{"vulnerability": "CVE-2025-3033", "sightings": [{"uuid": "bad37dfe-b873-478f-af4c-730bfd7baf8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30334", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114196834383227856", "content": "", "creation_timestamp": "2025-03-20T21:16:48.285464Z"}, {"uuid": "3b86f2e5-a416-4b5c-abee-6f15916d510d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30334", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lktznltcph26", "content": "", "creation_timestamp": "2025-03-21T01:09:14.777190Z"}, {"uuid": "65d1b283-924c-47d9-b3ac-e5ba76f82c62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3033", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114262832435614839", "content": "", "creation_timestamp": "2025-04-01T13:00:58.890895Z"}, {"uuid": "e6295c75-bbb3-4faf-9022-64c5ddcbbe96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30334", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8304", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30334\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: In OpenBSD 7.6 before errata 006 and OpenBSD 7.5 before errata 015, traffic sent over wg(4) could result in kernel crash.\n\ud83d\udccf Published: 2025-03-20T20:39:16.232Z\n\ud83d\udccf Modified: 2025-03-20T21:58:11.624Z\n\ud83d\udd17 References:\n1. https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/006_wg.patch.sig\n2. https://ftp.openbsd.org/pub/OpenBSD/patches/7.5/common/015_wg.patch.sig\n3. https://github.com/openbsd/src/commit/c06199859734d958552a581d72b4c0f910e68d7c", "creation_timestamp": "2025-03-20T22:18:58.000000Z"}, {"uuid": "f4efdcd8-d215-4271-b26b-d1937bfc1288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3033", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114262832435614839", "content": "", "creation_timestamp": "2025-04-01T13:00:58.841860Z"}, {"uuid": "5ebc5947-33dc-4194-9716-8d0176a204c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30333", "type": "seen", "source": "https://bsky.app/profile/stringsvsatoms.bsky.social/post/3lzxifkd5qj2k", "content": "", "creation_timestamp": "2025-09-29T07:29:06.220996Z"}, {"uuid": "1a00a12e-92e1-402c-b071-f07675ebf1b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3033", "type": "seen", "source": "Telegram/zhEuVcxahydHqS41CycExp24MVFwtDnEqI06aNRbe3auxBs", "content": "", "creation_timestamp": "2026-04-13T17:54:56.000000Z"}, {"uuid": "fe9e3c7a-835b-451c-bacc-d2ea7e064fc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30330", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp32wuo3gar2", "content": "", "creation_timestamp": "2025-05-13T18:11:21.455950Z"}, {"uuid": "3953a13a-80c7-4b79-95e7-05f89bbb2fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30330", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3eafh2ou2w", "content": "", "creation_timestamp": "2025-05-13T20:48:15.116484Z"}, {"uuid": "1daedb74-7bf1-4143-a623-1c0437d7ff5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30333", "type": "seen", "source": "https://bsky.app/profile/horxi.bsky.social/post/3lzxazq4cs22c", "content": "", "creation_timestamp": "2025-09-29T05:17:14.257250Z"}, {"uuid": "c57b07b3-ac83-41ed-a2be-d49073f91bd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30333", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3m5jnjq7nyr2i", "content": "", "creation_timestamp": "2025-11-13T17:04:24.488700Z"}, {"uuid": "2c27e37c-8980-43e2-815c-e308607c970d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30330", "type": "seen", "source": "https://t.me/cvedetector/25227", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30330 - Adobe Illustrator Heap-based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30330 \nPublished : May 13, 2025, 6:15 p.m. | 59\u00a0minutes ago \nDescription : Illustrator versions 29.3, 28.7.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:33.000000Z"}, {"uuid": "7fe0c68c-9b6c-4b76-8ee7-01938df04291", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30334", "type": "seen", "source": "Telegram/ovgSwv4DzH1i4cBEpy04O7HypJ1JWUd5CIOMvicaoyVyycE", "content": "", "creation_timestamp": "2025-03-20T22:30:49.000000Z"}, {"uuid": "127b58e3-d339-4830-a8a1-42fab31efbcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30334", "type": "seen", "source": "https://t.me/cvedetector/20771", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30334 - OpenBSD wg(4) Kernel Crash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30334 \nPublished : March 20, 2025, 9:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : In OpenBSD 7.6 before errata 006 and OpenBSD 7.5 before errata 015, traffic sent over wg(4) could result in kernel crash. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T00:05:37.000000Z"}]}