{"vulnerability": "CVE-2025-3074", "sightings": [{"uuid": "5785c501-ac61-4965-8433-099eba740802", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3074", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "a6c2619e-fe60-477d-8957-40124f5548a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30741", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llalqxpiyx26", "content": "", "creation_timestamp": "2025-03-26T01:05:15.273580Z"}, {"uuid": "53e2b9b9-3c12-4be1-b310-1402c478b7d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30741", "type": "seen", "source": "https://bsky.app/profile/yamarten.bsky.social/post/3lm2vixoucs2c", "content": "", "creation_timestamp": "2025-04-05T12:08:54.865555Z"}, {"uuid": "be65e34e-bc3d-4952-a1e1-97bd0e49f185", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30741", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lm4etv2ihs2q", "content": "", "creation_timestamp": "2025-04-06T02:16:07.442714Z"}, {"uuid": "ee35a165-d708-419e-9deb-c567946d6a36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3074", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfj27thy24", "content": "", "creation_timestamp": "2025-04-02T03:01:25.819160Z"}, {"uuid": "e9e319d6-7897-45d3-b745-9fde13942fbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3074", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3llx554hd5w2i", "content": "", "creation_timestamp": "2025-04-04T00:14:47.713383Z"}, {"uuid": "41c4138d-268b-49ec-b837-729227ec7f04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30749", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lyxq2pyesc22", "content": "", "creation_timestamp": "2025-09-16T16:21:03.066766Z"}, {"uuid": "00ac158e-3ef6-40a8-9601-72e596a74c8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30749", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3m6kvfwdsyo25", "content": "", "creation_timestamp": "2025-11-26T22:23:17.748907Z"}, {"uuid": "be0a70f3-2538-4eef-b140-50e47a25cf91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30749", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3luss7ib4t227", "content": "", "creation_timestamp": "2025-07-25T19:35:25.287592Z"}, {"uuid": "90408ae0-8719-44eb-a723-3a6b7ab97ba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30740", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:57.000000Z"}, {"uuid": "39566fa1-1aa0-4a7b-878a-fed02bad5e1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30740", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:41.000000Z"}, {"uuid": "d1457333-e554-4c74-ad01-20ba203cd261", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30749", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lunprrecq223", "content": "", "creation_timestamp": "2025-07-23T19:08:39.371439Z"}, {"uuid": "cbf06235-23bc-4702-9750-ea0c1fb550e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-30749", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0315/", "content": "", "creation_timestamp": "2026-03-18T00:00:00.000000Z"}, {"uuid": "dcaf55b2-ba13-4569-8779-7f1a7d263d13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30749", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3m6kutniokc2l", "content": "", "creation_timestamp": "2025-11-26T22:13:04.036135Z"}, {"uuid": "984bfcae-9513-4d47-a8d8-b668a883df53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30749", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3maejvlprok2h", "content": "", "creation_timestamp": "2025-12-19T20:31:49.423653Z"}, {"uuid": "f8504db6-ae2d-4d34-a8fe-b0f059d7977d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30749", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3maejvmtxl42c", "content": "", "creation_timestamp": "2025-12-19T20:31:55.858179Z"}, {"uuid": "bf637289-0c3a-4328-b9a2-4feeabce4840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30749", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3maejvmzx5o2t", "content": "", "creation_timestamp": "2025-12-19T20:31:56.877793Z"}, {"uuid": "5f90b413-67f3-49d5-a9ed-e45b5ee5e4ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30742", "type": "seen", "source": "https://t.me/cvedetector/21147", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30742 - Apache atophttpd Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-30742 \nPublished : March 26, 2025, 4:15 a.m. | 2\u00a0hours, 13\u00a0minutes ago \nDescription : httpd.c in atophttpd 2.8.0 has an off-by-one error and resultant out-of-bounds read because a certain 1024-character req string would not have a final '\\0' character. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T08:01:58.000000Z"}, {"uuid": "b130a501-8b3a-4b2d-88b8-24fb2c5b17b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30749", "type": "published-proof-of-concept", "source": "Telegram/XiVibqPdaU-x_KxdI2FLNgF4J_RC02_jDbQsHz1BA_zuEAs", "content": "", "creation_timestamp": "2025-11-23T09:00:06.000000Z"}, {"uuid": "4a678011-294d-43d0-a6d2-bf1206467dbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30749", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/60543", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aI have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749.\nURL\uff1ahttps://github.com/rashedhasan090/AegisJava\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-23T05:33:52.000000Z"}, {"uuid": "a95a9d98-a62e-4f46-ad35-8865282cc1c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30742", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8799", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30742\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: httpd.c in atophttpd 2.8.0 has an off-by-one error and resultant out-of-bounds read because a certain 1024-character req string would not have a final '\\0' character.\n\ud83d\udccf Published: 2025-03-26T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T04:11:30.931Z\n\ud83d\udd17 References:\n1. https://github.com/pizhenwei/atophttpd/blob/74c9f14796b15dc9de5839a5749202f933937a9c/httpd.c#L71-L72\n2. https://github.com/pizhenwei/atophttpd/blob/74c9f14796b15dc9de5839a5749202f933937a9c/httpd.c#L492-L496\n3. https://github.com/pizhenwei/atophttpd/blob/74c9f14796b15dc9de5839a5749202f933937a9c/httpd.c#L376-L399", "creation_timestamp": "2025-03-26T04:25:36.000000Z"}, {"uuid": "bc0200f3-be1a-4318-a6c6-a0f3f5218370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30741", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8769", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30741\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Pixelfed before 0.12.5 allows anyone to follow private accounts and see private posts on other Fediverse servers. This affects users elsewhere in the Fediverse, if they otherwise have any followers from a Pixelfed instance.\n\ud83d\udccf Published: 2025-03-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T20:57:41.881Z\n\ud83d\udd17 References:\n1. https://fokus.cool/2025/03/25/pixelfed-vulnerability.html\n2. https://github.com/pixelfed/pixelfed/releases/tag/v0.12.5\n3. https://mastodon.social/@pixelfed/114215925957179498\n4. https://news.ycombinator.com/item?id=43474425", "creation_timestamp": "2025-03-25T21:25:14.000000Z"}, {"uuid": "15ee27d7-df7c-46a4-bae9-587d503922e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30741", "type": "seen", "source": "https://t.me/cvedetector/21122", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30741 - Pixelfed Fediverse Server Private Account Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-30741 \nPublished : March 25, 2025, 9:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Pixelfed before 0.12.5 allows anyone to follow private accounts and see private posts on other Fediverse servers. This affects users elsewhere in the Fediverse, if they otherwise have any followers from a Pixelfed instance. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T23:40:33.000000Z"}, {"uuid": "9589c234-915c-40a6-aeed-2ca2a1a9a8a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-30749", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0292/", "content": "", "creation_timestamp": "2026-03-13T00:00:00.000000Z"}, {"uuid": "8d83466e-650e-489c-adbf-9be2b894dde5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30740", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11908", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30740\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC).  Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).\n\ud83d\udccf Published: 2025-04-15T20:31:20.966Z\n\ud83d\udccf Modified: 2025-04-15T20:31:20.966Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-15T20:55:09.000000Z"}, {"uuid": "f323517f-6c2a-478e-b3b0-53730cb3f2f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3074", "type": "seen", "source": "https://t.me/cvedetector/21835", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3074 - Google Chrome UI Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3074 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Inappropriate implementation in Downloads in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:07:03.000000Z"}]}