{"vulnerability": "CVE-2025-5310", "sightings": [{"uuid": "8caf75e3-d72f-4fda-a192-9fa619f0854e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53106", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lsxey3vfhe2z", "content": "", "creation_timestamp": "2025-07-02T04:31:31.498745Z"}, {"uuid": "34df21cd-cf6b-4f60-8c1d-fbb070c67638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5310", "type": "seen", "source": "https://bsky.app/profile/samilaiho.com/post/3lrujp3zbu22l", "content": "", "creation_timestamp": "2025-06-18T07:52:46.551854Z"}, {"uuid": "6fc12895-4f18-498d-a01d-ccb363f15ee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-53109", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-e3916d62-a1d16dfcef6f8287", "content": "", "creation_timestamp": "2025-07-07T19:27:14.742320Z"}, {"uuid": "b3aa0bed-9fa7-4e22-98ae-0f90477ef821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53106", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsyppggup62r", "content": "", "creation_timestamp": "2025-07-02T17:16:10.488015Z"}, {"uuid": "b608848f-d49d-4bb1-818e-a3e7c854a4e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5310", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lryufn6iyb2k", "content": "", "creation_timestamp": "2025-06-20T01:14:59.228043Z"}, {"uuid": "7c3cd80f-2268-44fa-bec5-ef1155f24d30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5310", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lrzqrpnzefs2", "content": "", "creation_timestamp": "2025-06-20T09:42:55.243877Z"}, {"uuid": "cf63c11d-8f1a-45fa-8a0f-9dba66a8e8cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53106", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114784211147922979", "content": "", "creation_timestamp": "2025-07-02T14:54:26.331643Z"}, {"uuid": "4a55c4ee-da4a-4bf3-9f04-bcb116323db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53109", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lsyr7wntms26", "content": "", "creation_timestamp": "2025-07-02T17:43:18.611957Z"}, {"uuid": "367b8cc5-67b9-4847-8dc6-ca4847332e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53101", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ltzrx5bng22c", "content": "", "creation_timestamp": "2025-07-15T20:54:08.691392Z"}, {"uuid": "86b37884-3045-429b-be38-ede17776ab40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53109", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsyolnrp7y2m", "content": "", "creation_timestamp": "2025-07-02T16:56:10.319084Z"}, {"uuid": "8f4621b1-a735-4541-984b-9b2ba8597aca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53108", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsyqpptq552o", "content": "", "creation_timestamp": "2025-07-02T17:34:14.115643Z"}, {"uuid": "a205c5fa-9c00-46b3-b978-3fb60d44957d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53109", "type": "seen", "source": "https://bsky.app/profile/r-redteamsec.bsky.social/post/3lsytjncyqm26", "content": "", "creation_timestamp": "2025-07-02T18:24:31.499228Z"}, {"uuid": "4ba166e4-c22f-4d62-af8d-97206e2fe68d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5310", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-168-05", "content": "", "creation_timestamp": "2025-06-17T10:00:00.000000Z"}, {"uuid": "ec383149-66c6-4e73-91b7-bfbf16960a7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53109", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lsywuxrcu224", "content": "", "creation_timestamp": "2025-07-02T19:24:32.739141Z"}, {"uuid": "b51536e9-3860-487f-b4a0-ffab6b34aba5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5310", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsmfy4jdck2s", "content": "", "creation_timestamp": "2025-06-27T19:50:08.046013Z"}, {"uuid": "9c5196b5-ab52-433c-9c60-cacc0e3d12ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5310", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lrtc272xow2q", "content": "", "creation_timestamp": "2025-06-17T20:03:09.179819Z"}, {"uuid": "ce7a4d9d-31e5-4fdb-b672-99f3aa48170e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53100", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114779298982762165", "content": "", "creation_timestamp": "2025-07-01T18:05:12.860537Z"}, {"uuid": "57be78b1-3329-4548-a7e0-e812e50940cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53109", "type": "seen", "source": "https://bsky.app/profile/r-redteamsec.bsky.social/post/3m2ag2ng5a32c", "content": "", "creation_timestamp": "2025-10-02T20:41:08.968982Z"}, {"uuid": "6d3705b2-102d-4577-aa19-472439f40cdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53102", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lv53ganjw42a", "content": "", "creation_timestamp": "2025-07-29T21:46:49.646891Z"}, {"uuid": "e67dd2d7-4851-4a3c-b8bb-470d0e34ea94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53107", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114779544615525397", "content": "", "creation_timestamp": "2025-07-01T19:07:41.019137Z"}, {"uuid": "69667a2a-1e90-4e43-9f2e-656fb1fa56f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53104", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114779554157879189", "content": "", "creation_timestamp": "2025-07-01T19:10:06.361455Z"}, {"uuid": "95bcc72e-3366-404d-9213-982065f67a10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53104", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3maj6fy4wtc22", "content": "", "creation_timestamp": "2025-12-21T16:49:27.425303Z"}, {"uuid": "c8c8448f-fba3-4e4d-b93e-006b21eb8741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5310", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19755", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-5310\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dover Fueling Solutions ProGauge MagLink LX Consoles\u00a0expose an undocumented and unauthenticated target communication framework (TCF) interface on a specific port. Files can be created, deleted, or modified, potentially leading to remote code execution.