{"vulnerability": "CVE-2025-6119", "sightings": [{"uuid": "f56fd80c-00ca-4731-9bb0-7afe636ce790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6119", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115718868837469265", "content": "", "creation_timestamp": "2025-12-14T16:30:10.580809Z"}, {"uuid": "b0ab8c96-7bbd-4daf-81c6-0b7ac52e0158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-61194", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3prrjqxwj2e", "content": "", "creation_timestamp": "2025-10-21T16:45:55.748018Z"}, {"uuid": "5b7d7eeb-60b9-44b1-a8c8-080e6bc6a87b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-61190", "type": "seen", "source": "https://gist.github.com/MerttTuran/9cf7de549749fe3ef7ce08d65e3540bd", "content": "", "creation_timestamp": "2026-03-11T17:02:25.000000Z"}, {"uuid": "426d67f1-269b-4704-a0f7-17c49cc21ae5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6119", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18443", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6119\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in Open Asset Import Library Assimp up to 5.4.3. Affected is the function Assimp::BVHLoader::ReadNodeChannels in the library assimp/code/AssetLib/BVH/BVHLoader.cpp. The manipulation of the argument pNode leads to use after free. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.\n\ud83d\udccf Published: 2025-06-16T11:00:09.282Z\n\ud83d\udccf Modified: 2025-06-16T11:00:09.282Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.312588\n2. https://vuldb.com/?ctiid.312588\n3. https://vuldb.com/?submit.591233\n4. https://github.com/assimp/assimp/issues/6219\n5. https://github.com/assimp/assimp/issues/6219#issuecomment-2945016005\n6. https://github.com/user-attachments/files/20604791/reproduce_2.tar.gz", "creation_timestamp": "2025-06-16T11:40:01.000000Z"}]}