{"vulnerability": "cve-2025-3025", "sightings": [{"uuid": "91520a9c-d519-4e9b-8bd5-836266325773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkr2mykdhb2w", "content": "", "creation_timestamp": "2025-03-19T20:48:52.164959Z"}, {"uuid": "1db1297f-0ce7-4b11-bdd2-48454fe743f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://gist.github.com/TeamDman/e5b8e08e7b0347dd422b24c812801849", "content": "", "creation_timestamp": "2025-03-20T16:36:14.000000Z"}, {"uuid": "de372ef9-d633-43c3-9c17-092844f9e1b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30259", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkrp2abves26", "content": "", "creation_timestamp": "2025-03-20T02:54:08.777733Z"}, {"uuid": "19f89a76-3685-475c-98d3-8dec44d14a13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30259", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmkw4ct2fq27", "content": "", "creation_timestamp": "2025-04-11T21:02:28.192442Z"}, {"uuid": "8bb06e82-0b7e-4806-a257-1d2da29dc875", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lt7vth6tsk2l", "content": "", "creation_timestamp": "2025-07-05T13:54:28.012828Z"}, {"uuid": "f21b6005-155f-4010-aabf-da40545e9539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://bsky.app/profile/robsavoury.bsky.social/post/3lm6q5acw522t", "content": "", "creation_timestamp": "2025-04-07T00:43:31.421537Z"}, {"uuid": "2d8821bd-1efd-4119-8e2f-77b159452406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3025", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lyuxzn6ko72o", "content": "", "creation_timestamp": "2025-09-15T14:05:33.976985Z"}, {"uuid": "e9a482b7-19bd-45a9-b125-3f6ded97d3cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30254", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "46bd918c-bf61-4241-853e-2ead789ba51e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30257", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "30f2b963-ef43-42f2-9eb0-d24605a39ac1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30257", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmv5o2icuq2g", "content": "", "creation_timestamp": "2025-04-15T22:44:10.095870Z"}, {"uuid": "d02cd7ab-828e-4f90-a3d8-8027449a65fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3lv6l5gbf6s2d", "content": "", "creation_timestamp": "2025-07-30T12:00:53.067962Z"}, {"uuid": "b77dd179-f2d8-45cf-8bea-5e35bef5bfee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3ltmpsuerec2j", "content": "", "creation_timestamp": "2025-07-10T16:11:23.909844Z"}, {"uuid": "904ff6ae-a81e-4cec-9015-08d5e6ae6557", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30259", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:27.000000Z"}, {"uuid": "cdab4d71-e7d6-4c80-a4d4-d4afb9e2c123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:27.000000Z"}, {"uuid": "de986e73-447e-4bf4-83ea-e5408559fa9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3m7k2uzmh7l22", "content": "", "creation_timestamp": "2025-12-09T07:53:45.833307Z"}, {"uuid": "d9159edd-d812-4874-9bce-f0ce4de1d3d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3lwjd3oedez2g", "content": "", "creation_timestamp": "2025-08-16T12:01:14.120241Z"}, {"uuid": "8a3d879c-1923-4f52-93f8-94d277d95514", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3025", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-905/", "content": "", "creation_timestamp": "2025-09-23T03:00:00.000000Z"}, {"uuid": "c204eca1-7278-426b-b0bb-9d13fdd85ca4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30256", "type": "seen", "source": "https://infosec.place/objects/07efe569-75c8-4766-b78a-761e8829aff3", "content": "", "creation_timestamp": "2025-08-20T13:30:33.884093Z"}, {"uuid": "8385fc33-1c7a-4418-a3cc-7dacc1f8fb8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30256", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lwtu64fnx726", "content": "", "creation_timestamp": "2025-08-20T16:33:26.130636Z"}, {"uuid": "32c8a091-4f13-497c-8f58-2d83e4dda2ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30259", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:26.000000Z"}, {"uuid": "02a99781-1380-432f-a36c-7af594b14b6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:26.000000Z"}, {"uuid": "57ab246e-83d5-42e6-a9ad-221b333b87d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30255", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5epebkpky2q", "content": "", "creation_timestamp": "2025-11-11T17:53:49.482507Z"}, {"uuid": "c4d263e0-a2a0-4452-9c7f-b9b9db12101a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3m7k2v5mpsn2z", "content": "", "creation_timestamp": "2025-12-09T07:53:48.941488Z"}, {"uuid": "cb8a7a67-1dbd-4982-a3d0-9fb89ed7f062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3m7k2vijzm7a2", "content": "", "creation_timestamp": "2025-12-09T07:54:37.279417Z"}, {"uuid": "40cbe6b4-ef47-4f1a-9990-0fc18ef98099", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30259", "type": "exploited", "source": "https://t.me/DarkWebInformer_CVEAlerts/8166", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30259\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: The WhatsApp cloud service before late 2024 did not block certain crafted PDF content that can defeat a sandbox protection mechanism and consequently allow remote access to messaging applications by third parties, as exploited in the wild in 2024 for installation of Android malware associated with BIGPRETZEL.\n\ud83d\udccf Published: 2025-03-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-20T00:09:44.088Z\n\ud83d\udd17 References:\n1. https://www.bleepingcomputer.com/news/security/whatsapp-patched-zero-day-flaw-used-in-paragon-spyware-attacks/\n2. https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/", "creation_timestamp": "2025-03-20T00:17:59.000000Z"}, {"uuid": "79f0640e-c162-4700-9cac-229fd0c1b3ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://gist.github.com/EbonJaeger/fbb406a1301a4e1bf0d8825c9b084ebb", "content": "", "creation_timestamp": "2026-01-02T19:59:02.000000Z"}, {"uuid": "5ef53828-3541-4167-94ff-8d19694da514", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8151", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30258\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L)\n\ud83d\udd39 Description: In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a \"verification DoS.\"\n\ud83d\udccf Published: 2025-03-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-19T19:25:20.407Z\n\ud83d\udd17 References:\n1. https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html\n2. https://dev.gnupg.org/T7527\n3. https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158", "creation_timestamp": "2025-03-19T20:18:25.000000Z"}, {"uuid": "ab163e1d-8b3a-4a9c-8208-053fc57faf88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30257", "type": "seen", "source": "https://t.me/cvedetector/23029", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30257 - \"Smart Meter Serial Number Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2025-30257 \nPublished : April 15, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Unauthenticated attackers can retrieve serial number of smart meters associated to a specific user account. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T01:49:01.000000Z"}, {"uuid": "26354e00-510f-4231-ac72-b2281fd77f8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30258", "type": "seen", "source": "https://t.me/cvedetector/20686", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30258 - GnuPG Certificate Verification Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-30258 \nPublished : March 19, 2025, 8:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a \"verification DoS.\" \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T23:00:41.000000Z"}, {"uuid": "668b858c-1fa9-44b1-9f3f-a9ae7ab201a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30259", "type": "exploited", "source": "https://t.me/cvedetector/20690", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30259 - WhatsApp Cloud Service PDF Sandbox Evasion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30259 \nPublished : March 20, 2025, 12:15 a.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : The WhatsApp cloud service before late 2024 did not block certain crafted PDF content that can defeat a sandbox protection mechanism and consequently allow remote access to messaging applications by third parties, as exploited in the wild in 2024 for installation of Android malware associated with BIGPRETZEL. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T03:11:19.000000Z"}]}