEAsQHJGebsJeCjoYOkosWDCK_ygNfTn0kU", "content": "", "creation_timestamp": "2025-03-10T20:42:01.000000Z"}, {"uuid": "124e80d9-2655-4a34-ac2f-bc7c634eedad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21512", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2758", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21512\n\ud83d\udd39 Description: Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC).  Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\n\ud83d\udccf Published: 2025-01-21T20:53:00.554Z\n\ud83d\udccf Modified: 2025-01-23T15:46:23.974Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-01-23T16:03:05.000000Z"}, {"uuid": "cbd7a66a-2e71-4b2b-b3ff-3ee0658693c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2151", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6992", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2151\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::GetNextLine in the library ParsingUtils.h of the component File Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-10T13:00:07.622Z\n\ud83d\udccf Modified: 2025-03-10T13:35:30.577Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299062\n2. https://vuldb.com/?ctiid.299062\n3. https://vuldb.com/?submit.510582\n4. https://github.com/assimp/assimp/issues/6016\n5. https://github.com/assimp/assimp/issues/6026\n6. https://github.com/sae-as-me/Crashes/raw/refs/heads/main/assimp/assimp_crash_1", "creation_timestamp": "2025-03-10T13:39:15.000000Z"}, {"uuid": "aec88461-6825-45d4-8390-831b76b6debc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21515", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5250", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21515\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC).  Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n\ud83d\udccf Published: 2025-01-21T20:53:01.910Z\n\ud83d\udccf Modified: 2025-02-25T04:55:10.137Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-02-25T05:24:14.000000Z"}]}