{"vulnerability": "CVE-2025-0065", "sightings": [{"uuid": "0bc2eae8-612e-4db2-9da0-d976cbc064ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://bsky.app/profile/teemutiainen.bsky.social/post/3lh4774pwha2g", "content": "", "creation_timestamp": "2025-02-01T09:29:04.147484Z"}, {"uuid": "38ed5d45-bf6b-4ad0-b0ad-501bdd15b71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lheyvdd24626", "content": "", "creation_timestamp": "2025-02-04T21:30:10.407641Z"}, {"uuid": "44c1d871-5388-4256-bf46-7f4f760dde74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113905487848074528", "content": "", "creation_timestamp": "2025-01-28T10:23:32.840890Z"}, {"uuid": "d8d6cdcc-a55b-4190-96ea-f416e86cb1e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgyeehasoc25", "content": "", "creation_timestamp": "2025-01-30T20:50:52.071724Z"}, {"uuid": "bb9ab429-c55a-464d-aa51-963e3435b256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgsdbqlg7r2n", "content": "", "creation_timestamp": "2025-01-28T11:15:28.813231Z"}, {"uuid": "ec00168f-f017-4533-934b-c7dcb63a4ea0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-081/", "content": "", "creation_timestamp": "2025-02-03T05:00:00.000000Z"}, {"uuid": "ba7458ab-b763-433d-b56e-638dfcd30773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgsjg6d5ba2i", "content": "", "creation_timestamp": "2025-01-28T13:05:26.453902Z"}, {"uuid": "ce71a28a-64f4-428f-9079-b7f4a5af40f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113906220956487828", "content": "", "creation_timestamp": "2025-01-28T13:29:59.540603Z"}, {"uuid": "20a08318-0b02-4bb7-a0f2-a9ec1fcdcb4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgvivdtuf32n", "content": "", "creation_timestamp": "2025-01-29T17:33:55.460946Z"}, {"uuid": "44490052-23dd-4365-bf12-65f16923f7fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-0065", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgud5nptyc2n", "content": "", "creation_timestamp": "2025-01-29T06:18:31.097412Z"}, {"uuid": "7bc0d8eb-6215-4d4f-9c38-183ac273cbe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3lh2wgw3hhn2k", "content": "", "creation_timestamp": "2025-01-31T21:19:41.754858Z"}, {"uuid": "c2ecc5c5-394c-4bff-9abb-f4d4c05b8efd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:19.000000Z"}, {"uuid": "6e8ab1ce-b3cd-457e-928e-ee537c8153c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3249", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0065\n\ud83d\udd25 CVSS Score: 7.7 (CVSS_V3)\n\ud83d\udd39 Description: Improper Neutralization of Argument Delimiters in the TeamViewer_service.exe component of TeamViewer Clients prior version 15.62 for Windows allows an attacker with local unprivileged access on a Windows system to elevate privileges via argument injection.\n\ud83d\udccf Published: 2025-01-28T12:31:08Z\n\ud83d\udccf Modified: 2025-01-28T12:31:08Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-0065\n2. https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1001", "creation_timestamp": "2025-01-28T13:09:22.000000Z"}, {"uuid": "78847737-c15d-47e4-86ae-2863566d1c6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "https://t.me/cvedetector/16596", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0065 - TeamViewer Argument Injection Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-0065 \nPublished : Jan. 28, 2025, 11:15 a.m. | 2\u00a0hours, 13\u00a0minutes ago \nDescription : Improper Neutralization of Argument Delimiters in the TeamViewer_service.exe component of TeamViewer Clients prior version 15.62 for Windows allows an attacker with local unprivileged access on a Windows system to elevate privileges via argument injection. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T14:36:34.000000Z"}, {"uuid": "dfc0e8b8-43cf-42a1-82a7-dc2837d855a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0065", "type": "seen", "source": "Telegram/fAgmfsuVv0t4F5wcfmwVYdEEESl1HmZ-DkBG1IolAGbWJVA", "content": "", "creation_timestamp": "2025-01-28T12:00:20.000000Z"}]}