\n\ud83d\udccf Published: 2025-06-27T17:22:02.680Z\n\ud83d\udccf Modified: 2025-06-27T17:41:45.800Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-168-05\n2. https://ociocisa.sharepoint.com/teams/JCDC-ProductionOffice/Shared%20Documents/Forms/AllItems.aspx?OR=Teams%2DHL&amp;CT=1736953471669&amp;id=%2Fteams%2FJCDC%2DProductionOffice%2FShared%20Documents%2FPublications%2FICS%20Publishing%2F2025%20ICSAs%2FJUN%2017%2FVU%23285756%20%2D%20Dover%20Fueling%20Solutions%20ProGauge%20MAGLINK%20%2D%20Notice%20%28Draft%29%2Ehtml&amp;viewid=243fd1ea%2Da122%2D4cc0%2Dbe91%2Dd0714ca46b87&amp;parent=%2Fteams%2FJCDC%2DProductionOffice%2FShared%20Documents%2FPublications%2FICS%20Publishing%2F2025%20ICSAs%2FJUN%2017", "creation_timestamp": "2025-06-27T17:56:10.000000Z"}, {"uuid": "55489d63-9024-4641-a75d-022f78d2db88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53101", "type": "seen", "source": "https://gist.github.com/Darkcrai86/24595b707ace2c372c45b92ba82b3f98", "content": "", "creation_timestamp": "2025-09-03T10:44:23.000000Z"}, {"uuid": "e3e539df-3e59-433b-bb2e-df20432c1fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53104", "type": "seen", "source": "https://gist.github.com/hdknr/5bbdc7bd98ff0dbdfde257d909d48d8c", "content": "", "creation_timestamp": "2026-03-05T05:57:14.000000Z"}, {"uuid": "7e42a295-684f-4fb7-b143-ee57e55c4a73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53103", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/20073", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-53103\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: JUnit is a testing framework for Java and the JVM. From version 5.12.0 to 5.13.1, JUnit's support for writing Open Test Reporting XML files can leak Git credentials. The impact depends on the level of the access token exposed through the OpenTestReportGeneratingListener. If these test reports are published or stored anywhere public, then there is the possibility that a rouge attacker can steal the token and perform elevated actions by impersonating the user or app. This issue as been patched in version 5.13.2.\n\ud83d\udccf Published: 2025-07-01T18:02:39.060Z\n\ud83d\udccf Modified: 2025-07-01T18:50:18.904Z\n\ud83d\udd17 References:\n1. https://github.com/junit-team/junit-framework/security/advisories/GHSA-m43g-m425-p68x\n2. https://github.com/junit-team/junit-framework/commit/d4fc834c8c1c0b3168cd030c13551d1d041f51bc", "creation_timestamp": "2025-07-01T19:09:19.000000Z"}, {"uuid": "53b2a7e9-d484-4a24-bbbb-1d35675d2ee9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53107", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/20067", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-53107\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: @cyanheads/git-mcp-server is an MCP server designed to interact with Git repositories. Prior to version 2.1.5, there is a command injection vulnerability caused by the unsanitized use of input parameters within a call to child_process.exec, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (|, &gt;, &amp;&amp;, etc.). An MCP Client can be instructed to execute additional actions for example via indirect prompt injection when asked to read git logs. This issue has been patched in version 2.1.5.\n\ud83d\udccf Published: 2025-07-01T17:55:30.726Z\n\ud83d\udccf Modified: 2025-07-01T17:55:30.726Z\n\ud83d\udd17 References:\n1. https://github.com/cyanheads/git-mcp-server/security/advisories/GHSA-3q26-f695-pp76\n2. https://github.com/cyanheads/git-mcp-server/commit/0dbd6995ccdf76ab770b58013034365b2d06c4d9\n3. https://github.com/cyanheads/git-mcp-server/releases/tag/v2.1.5", "creation_timestamp": "2025-07-01T18:08:58.000000Z"}, {"uuid": "6adfdfc9-b64f-4d86-9da9-40c9a32cfd84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53100", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/20070", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-53100\n\ud83d\udd25 CVSS Score: 8.6 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: RestDB's Codehooks.io MCP Server is an MCP server on the Codehooks.io platform. Prior to version 0.2.2, the MCP server is written in a way that is vulnerable to command injection attacks as part of some of its MCP Server tools definition and implementation. This could result in a user initiated remote command injection attack on a running MCP Server. This issue has been patched in version 0.2.2.\n\ud83d\udccf Published: 2025-07-01T17:49:54.733Z\n\ud83d\udccf Modified: 2025-07-01T17:49:54.733Z\n\ud83d\udd17 References:\n1. https://github.com/RestDB/codehooks-mcp-server/security/advisories/GHSA-fhq6-jf5q-qxvq\n2. https://github.com/RestDB/codehooks-mcp-server/commit/62f918a6fde6a8c700521b542b85315c70f05794\n3. https://github.com/RestDB/codehooks-mcp-server/commit/83db1d1b4c856cbe4a1b961d315706198bb0ffb8", "creation_timestamp": "2025-07-01T18:09:03.000000Z"}]}