{"vulnerability": "CVE-2025-29972", "sightings": [{"uuid": "eb15e5b3-d656-4da8-ab37-5ce256c26c0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114474625505155153", "content": "", "creation_timestamp": "2025-05-08T22:42:44.355437Z"}, {"uuid": "dc543649-66fb-4709-9fa8-46c426e01ee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3looxxas4n3t2", "content": "", "creation_timestamp": "2025-05-08T23:15:38.752563Z"}, {"uuid": "5c1b6b7c-4509-4615-91f0-7557f25bff72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lop6ww6esc24", "content": "", "creation_timestamp": "2025-05-09T00:41:27.019219Z"}, {"uuid": "8cd78636-1b1f-40de-b3de-15b194822746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0156", "content": "", "creation_timestamp": "2025-05-13T17:10:10.000000Z"}, {"uuid": "9103afa4-94c2-40ad-9558-7c4457042fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-299729", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0156", "content": "", "creation_timestamp": "2025-05-13T17:10:10.000000Z"}, {"uuid": "5d4948c7-c523-4d28-9472-b1d7cb3797e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "40e5e4b9-7612-40c7-9124-f20f935c17fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15633", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29972\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C)\n\ud83d\udd39 Description: Server-Side Request Forgery (SSRF) in Azure allows an authorized attacker to perform spoofing over a network.\n\ud83d\udccf Published: 2025-05-08T22:17:24.266Z\n\ud83d\udccf Modified: 2025-05-08T22:17:24.266Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29972", "creation_timestamp": "2025-05-08T22:25:02.000000Z"}, {"uuid": "97970c27-6634-4376-8ad1-8c3d5973be4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "published-proof-of-concept", "source": "Telegram/g7PPXzsQx3EvDhE5SPzBeDUjd4Cr-dmtNyjjylDsMmWuZRM", "content": "", "creation_timestamp": "2025-06-09T15:00:10.000000Z"}, {"uuid": "fee66c18-05c4-4306-8aa3-7a5f9ee2c6e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/24537", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-29927 Proof of Concept \nURL\uff1ahttps://github.com/ThemeHackers/CVE-2025-29972\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-25T18:01:52.000000Z"}, {"uuid": "0aade7b7-ed96-4cca-96ad-bcc6e32c4ce6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "seen", "source": "https://t.me/cvedetector/24879", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29972 - Azure SSRF Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29972 \nPublished : May 8, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Server-Side Request Forgery (SSRF) in Azure allows an authorized attacker to perform spoofing over a network. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T01:59:33.000000Z"}, {"uuid": "f1985cc5-7ea8-4338-8f3c-fa6b735cf360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "published-proof-of-concept", "source": "Telegram/QQZulGQZ-c3MpjwEQ4QFRhKUiBHZ2y5K88-7UD6uVG6sxDc", "content": "", "creation_timestamp": "2025-03-26T04:00:07.000000Z"}, {"uuid": "57ec768e-28c3-4d89-a1ef-8632f2690130", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29972", "type": "published-proof-of-concept", "source": "Telegram/Oj1Gm0LSQ6zMYq9CDOc6JWlWhSvAkbg9hPN2p7tpqu4VtaY", "content": "", "creation_timestamp": "2025-03-25T22:00:06.000000Z"}]}