{"vulnerability": "CVE-2025-29906", "sightings": [{"uuid": "09451143-197c-4632-9ef6-a966b92750d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114423922060759169", "content": "", "creation_timestamp": "2025-04-29T23:48:13.886588Z"}, {"uuid": "b8e1174b-0e9d-4c5b-ab6e-3e0f508526c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnyhw3fwmw24", "content": "", "creation_timestamp": "2025-04-29T23:50:50.495087Z"}, {"uuid": "c2f0320b-8a15-4682-9077-2dcef29b7b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114427071199222062", "content": "", "creation_timestamp": "2025-04-30T13:09:03.064629Z"}, {"uuid": "2ad97978-dad3-4927-ac70-b1f2755cadeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lo3f6lra6e23", "content": "", "creation_timestamp": "2025-05-01T03:39:49.856459Z"}, {"uuid": "0b9f234a-6f92-47be-85b8-f14e3bd01f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lo3zep6x3z2u", "content": "", "creation_timestamp": "2025-05-01T09:41:09.060574Z"}, {"uuid": "027a95cf-702a-437b-a6a0-e3a49231e33d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://t.me/cvedetector/24059", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29906 - Finit TTY Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29906 \nPublished : April 29, 2025, 11:16 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation of getty for the `tty` configuration directive that can bypass `/bin/login`, i.e., a user can log in as any user without authentication. This issue has been patched in version 4.11. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T03:42:20.000000Z"}, {"uuid": "2f43a20f-0fc8-4cf8-aa2f-503d3ff95f07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "published-proof-of-concept", "source": "Telegram/VXRJJzicS6h8NsLqawa6xGEeyKGpqGgMZmK2-Vj4U4LCCLc", "content": "", "creation_timestamp": "2025-04-30T01:00:20.000000Z"}]}