{"vulnerability": "CVE-2025-2990", "sightings": [{"uuid": "c6a4bded-5dfc-410a-895b-141cce4bca10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29907", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114185162030536607", "content": "", "creation_timestamp": "2025-03-18T19:48:22.211532Z"}, {"uuid": "97011cb3-d236-461e-a830-319a5f90a23c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29907", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkoii2imsy26", "content": "", "creation_timestamp": "2025-03-18T20:18:44.151704Z"}, {"uuid": "b5e76ed2-4582-425d-9244-8f956618ec26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29909", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114180582366575557", "content": "", "creation_timestamp": "2025-03-18T00:23:42.144970Z"}, {"uuid": "9af31f9d-9293-4bc1-a4a1-3f3bf1635445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29905", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-385/", "content": "", "creation_timestamp": "2025-06-16T03:00:00.000000Z"}, {"uuid": "c2f0320b-8a15-4682-9077-2dcef29b7b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114427071199222062", "content": "", "creation_timestamp": "2025-04-30T13:09:03.064629Z"}, {"uuid": "957b940b-e5b7-4c4b-b4a0-5ab562ed35ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29905", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-112-01", "content": "", "creation_timestamp": "2025-04-22T10:00:00.000000Z"}, {"uuid": "09451143-197c-4632-9ef6-a966b92750d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114423922060759169", "content": "", "creation_timestamp": "2025-04-29T23:48:13.886588Z"}, {"uuid": "b8e1174b-0e9d-4c5b-ab6e-3e0f508526c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnyhw3fwmw24", "content": "", "creation_timestamp": "2025-04-29T23:50:50.495087Z"}, {"uuid": "2ad97978-dad3-4927-ac70-b1f2755cadeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lo3f6lra6e23", "content": "", "creation_timestamp": "2025-05-01T03:39:49.856459Z"}, {"uuid": "0b9f234a-6f92-47be-85b8-f14e3bd01f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lo3zep6x3z2u", "content": "", "creation_timestamp": "2025-05-01T09:41:09.060574Z"}, {"uuid": "5ce4c8a6-6f78-4ca6-ae69-8a07f4073047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29908", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9752", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29908\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Netty QUIC codec is a QUIC codec for netty which makes use of quiche. An issue was discovered in the codec. A hash collision vulnerability (in the hash map used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs). This vulnerability is fixed in 0.0.71.Final.\n\ud83d\udccf Published: 2025-03-31T18:43:44.172Z\n\ud83d\udccf Modified: 2025-03-31T18:43:44.172Z\n\ud83d\udd17 References:\n1. https://github.com/netty/netty-incubator-codec-quic/security/advisories/GHSA-hqqc-jr88-p6x2\n2. https://github.com/netty/netty-incubator-codec-quic/commit/e059bd9b78723f8b035e0c547e42ce263f03461c\n3. https://github.com/ncc-pbottine/QUIC-Hash-Dos-Advisory", "creation_timestamp": "2025-03-31T19:31:17.000000Z"}, {"uuid": "2abe452e-b5e3-45a4-bdd7-b807414c54fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "Telegram/nG2kdAsSMNJFnQuBB8eLNRFNXLlpnIS3vQaD1YGco_2LIks", "content": "", "creation_timestamp": "2025-06-13T10:32:05.000000Z"}, {"uuid": "1fec572f-ce73-495e-88bb-800a9a1b29b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29907", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7953", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29907\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: jsPDF is a library to generate PDFs in JavaScript. Prior to 3.0.1, user control of the first argument of the addImage method results in CPU utilization and denial of service. If given the possibility to pass unsanitised image urls to the addImage method, a user can provide a harmful data-url that results in high CPU utilization and denial of service. Other affected methods are html and addSvgAsImage. The vulnerability was fixed in jsPDF 3.0.1.\n\ud83d\udccf Published: 2025-03-18T18:40:57.504Z\n\ud83d\udccf Modified: 2025-03-18T18:40:57.504Z\n\ud83d\udd17 References:\n1. https://github.com/parallax/jsPDF/security/advisories/GHSA-w532-jxjh-hjhj\n2. https://github.com/parallax/jsPDF/commit/b167c43c27c466eb914b927885b06073708338df", "creation_timestamp": "2025-03-18T19:02:41.000000Z"}, {"uuid": "02c11e21-e654-4beb-8880-07b0263a2b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrif4ccs5z2r", "content": "", "creation_timestamp": "2025-06-13T11:58:43.869547Z"}, {"uuid": "e66280a8-9013-4599-8898-5527e49d2fdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29904", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}, {"uuid": "bc3ced8a-34cd-4f09-b291-bb3cd14d9c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29903", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}, {"uuid": "f1296db5-1e4a-4418-b01e-74d00d281025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29904", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7295", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29904\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: