{"vulnerability": "CVE-2025-0020", "sightings": [{"uuid": "74f2299d-63ca-4129-a6ec-f31781ac5f57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0020", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114520947732774575", "content": "", "creation_timestamp": "2025-05-17T03:03:05.914967Z"}, {"uuid": "3ccde91b-b42b-4ee5-9ba8-16f9d813ff92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0020", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lpdlq66hyb24", "content": "", "creation_timestamp": "2025-05-17T03:23:31.818266Z"}, {"uuid": "ef75ddda-1b38-41fd-b225-0a87e01be7ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0020", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lpgqnoq3rc2c", "content": "", "creation_timestamp": "2025-05-18T09:29:36.427697Z"}, {"uuid": "5d710ca0-d69a-44ad-ab94-afb561ccbbc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0020", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp4o4q5plv2p", "content": "", "creation_timestamp": "2025-05-14T09:17:42.344563Z"}, {"uuid": "d48b6c3d-2930-437f-b103-d6168b7b1862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0020", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp4o37o64tc2", "content": "", "creation_timestamp": "2025-05-14T09:19:53.079846Z"}, {"uuid": "8eeb8edd-1a0e-4471-9615-02dbe073f0a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0020", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16294", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0020\n\ud83d\udd25 CVSS Score: 7.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/U:Amber)\n\ud83d\udd39 Description: Violation of Secure Design Principles, Hidden Functionality, Incorrect Provision of Specified Functionality vulnerability in ArcGIS (Authentication) allows Privilege Abuse, Manipulating Hidden Fields, Configuration/Environment Manipulation.\n\nThe ArcGIS client_credentials OAuth 2.0 API implementation does not adhere to the RFC/standards; This hidden (known and by-design, but undocumented) functionality enables a requestor (referred to as client in RFC 6749) to request an, undocumented, custom token expiration from ArcGIS (referred to as authorization server in RFC 6749).\n\ud83d\udccf Published: 2025-05-14T07:54:57.843Z\n\ud83d\udccf Modified: 2025-05-14T08:06:45.827Z\n\ud83d\udd17 References:\n1. https://www.vulsec.org/advisories\n2. https://developers.arcgis.com/documentation/security-and-authentication/", "creation_timestamp": "2025-05-14T08:31:22.000000Z"}, {"uuid": "db745931-71ff-4f1e-ba2f-cb80bc11ecec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0020", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114506224515931609", "content": "", "creation_timestamp": "2025-05-14T12:38:46.971854Z"}]}