{"vulnerability": "CVE-2025-2756", "sightings": [{"uuid": "9e48ed34-e505-4ed9-8f7a-d21ba95ad19d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2756", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll747pe3bj2s", "content": "", "creation_timestamp": "2025-03-25T10:54:27.471352Z"}, {"uuid": "e4a8e105-d540-4ea5-9eb4-74b28579d46b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27563", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr46pjiwfo2e", "content": "", "creation_timestamp": "2025-06-08T15:32:15.813018Z"}, {"uuid": "06fe0bed-9971-4d91-b6c1-8ae298d486ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27566", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpj7bwaamv62", "content": "", "creation_timestamp": "2025-05-19T08:56:56.637266Z"}, {"uuid": "2ad3b069-5fc2-4c7e-b91d-888522a28f1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27565", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "a2981001-61c9-4814-b3d9-6937139bac39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27568", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "986efd91-1196-41ac-af1d-e5fccbd9000e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27561", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "65fa98b7-a6f6-44b7-bb3e-0b878abeba4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-27562", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/9d7fef5d-952d-4ecc-880d-94d02304e7a3", "content": "", "creation_timestamp": "2025-07-30T07:59:24.597474Z"}, {"uuid": "b9405aa3-cc11-4797-9bf0-b9d81454b7ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27566", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpnmwf7x6k24", "content": "", "creation_timestamp": "2025-05-21T03:11:31.409334Z"}, {"uuid": "2f986efc-a620-466d-aa84-6e667da72f7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27564", "type": "seen", "source": "https://infosec.place/objects/9b20d8a2-c575-410b-bac3-961774fd4ff5", "content": "", "creation_timestamp": "2025-08-20T13:30:11.092036Z"}, {"uuid": "f953cf09-ddbc-46fd-aa6b-9b0f5418b923", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2756", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8640", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2756\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::AC3DImporter::ConvertObjectSection of the file code/AssetLib/AC/ACLoader.cpp of the component AC3D File Handler. The manipulation of the argument tmp leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-25T09:31:04.310Z\n\ud83d\udccf Modified: 2025-03-25T09:31:04.310Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300861\n2. https://vuldb.com/?ctiid.300861\n3. https://vuldb.com/?submit.517790\n4. https://github.com/assimp/assimp/issues/6018\n5. https://github.com/assimp/assimp/issues/6018#issue-2877375815", "creation_timestamp": "2025-03-25T10:24:30.000000Z"}, {"uuid": "0e110d41-3eec-4781-8d7e-1b8a2ccf74e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27567", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9287", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27567\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Cross-site scripting vulnerability exists in the NickName registration screen of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the configuration page or functions accessible only from the LAN side of the product.\n\ud83d\udccf Published: 2025-03-28T08:17:54.622Z\n\ud83d\udccf Modified: 2025-03-28T08:17:54.622Z\n\ud83d\udd17 References:\n1. https://kddi-tech.com/contents/appendix_L2_06.html#64433e4a-8946-9c06-bddf-91cbfe56c8e5\n2. https://jvn.jp/en/jp/JVN04278547/", "creation_timestamp": "2025-03-28T08:27:31.000000Z"}, {"uuid": "6c6bcbbd-3924-4158-9792-8d0ddfc56dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27561", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11954", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27561\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Unauthenticated attackers can rename \"rooms\" of arbitrary users.\n\ud83d\udccf Published: 2025-04-15T21:55:20.141Z\n\ud83d\udccf Modified: 2025-04-15T21:55:20.141Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "creation_timestamp": "2025-04-15T22:56:01.000000Z"}, {"uuid": "236437c1-c1c1-416f-a915-5065a72e1935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27567", "type": "seen", "source": "https://t.me/cvedetector/21383", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27567 - HGW-BL1500HM Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-27567 \nPublished : March 28, 2025, 9:15 a.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Cross-site scripting vulnerability exists in the NickName registration screen of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the configuration page or functions accessible only from the LAN side of the product. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T11:53:21.000000Z"}, {"uuid": "5af7ad21-84e2-4b5f-ae8f-5ee52f675b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2756", "type": "seen", "source": "https://t.me/cvedetector/21087", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2756 - \"Assimp AC3D File Handler Heap-Based Buffer Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2756 \nPublished : March 25, 2025, 10:15 a.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::AC3DImporter::ConvertObjectSection of the file code/AssetLib/AC/ACLoader.cpp of the component AC3D File Handler. The manipulation of the argument tmp leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T13:38:27.000000Z"}, {"uuid": "b22bd994-edbd-486e-a4fd-658eea6c1097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2756", "type": "published-proof-of-concept", "source": "Telegram/KKNSfhz-mhha5P6fDB5hkKZz3e-3yzTpgadHwHFP70I_DHE", "content": "", "creation_timestamp": "2025-03-25T11:01:05.000000Z"}]}