In JetBrains Ktor before 3.1.1 an HTTP Request Smuggling was possible\n\ud83d\udccf Published: 2025-03-12T12:36:15.812Z\n\ud83d\udccf Modified: 2025-03-12T13:15:49.900Z\n\ud83d\udd17 References:\n1. https://www.jetbrains.com/privacy-security/issues-fixed/", "creation_timestamp": "2025-03-12T13:41:38.000000Z"}, {"uuid": "f1127051-c59c-4c4d-bc27-38a0d913a9e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18286", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29902\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Remote code execution that allows unauthorized users to execute arbitrary code on the server machine.\n\ud83d\udccf Published: 2025-06-13T09:23:49.631Z\n\ud83d\udccf Modified: 2025-06-13T09:23:49.631Z\n\ud83d\udd17 References:\n1. https://psirt.bosch.com/security-advisories/BOSCH-SA-992447.html", "creation_timestamp": "2025-06-13T09:34:41.000000Z"}, {"uuid": "d3ba65e1-d602-43d1-8477-45432e458a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2990", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9626", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2990\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects some unknown processing of the file /goform/AdvSetWrlGstset of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-31T10:00:13.250Z\n\ud83d\udccf Modified: 2025-03-31T10:00:13.250Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302039\n2. https://vuldb.com/?ctiid.302039\n3. https://vuldb.com/?submit.523404\n4. https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-AdvSetWrlGstset-1bc53a41781f8057a621c3def0a56069?pvs=4\n5. https://www.tenda.com.cn/", "creation_timestamp": "2025-03-31T10:30:33.000000Z"}, {"uuid": "027a95cf-702a-437b-a6a0-e3a49231e33d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://t.me/cvedetector/24059", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29906 - Finit TTY Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29906 \nPublished : April 29, 2025, 11:16 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation of getty for the `tty` configuration directive that can bypass `/bin/login`, i.e., a user can log in as any user without authentication. This issue has been patched in version 4.11. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T03:42:20.000000Z"}, {"uuid": "aba4462b-4f86-4cf6-a3bd-0e2015f7bd22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2990", "type": "seen", "source": "https://t.me/cvedetector/21569", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2990 - Tenda FH1202 Web Management Interface Unauthenticated Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2990 \nPublished : March 31, 2025, 10:15 a.m. | 32\u00a0minutes ago \nDescription : A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects some unknown processing of the file /goform/AdvSetWrlGstset of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T13:20:15.000000Z"}, {"uuid": "47334b43-2292-48e7-b8cb-bbf51671415a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29907", "type": "seen", "source": "https://t.me/cvedetector/20600", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29907 - jsPDF CPU Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29907 \nPublished : March 18, 2025, 7:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : jsPDF is a library to generate PDFs in JavaScript. Prior to 3.0.1, user control of the first argument of the addImage method results in CPU utilization and denial of service. If given the possibility to pass unsanitised image urls to the addImage method, a user can provide a harmful data-url that results in high CPU utilization and denial of service. Other affected methods are html and addSvgAsImage. The vulnerability was fixed in jsPDF 3.0.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T21:55:33.000000Z"}, {"uuid": "2f43a20f-0fc8-4cf8-aa2f-503d3ff95f07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "published-proof-of-concept", "source": "Telegram/VXRJJzicS6h8NsLqawa6xGEeyKGpqGgMZmK2-Vj4U4LCCLc", "content": "", "creation_timestamp": "2025-04-30T01:00:20.000000Z"}, {"uuid": "f90cbd3b-65ed-4629-9e9c-2550d64f5cf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29908", "type": "seen", "source": "https://t.me/cvedetector/21656", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29908 - Netty QUIC Hash Collision Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-29908 \nPublished : March 31, 2025, 7:15 p.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : Netty QUIC codec is a QUIC codec for netty which makes use of quiche. An issue was discovered in the codec. A hash collision vulnerability (in the hash map used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs). This vulnerability is fixed in 0.0.71.Final. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T23:24:01.000000Z"}]}