{"vulnerability": "CVE-2025-3029", "sightings": [{"uuid": "93176ec1-7704-4e10-a9a7-7ade0be5e5ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30292", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmdfty7imr2u", "content": "", "creation_timestamp": "2025-04-08T21:22:49.054760Z"}, {"uuid": "c527b6a9-f44d-4a07-b5cc-20eba4507a54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3029", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114262832435614839", "content": "", "creation_timestamp": "2025-04-01T13:00:58.717957Z"}, {"uuid": "6dd476f8-0327-4d53-9de0-ea1cf20b2eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30290", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmdftyfwwd2q", "content": "", "creation_timestamp": "2025-04-08T21:22:50.233015Z"}, {"uuid": "580e5aba-ba32-40e8-b01b-02458e198537", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30291", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmdftyjded25", "content": "", "creation_timestamp": "2025-04-08T21:22:50.857167Z"}, {"uuid": "080b6be1-a69d-4127-8e1a-b2ddd36ad502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30290", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114304544409013946", "content": "", "creation_timestamp": "2025-04-08T21:48:52.560621Z"}, {"uuid": "b80f10ca-764b-4ce5-8c6c-992438cbbfae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30294", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12528", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30294\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. A high-privileged attacker could leverage this vulnerability to bypass security protections and gain unauthorized read access. Exploitation of this issue does not require user interaction and scope is changed.\n\ud83d\udccf Published: 2025-04-08T20:02:57.132Z\n\ud83d\udccf Modified: 2025-04-18T18:13:04.049Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html", "creation_timestamp": "2025-04-18T18:58:51.000000Z"}, {"uuid": "10be492e-1301-491f-8750-360cd53a077d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3029", "type": "seen", "source": "Telegram/GJVVgUMR-Am0a4XNXJB6qKKOPmE9Yn2h83GfAofeQ9CX9UE", "content": "", "creation_timestamp": "2026-04-13T17:54:41.000000Z"}, {"uuid": "b2295f56-68af-4798-8ff8-ef7771034711", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3029", "type": "seen", "source": "Telegram/zhEuVcxahydHqS41CycExp24MVFwtDnEqI06aNRbe3auxBs", "content": "", "creation_timestamp": "2026-04-13T17:54:56.000000Z"}, {"uuid": "932f2b57-5ca2-4bd8-b908-657ac66fcff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30291", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12532", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30291\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. A low privileged attacker with local access could leverage this vulnerability to gain access to sensitive information which could be used to further compromise the system or bypass security mechanisms. Exploitation of this issue does not require user interaction.\n\ud83d\udccf Published: 2025-04-08T20:02:50.968Z\n\ud83d\udccf Modified: 2025-04-18T18:00:49.009Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html", "creation_timestamp": "2025-04-18T18:58:54.000000Z"}, {"uuid": "ffb1e181-e6f3-4851-89c3-a5ffec4ff89b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30290", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15791", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30290\n\ud83d\udd25 CVSS Score: 8.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H)\n\ud83d\udd39 Description: ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vulnerability to bypass security protections and gain unauthorized write and delete access. Exploitation of this issue does not require user interaction and scope is changed.\n\ud83d\udccf Published: 2025-04-08T20:02:59.926Z\n\ud83d\udccf Modified: 2025-05-09T16:26:11.696Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html", "creation_timestamp": "2025-05-09T17:25:57.000000Z"}, {"uuid": "29839c95-c0c7-4337-a0f9-8d6057af1845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30293", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12529", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30293\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. A high-privileged attacker could leverage this vulnerability to bypass security protections and gain unauthorized write access. Exploitation of this issue does not require user interaction and scope is changed.\n\ud83d\udccf Published: 2025-04-08T20:03:01.634Z\n\ud83d\udccf Modified: 2025-04-18T18:10:30.172Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html", "creation_timestamp": "2025-04-18T18:58:52.000000Z"}, {"uuid": "8ed57fde-2239-4298-843d-b01f6f1bc22c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30290", "type": "seen", "source": "https://t.me/cvedetector/22524", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30290 - ColdFusion Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30290 \nPublished : April 8, 2025, 8:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. An attacker could exploit this vulnerability to access files and directories that are stored outside the intended restricted directory. Exploitation of this issue requires user interaction. \nSeverity: 8.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T00:02:56.000000Z"}, {"uuid": "19ea2379-2323-4a6a-8fd4-aa9e41f8c03c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30298", "type": "seen", "source": "https://t.me/cvedetector/22507", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30298 - Adobe Framemaker Stack-based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30298 \nPublished : April 8, 2025, 7:15 p.m. | 18\u00a0minutes ago \nDescription : Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:31.000000Z"}, {"uuid": "07a21569-5f81-4df5-9fa1-4f39fbc6a520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30294", "type": "seen", "source": "https://t.me/cvedetector/22520", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30294 - ColdFusion Improper Input Validation Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30294 \nPublished : April 8, 2025, 8:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T00:02:50.000000Z"}, {"uuid": "e09d827a-52bb-45c7-98a5-595810acfcec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30295", "type": "seen", "source": "https://t.me/cvedetector/22506", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30295 - Adobe Framemaker Heap-based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-30295 \nPublished : April 8, 2025, 7:15 p.m. | 18\u00a0minutes ago \nDescription : Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:27.000000Z"}, {"uuid": "ec6abcd2-87bc-48c5-b354-8e014c6962c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30297", "type": "seen", "source": "https://t.me/cvedetector/22505", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30297 - Adobe Framemaker Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30297 \nPublished : April 8, 2025, 7:15 p.m. | 18\u00a0minutes ago \nDescription : Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:27.000000Z"}, {"uuid": "6b6cdedf-1f45-4617-a119-a342ebc9abbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30296", "type": "seen", "source": "https://t.me/cvedetector/22504", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30296 - Adobe Framemaker Integer Underflow Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-30296 \nPublished : April 8, 2025, 7:15 p.m. | 18\u00a0minutes ago \nDescription : Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:26.000000Z"}, {"uuid": "2367526f-611d-4b38-987c-16a843f69a92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30299", "type": "seen", "source": "https://t.me/cvedetector/22498", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30299 - Adobe Framemaker Heap-based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30299 \nPublished : April 8, 2025, 7:15 p.m. | 18\u00a0minutes ago \nDescription : Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:18.000000Z"}, {"uuid": "d378c7be-8ab1-4b8c-92a5-bb8c291e95c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30293", "type": "seen", "source": "https://t.me/cvedetector/22519", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30293 - ColdFusion Improper Input Validation Security Feature Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-30293 \nPublished : April 8, 2025, 8:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T00:02:50.000000Z"}, {"uuid": "86e3ea70-6e90-49ce-a3d1-0dc6d1478538", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30292", "type": "seen", "source": "https://t.me/cvedetector/22518", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30292 - Adobe ColdFusion Reflected Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30292 \nPublished : April 8, 2025, 8:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T00:02:49.000000Z"}, {"uuid": "a5f79803-e7dc-4f69-9970-91baed5d7260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30291", "type": "seen", "source": "https://t.me/cvedetector/22517", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30291 - Adobe ColdFusion Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30291 \nPublished : April 8, 2025, 8:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to gain access to sensitive information which could be used to further compromise the system or bypass security mechanisms. Exploitation of this issue does not require user interaction. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T00:02:48.000000Z"}]}