{"vulnerability": "CVE-2025-2999", "sightings": [{"uuid": "459a9f34-989f-4b5a-b350-40cd107494cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29991", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llvdotk6hx2f", "content": "", "creation_timestamp": "2025-04-03T07:06:47.223563Z"}, {"uuid": "61d87d3b-e267-4bf4-ab11-3f6ee2efdab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29994", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114155279058410374", "content": "", "creation_timestamp": "2025-03-13T13:08:44.243434Z"}, {"uuid": "8f33b3c5-6ddc-4060-b7c8-2eef186b8592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29997", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114155279058410374", "content": "", "creation_timestamp": "2025-03-13T13:08:44.479160Z"}, {"uuid": "c8f532d0-fbb1-4308-a63b-7b901889ae09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29995", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114155279058410374", "content": "", "creation_timestamp": "2025-03-13T13:08:44.321678Z"}, {"uuid": "605d1798-5e86-4194-a379-638d74ef2472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29998", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114155279058410374", "content": "", "creation_timestamp": "2025-03-13T13:08:44.550121Z"}, {"uuid": "bf9572d1-96ae-4c38-be82-b5a21fd5ee5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29996", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114155279058410374", "content": "", "creation_timestamp": "2025-03-13T13:08:44.402492Z"}, {"uuid": "bdc0d2fc-f830-4257-a7c4-5f9b03224326", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29993", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llkjloo3l22b", "content": "", "creation_timestamp": "2025-03-29T23:53:04.292162Z"}, {"uuid": "2caee73e-1be2-415f-8a9b-b6ea7590ea04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29998", "type": "seen", "source": "https://t.me/cvedetector/20213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29998 - CAP Back Office Application OTP Bombing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29998 \nPublished : March 13, 2025, 12:15 p.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : This vulnerability exists in the CAP back office application due to missing rate limiting on OTP requests in an API endpoint. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoint which could lead to the OTP bombing/flooding on the targeted system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T15:37:07.000000Z"}, {"uuid": "313c5fcb-84af-4767-92f7-22b67cabcef0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29999", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-01", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "38d339ec-c8b3-4193-99f0-80db6d2e14ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29997", "type": "seen", "source": "https://t.me/cvedetector/20212", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29997 - Apache CAP Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-29997 \nPublished : March 13, 2025, 12:15 p.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : This vulnerability exists in the CAP back office application due to improper authorization checks on certain API endpoints. An authenticated remote attacker could exploit this vulnerability by manipulating API request URL to gain unauthorized access to other user accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T15:37:06.000000Z"}, {"uuid": "66d854f9-b720-42b4-90d6-896366e70bb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29997", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7475", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29997\n\ud83d\udd25 CVSS Score: 8.2 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N)\n\ud83d\udd39 Description: This vulnerability exists in the CAP back office application due to improper authorization checks on certain API endpoints. An authenticated remote attacker could exploit this vulnerability by manipulating API request URL to gain unauthorized access to other user accounts.\n\ud83d\udccf Published: 2025-03-13T11:21:17.016Z\n\ud83d\udccf Modified: 2025-03-13T19:34:11.857Z\n\ud83d\udd17 References:\n1. https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&amp;VLCODE=CIVN-2025-0048", "creation_timestamp": "2025-03-13T19:42:33.000000Z"}, {"uuid": "e7fa33e5-72c9-4303-841c-d2e0535a8b30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29995", "type": "seen", "source": "https://t.me/cvedetector/20215", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29995 - Apache CAP Weak Password Reset Remote Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-29995 \nPublished : March 13, 2025, 12:15 p.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : This vulnerability exists in the CAP back office application due to a weak password-reset mechanism implemented at API endpoints. An authenticated remote attacker with a valid login ID could exploit this vulnerability through vulnerable API endpoint which could lead to account takeover of targeted users. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T15:37:09.000000Z"}, {"uuid": "a3cd1e55-2820-498f-885c-6bfbdd55271a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29994", "type": "seen", "source": "https://t.me/cvedetector/20214", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29994 - Apache CAP Unauthenticated API Access\", \n  \"Content\": \"CVE ID : CVE-2025-29994 \nPublished : March 13, 2025, 12:15 p.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : This vulnerability exists in the CAP back office application due to improper authentication check at the API endpoint. An unauthenticated remote attacker with a valid login ID could exploit this vulnerability by manipulating API input parameters through API request URL/payload leading to unauthorized access to other user accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T15:37:08.000000Z"}, {"uuid": "d3ea629c-cdb1-418c-a357-63c03e7dc727", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29996", "type": "seen", "source": "https://t.me/cvedetector/20216", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29996 - \"CAP Back Office API Bypass Two-Factor Authentication\"\", \n  \"Content\": \"CVE ID : CVE-2025-29996 \nPublished : March 13, 2025, 12:15 p.