{"vulnerability": "CVE-2025-3114", "sightings": [{"uuid": "90928ff2-2d8a-451e-8ca9-577361b26c32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3114", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114309318425843110", "content": "", "creation_timestamp": "2025-04-09T18:02:58.485198Z"}, {"uuid": "3cfa2ab1-fc09-4129-8e10-4d95d9bb3378", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31143", "type": "seen", "source": "https://infosec.place/objects/e330efb1-ca61-407a-bbde-18287fbb706e", "content": "", "creation_timestamp": "2025-08-20T13:30:52.489428Z"}, {"uuid": "4c8a5f5d-7689-4be3-86f1-15ba359b8c01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3114", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmj7apczyr2h", "content": "", "creation_timestamp": "2025-04-11T04:40:31.384788Z"}, {"uuid": "c525b2bc-32e6-4dcf-b4a5-329793792639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3114", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lmjic73lps2x", "content": "", "creation_timestamp": "2025-04-11T07:22:27.876708Z"}, {"uuid": "6b30085d-1643-4f92-9404-24e6340db8d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3114", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmrp4rip622n", "content": "", "creation_timestamp": "2025-04-14T13:45:57.275521Z"}, {"uuid": "c5bb3c54-7397-443c-a42e-e8b159827926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31147", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "7249e6d7-b47e-4a5b-b106-04c9084baec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31147", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmv5o34luq2c", "content": "", "creation_timestamp": "2025-04-15T22:44:14.338287Z"}, {"uuid": "91a1cb51-bcea-4ac1-9422-574c5008ebff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31144", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lntu45sfq72y", "content": "", "creation_timestamp": "2025-04-28T03:45:38.781163Z"}, {"uuid": "f42ea563-ba49-496f-8132-cb0966253581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31144", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13645", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31144\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: Quick Agent V3 and Quick Agent V2 contain an issue with improper restriction of communication channel to intended endpoints. If exploited, a remote unauthenticated attacker may attempt to log in to an arbitrary host via Windows system where the product is running.\n\ud83d\udccf Published: 2025-04-27T23:57:01.057Z\n\ud83d\udccf Modified: 2025-04-27T23:57:01.057Z\n\ud83d\udd17 References:\n1. https://mfp-support.sios.jp/hc/ja/articles/45853460006937\n2. https://siosapps.sios.jp/agent_info/20250425001.html\n3. https://jvn.jp/en/jp/JVN82536398/", "creation_timestamp": "2025-04-28T00:10:35.000000Z"}, {"uuid": "fbd193c6-6569-4760-82fb-11c0df5974a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31140", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9062", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31140\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: In JetBrains TeamCity before 2025.03 stored XSS was possible on Cloud Profiles page\n\ud83d\udccf Published: 2025-03-27T11:24:31.181Z\n\ud83d\udccf Modified: 2025-03-27T11:24:31.181Z\n\ud83d\udd17 References:\n1. https://www.jetbrains.com/privacy-security/issues-fixed/", "creation_timestamp": "2025-03-27T12:26:16.000000Z"}, {"uuid": "04d25227-7ec7-4601-8e84-49bb134ae4cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31141", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9061", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31141\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: In JetBrains TeamCity before 2025.03 exception could lead to credential leakage on Cloud Profiles page\n\ud83d\udccf Published: 2025-03-27T11:24:31.688Z\n\ud83d\udccf Modified: 2025-03-27T11:24:31.688Z\n\ud83d\udd17 References:\n1. https://www.jetbrains.com/privacy-security/issues-fixed/", "creation_timestamp": "2025-03-27T12:26:16.000000Z"}, {"uuid": "b0f8f2b8-94e2-41e5-8e95-91b1960c9ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3114", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11127", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3114\n\ud83d\udd25 CVSS Score: 9.4 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Code Execution via Malicious Files:\u00a0Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise.\n\nSandbox Bypass Vulnerability:\u00a0A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.\n\ud83d\udccf Published: 2025-04-09T17:29:48.612Z\n\ud83d\udccf Modified: 2025-04-09T17:29:48.612Z\n\ud83d\udd17 References:\n1. https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3114-r3484/", "creation_timestamp": "2025-04-09T17:47:52.000000Z"}, {"uuid": "c529b894-074b-4d3d-8ee8-71b55c3187a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31144", "type": "seen", "source": "https://t.me/cvedetector/23870", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31144 - Quick Agent Windows RCE Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31144 \nPublished : April 28, 2025, 12:15 a.m. | 41\u00a0minutes ago \nDescription : Quick Agent V3 and Quick Agent V2 contain an issue with improper restriction of communication channel to intended endpoints. If exploited, a remote unauthenticated attacker may attempt to log in to an arbitrary host via Windows system where the product is running. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-28T03:11:28.000000Z"}, {"uuid": "82cc456b-3a78-42d0-a816-4b770a3e0b7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31147", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11919", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31147\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users.\n\ud83d\udccf Published: 2025-04-15T21:50:38.887Z\n\ud83d\udccf Modified: 2025-04-15T21:50:38.887Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "creation_timestamp": "2025-04-15T21:55:40.000000Z"}, {"uuid": "0e2df06e-6995-44f0-8e10-224a51c3fbe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31147", "type": "seen", "source": "https://t.me/cvedetector/23019", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31147 - \"BMW EV Charger Information Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2025-31147 \nPublished : April 15, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T01:48:48.000000Z"}, {"uuid": "d79192a6-8312-4ee3-9a3f-acec599a10ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3114", "type": "seen", "source": "https://t.me/cvedetector/22568", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3114 - Here are the titles: * VMware Code Execution Vulnerability * TERR Sandbox Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3114 \nPublished : April 9, 2025, 6:15 p.m. | 19\u00a0minutes ago \nDescription : Code Execution via Malicious Files:\u00a0Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise.  \n  \nSandbox Bypass Vulnerability:\u00a0A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T20:57:10.000000Z"}, {"uuid": "5c9b75f7-ee83-4846-ad56-b144eee94352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31140", "type": "seen", "source": "https://t.me/cvedetector/21281", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31140 - JetBrains TeamCity Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31140 \nPublished : March 27, 2025, 12:15 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : In JetBrains TeamCity before 2025.03 stored XSS was possible on Cloud Profiles page \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T14:58:30.000000Z"}, {"uuid": "f07940a8-38ef-4cb4-acb0-1444615e9d00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31141", "type": "seen", "source": "https://t.me/cvedetector/21279", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31141 - JetBrains TeamCity Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31141 \nPublished : March 27, 2025, 12:15 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : In JetBrains TeamCity before 2025.03 exception could lead to credential leakage on Cloud Profiles page \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T14:58:28.000000Z"}]}