{"vulnerability": "CVE-2025-2983", "sightings": [{"uuid": "81534876-389d-4d31-a1cf-c54d3a0c1f92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29834", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmlt6qu6ch2c", "content": "", "creation_timestamp": "2025-04-12T05:42:40.024534Z"}, {"uuid": "a041be54-42d8-4a5b-8d92-79c52cff2038", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29837", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-293/", "content": "", "creation_timestamp": "2025-05-21T03:00:00.000000Z"}, {"uuid": "02e296ca-93ce-471f-92dc-77bb765ab23e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29833", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "97a273ba-bc0c-4c72-86cb-a60ee9e9fe8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29831", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114501744986577244", "content": "", "creation_timestamp": "2025-05-13T17:39:34.480765Z"}, {"uuid": "0adca6fa-6c2c-4bc6-a1cd-aedeef7d4c74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29834", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmxemwwvdc2c", "content": "", "creation_timestamp": "2025-04-16T19:54:07.592161Z"}, {"uuid": "91b2f572-b641-42df-9caa-7e4ae09a2a46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29830", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "cf717a68-685d-4131-9486-79916f51e622", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29831", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "0764f536-68a8-4c16-b2c1-72b4f1feb7d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29838", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "fc44dc30-6ab1-4843-81c1-51e8fbce50fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29837", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "6bd0cd69-59df-4782-9fdd-fe16bd1f3834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29835", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "a1e33052-5872-4310-9d66-47dccc2e41c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29832", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "c8dab8e4-9539-4b02-aee7-613435bd0eca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29839", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "2d808711-0f01-4e81-872a-9f4eb7d65e75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29836", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "f7e01189-8327-4469-b6e4-015598c58ce4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29831", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpagrncz4c2h", "content": "", "creation_timestamp": "2025-05-15T21:17:00.188039Z"}, {"uuid": "445e3186-792e-4da1-8947-d127bb07994f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29834", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11766", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29834\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Out-of-bounds read in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-04-12T01:32:47.350Z\n\ud83d\udccf Modified: 2025-04-15T03:56:07.418Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29834", "creation_timestamp": "2025-04-15T04:54:12.000000Z"}, {"uuid": "0f8b3770-acde-44cf-be19-84935ef7c642", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2983", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9617", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2983\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in Legrand SMS PowerView 1.x and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument redirect leads to os command injection. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-31T08:00:08.861Z\n\ud83d\udccf Modified: 2025-03-31T08:00:08.861Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302035\n2. https://vuldb.com/?ctiid.302035", "creation_timestamp": "2025-03-31T08:30:25.000000Z"}, {"uuid": "f6eb8947-c368-4525-82fd-7f0971c9f9cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29832", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16191", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29832\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.\n\ud83d\udccf Published: 2025-05-13T16:58:58.027Z\n\ud83d\udccf Modified: 2025-05-13T18:08:13.561Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832", "creation_timestamp": "2025-05-13T18:31:00.000000Z"}, {"uuid": "85f050ab-4dd7-452b-94af-52e7dd6868a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29830", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16189", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29830\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.\n\ud83d\udccf Published: 2025-05-13T16:58:56.830Z\n\ud83d\udccf Modified: 2025-05-13T18:09:02.620Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830", "creation_timestamp": "2025-05-13T18:30:58.000000Z"}, {"uuid": "f5ba7e41-3d55-4e21-b2bb-db165b24c67c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29831", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29831\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-05-13T16:58:57.400Z\n\ud83d\udccf Modified: 2025-05-13T18:08:39.064Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29831", "creation_timestamp": "2025-05-13T18:30:59.000000Z"}, {"uuid": "55edd248-1239-4580-a90a-f0bdf6c6c3af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2983", "type": "seen", "source": "https://t.me/cvedetector/21562", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2983 - \"Legrand SMS PowerView OS Command Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2983 \nPublished : March 31, 2025, 8:15 a.m. | 32\u00a0minutes ago \nDescription : A vulnerability has been found in Legrand SMS PowerView 1.x and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument redirect leads to os command injection. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T10:49:38.000000Z"}, {"uuid": "39a28dad-dacb-4579-adf5-b7ea5daa12a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29834", "type": "seen", "source": "https://t.me/cvedetector/22789", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29834 - Microsoft Edge (Chromium-based) Out-of-bounds Read Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-29834 \nPublished : April 12, 2025, 2:15 a.m. | 2\u00a0hours, 6\u00a0minutes ago \nDescription : Out-of-bounds read in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-12T06:39:53.000000Z"}]}