{"vulnerability": "CVE-2025-2310", "sightings": [{"uuid": "0b02dd5c-f879-41c8-938a-22e04dc89be4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23108", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113807654381603787", "content": "", "creation_timestamp": "2025-01-11T03:43:12.348906Z"}, {"uuid": "d0c3de4f-065e-453b-8885-e05664c2dc53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23109", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113807654396857326", "content": "", "creation_timestamp": "2025-01-11T03:43:12.721444Z"}, {"uuid": "5c84155b-34e3-40fd-9466-f52d8ff096a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23108", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfgtuxarmf2f", "content": "", "creation_timestamp": "2025-01-11T04:15:24.413674Z"}, {"uuid": "9c5179b1-e552-4fa4-9dd7-516c6484de01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23109", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfgtv3mhqx2d", "content": "", "creation_timestamp": "2025-01-11T04:15:28.955747Z"}, {"uuid": "c2d814e6-8c8e-4313-9ce3-20ba7ad2102f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23109", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfgvhob4lw25", "content": "", "creation_timestamp": "2025-01-11T04:43:46.435484Z"}, {"uuid": "b2c8e29b-c267-4443-b45e-29655fce80c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23108", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfgvhosjb22i", "content": "", "creation_timestamp": "2025-01-11T04:43:47.686101Z"}, {"uuid": "bb39bf72-b381-4468-8af7-a3ba9970a254", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23108", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113810387676919180", "content": "", "creation_timestamp": "2025-01-11T15:18:21.365835Z"}, {"uuid": "302f0b84-4c80-4f78-a7c7-db221fc5d3c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23109", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113810387676919180", "content": "", "creation_timestamp": "2025-01-11T15:18:21.413045Z"}, {"uuid": "e2b7ec21-3e86-492c-b63d-770238c37d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23105", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqng2mppc7y2", "content": "", "creation_timestamp": "2025-06-02T18:34:17.017643Z"}, {"uuid": "091b3afa-b183-4911-bca9-f6679ac31d11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2310", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkevuh2umt2w", "content": "", "creation_timestamp": "2025-03-15T00:51:33.544304Z"}, {"uuid": "08ccc011-028c-439f-9ece-f8fa2cbeac5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23102", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqq7yvmilo2o", "content": "", "creation_timestamp": "2025-06-03T21:23:27.467752Z"}, {"uuid": "6a13c970-842f-421f-aa2d-dc25d603261a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23100", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqqaqaxmy32a", "content": "", "creation_timestamp": "2025-06-03T21:36:31.084795Z"}, {"uuid": "687a9821-30c1-4e99-a5ec-1a6155041b57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23103", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqprqfftny2o", "content": "", "creation_timestamp": "2025-06-03T17:08:09.451666Z"}, {"uuid": "9f19d2d6-5a8a-4385-b7e0-7bd2afd3339c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23103", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqppv7xd6fa2", "content": "", "creation_timestamp": "2025-06-03T16:37:20.704658Z"}, {"uuid": "2ee45128-5063-423c-9cdc-8d3afae22383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23106", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqs6l3psyv62", "content": "", "creation_timestamp": "2025-06-04T16:03:17.379425Z"}, {"uuid": "b0d7fce2-85c5-42b1-8682-636a2a8234fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23101", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqs6lbcbnwg2", "content": "", "creation_timestamp": "2025-06-04T16:03:50.751854Z"}, {"uuid": "1509b2d2-94f4-49c8-bf8d-cb87478cedc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23102", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqq77zpe3u2a", "content": "", "creation_timestamp": "2025-06-03T21:09:32.928803Z"}, {"uuid": "772cae74-f1ef-42cf-b896-3e9010ac8ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23107", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqpydmlmd72m", "content": "", "creation_timestamp": "2025-06-03T19:06:17.046615Z"}, {"uuid": "f73b4a29-e6b9-4eaf-a4c5-7cbe3f2b851a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2310", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7643", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2310\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor was contacted early about a batch of vulnerabilities. His response was \"reject\" without further explanation. We have not received an elaboration even after asking politely for further details. Currently we assume that the vendor wants to \"dispute\" the entries which is why they are flagged as such until further details become available.\n\ud83d\udccf Published: 2025-03-14T21:00:09.852Z\n\ud83d\udccf Modified: 2025-03-14T21:00:09.852Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299723\n2. https://vuldb.com/?ctiid.299723\n3. https://vuldb.com/?submit.514533\n4. https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md", "creation_timestamp": "2025-03-14T21:44:52.000000Z"}, {"uuid": "ffc72f18-e261-4309-b2c1-cfbd33e7d909", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2310", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15500", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2310\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor plans to fix this issue in an upcoming release.\n\ud83d\udccf Published: 2025-03-14T21:00:09.852Z\n\ud83d\udccf Modified: 2025-05-08T08:59:00.157Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299723\n2. https://vuldb.com/?ctiid.299723\n3. https://vuldb.com/?submit.514533\n4. https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md", "creation_timestamp": "2025-05-08T09:23:41.000000Z"}, {"uuid": "0bd82dca-e9e4-43d4-91e0-36a592dbf058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23109", "type": "seen", "source": "https://t.me/cvedetector/15035", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23109 - Firefox for iOS DNS Spoofing\", \n  \"Content\": \"CVE ID : CVE-2025-23109 \nPublished : Jan. 11, 2025, 4:15 a.m. | 19\u00a0minutes ago \nDescription : Long hostnames in URLs could be leveraged to obscure the actual host of the website or spoof the website address This vulnerability affects Firefox for iOS &lt; 134. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T05:43:35.000000Z"}, {"uuid": "58ea6eb0-a1e6-4a6f-bab2-f0c5a668fc11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2310", "type": "seen", "source": "https://t.me/cvedetector/20344", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2310 - HDF5 Heap-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2310 \nPublished : March 14, 2025, 9:15 p.m. | 23\u00a0minutes ago \nDescription : A vulnerability was found in HDF5 1.14.6 and classified as critical. This issue affects the function H5MM_strndup of the component Metadata Attribute Decoder. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor was contacted early about a batch of vulnerabilities. His response was \"reject\" without further explanation. We have not received an elaboration even after asking politely for further details. Currently we assume that the vendor wants to \"dispute\" the entries which is why they are flagged as such until further details become available. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T23:24:25.000000Z"}, {"uuid": "17c854af-ff10-41ff-a526-fb2fb2806100", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23108", "type": "seen", "source": "https://t.me/cvedetector/15034", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23108 - Firefox for iOS Tab Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23108 \nPublished : Jan. 11, 2025, 4:15 a.m. | 19\u00a0minutes ago \nDescription : Opening Javascript links in a new tab via long-press in the Firefox iOS client could result in a malicious script spoofing the URL of the new tab. This vulnerability affects Firefox for iOS &lt; 134. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T05:43:34.000000Z"}]}