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API based login. A remote attacker with valid credentials could exploit this vulnerability by manipulating API request URL/payload. Successful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T15:37:12.000000Z"}, {"uuid": "da472951-fb4b-4b2e-b805-c031bc2faab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29993", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9035", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29993\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The affected versions of PowerCMS allow HTTP header injection. This vulnerability can be leveraged to direct the affected product to send email with a tampered URL, such as password reset mail.\n\ud83d\udccf Published: 2025-03-27T09:06:53.028Z\n\ud83d\udccf Modified: 2025-03-27T09:06:53.028Z\n\ud83d\udd17 References:\n1. https://www.powercms.jp/news/release-powercms-661-528-459.html\n2. https://jvn.jp/en/jp/JVN39026557/", "creation_timestamp": "2025-03-27T09:26:57.000000Z"}, {"uuid": "17929bd1-2a12-413a-95ab-675dc0f506f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29998", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7477", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29998\n\ud83d\udd25 CVSS Score: 8.2 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: This vulnerability exists in the CAP back office application due to missing rate limiting on OTP requests in an API endpoint. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoint which could lead to the OTP bombing/flooding on the targeted system.\n\ud83d\udccf Published: 2025-03-13T11:23:57.998Z\n\ud83d\udccf Modified: 2025-03-13T19:33:09.748Z\n\ud83d\udd17 References:\n1. https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&amp;VLCODE=CIVN-2025-0048", "creation_timestamp": "2025-03-13T19:42:37.000000Z"}, {"uuid": "7c8df025-2fa9-4c41-9a56-1e96cdc712c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29993", "type": "seen", "source": "https://t.me/cvedetector/21272", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29993 - PowerCMS HTTP Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29993 \nPublished : March 27, 2025, 10:15 a.m. | 1\u00a0hour, 10\u00a0minutes ago \nDescription : The affected versions of PowerCMS allow HTTP header injection. This vulnerability can be leveraged to direct the affected product to send email with a tampered URL, such as password reset mail. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T12:28:06.000000Z"}, {"uuid": "ddaad11e-3d69-4b41-b41a-a0543d40cffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29991", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10156", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29991\n\ud83d\udd25 CVSS Score: 2.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Yubico YubiKey 5.4.1 through 5.7.3 before 5.7.4 has an incorrect FIDO CTAP PIN/UV Auth Protocol Two implementation. It uses the signature length from CTAP PIN/UV Auth Protocol One, even when CTAP PIN/UV Auth Protocol Two was chosen, resulting in a partial signature verification.\n\ud83d\udccf Published: 2025-04-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-03T02:00:20.791Z\n\ud83d\udd17 References:\n1. https://www.yubico.com/support/security-advisories/ysa-2025-02/", "creation_timestamp": "2025-04-03T02:35:05.000000Z"}, {"uuid": "713ec6bc-5f86-4966-bcfa-aa8f95f4fd6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2999", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9677", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2999\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-31T14:31:04.982Z\n\ud83d\udccf Modified: 2025-03-31T15:15:18.302Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302048\n2. https://vuldb.com/?ctiid.302048\n3. https://vuldb.com/?submit.524198\n4. https://github.com/pytorch/pytorch/issues/149622\n5. https://github.com/pytorch/pytorch/issues/149622#issue-2935495265", "creation_timestamp": "2025-03-31T15:31:12.000000Z"}, {"uuid": "f2266700-3d89-4a2c-9979-3ba54586a0c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29999", "type": "seen", "source": "https://t.me/cvedetector/22442", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29999 - Siemens License Server (SLS) Path Traversal Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-29999 \nPublished : April 8, 2025, 9:15 a.m. | 2\u00a0hours, 10\u00a0minutes ago \nDescription : A vulnerability has been identified in Siemens License Server (SLS) (All versions &lt; V4.3). The affected application searches for executable files in the application folder without proper validation.  \nThis could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T13:59:50.000000Z"}, {"uuid": "2b3a7d7c-d291-481f-8154-a03e17a543d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2999", "type": "seen", "source": "https://t.me/cvedetector/21627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2999 - PyTorch Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2999 \nPublished : March 31, 2025, 3:15 p.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T19:12:38.000000Z"}, {"uuid": "a44e61c0-b504-4329-a1c4-6190347308b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29991", "type": "seen", "source": "https://t.me/cvedetector/21941", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29991 - Yubico YubiKey FIDO CTAP PIN/UV Auth Protocol Two Signature Verification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29991 \nPublished : April 3, 2025, 3:15 a.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : Yubico YubiKey 5.4.1 through 5.7.3 before 5.7.4 has an incorrect FIDO CTAP PIN/UV Auth Protocol Two implementation. It uses the signature length from CTAP PIN/UV Auth Protocol One, even when CTAP PIN/UV Auth Protocol Two was chosen, resulting in a partial signature verification. \nSeverity: 2.2 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T06:52:24.000000Z"}, {"uuid": "24fd7064-eed4-472c-a403-24a7f579ac8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29994", "type": "seen", "source": "Telegram/xe2ey9QZy3C60YFmNe9CqutD_cHb7CC1cr5CKlx9gtbgm3M", "content": "", "creation_timestamp": "2025-03-13T13:31:52.000000Z"}, {"uuid": "76218a3c-dfb4-4bbb-9158-d13e5080cb43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29997", "type": "seen", "source": "Telegram/xe2ey9QZy3C60YFmNe9CqutD_cHb7CC1cr5CKlx9gtbgm3M", "content": "", "creation_timestamp": "2025-03-13T13:31:52.000000Z"}, {"uuid": "1e6fcce0-04b0-4b5f-b824-143bcaff6053", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29996", "type": "seen", "source": "Telegram/xe2ey9QZy3C60YFmNe9CqutD_cHb7CC1cr5CKlx9gtbgm3M", "content": "", "creation_timestamp": "2025-03-13T13:31:52.000000Z"}, {"uuid": "7f337b79-20d9-4b87-a165-4a11b8be7cef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29995", "type": "seen", "source": "Telegram/xe2ey9QZy3C60YFmNe9CqutD_cHb7CC1cr5CKlx9gtbgm3M", "content": "", "creation_timestamp": "2025-03-13T13:31:52.000000Z"}]}