{"vulnerability": "CVE-2025-2005", "sightings": [{"uuid": "02aa0257-4acd-4fac-bca8-e04e4151f418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lftcbdn4ym2r", "content": "", "creation_timestamp": "2025-01-16T03:04:50.349903Z"}, {"uuid": "ebac3080-2586-440e-b047-942053fc0e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113826039821462233", "content": "", "creation_timestamp": "2025-01-14T09:38:51.966879Z"}, {"uuid": "d10f01a1-2be7-4b14-a931-1ac43ef89250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfozfpjhlb2n", "content": "", "creation_timestamp": "2025-01-14T10:15:33.669326Z"}, {"uuid": "af3ef409-7315-4a6e-ab41-170e3fd76684", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfp37nvmgs2r", "content": "", "creation_timestamp": "2025-01-14T10:47:57.738008Z"}, {"uuid": "150184e8-8915-49a8-bb77-96138762245e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113826312906279825", "content": "", "creation_timestamp": "2025-01-14T10:48:19.307919Z"}, {"uuid": "185be716-f1a8-4324-bd4c-6ac18952f796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfp37okv422r", "content": "", "creation_timestamp": "2025-01-14T10:47:59.871535Z"}, {"uuid": "fdee4fe3-98f7-4d2d-9f31-b627a84dd4a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lftmioxemc2o", "content": "", "creation_timestamp": "2025-01-16T06:07:57.907583Z"}, {"uuid": "949e4b6f-28c1-4ea9-8888-1e5b2c6f1787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lfzjiqttbz2y", "content": "", "creation_timestamp": "2025-01-18T14:30:13.782481Z"}, {"uuid": "52eb564d-46c7-4909-a1a9-d2045bfd34c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20058", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952492492280372", "content": "", "creation_timestamp": "2025-02-05T17:37:26.628693Z"}, {"uuid": "5508dabb-0c08-4d3f-8d5b-7720dfa5a915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20058", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhh6k5in362j", "content": "", "creation_timestamp": "2025-02-05T18:16:36.226115Z"}, {"uuid": "87a672c9-91ee-458c-9a97-020ea7c9e02a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lixz7mnfs22v", "content": "", "creation_timestamp": "2025-02-25T04:21:45.230665Z"}, {"uuid": "1fb1ec14-d1bc-4398-93c4-a2cb3ca18716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3liy4m7iy2x2q", "content": "", "creation_timestamp": "2025-02-25T05:22:25.209908Z"}, {"uuid": "09b99823-aa87-4893-9d22-26f5cb4d972d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lixkmk7dht2y", "content": "", "creation_timestamp": "2025-02-25T00:00:29.058280Z"}, {"uuid": "a6867b2d-f9b3-499a-8810-29fb1d79c4fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3liyf74ku3c2i", "content": "", "creation_timestamp": "2025-02-25T07:56:11.910268Z"}, {"uuid": "734ca441-4c6b-48ee-acaf-6a509e3962aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114058233118410850", "content": "", "creation_timestamp": "2025-02-24T09:48:40.746789Z"}, {"uuid": "2eb8b74b-d534-4944-83b7-5983a19766ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljgam6xx7s2f", "content": "", "creation_timestamp": "2025-03-02T20:11:17.014891Z"}, {"uuid": "8464472e-1276-4368-b304-bd2b1cd4f74f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3liysthzhtp27", "content": "", "creation_timestamp": "2025-02-25T12:00:11.790268Z"}, {"uuid": "e3e6cc86-c7c0-423f-9873-d41f3d15ed3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3limkmpd4qs2j", "content": "", "creation_timestamp": "2025-02-20T15:01:19.421252Z"}, {"uuid": "0875a729-3300-46fd-8413-26edb960e72c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3limrma6m542v", "content": "", "creation_timestamp": "2025-02-20T17:06:17.781121Z"}, {"uuid": "e00328a8-2b24-475a-b35b-2be9a2946acb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114037470228709571", "content": "", "creation_timestamp": "2025-02-20T17:48:24.486117Z"}, {"uuid": "321959b8-9339-43c3-a436-944ee7d32620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3liniribw752u", "content": "", "creation_timestamp": "2025-02-21T00:00:51.616230Z"}, {"uuid": "a86c67b6-28a7-400c-8c95-c8081e0d1534", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114059530289800963", "content": "", "creation_timestamp": "2025-02-24T15:18:33.902306Z"}, {"uuid": "d2abb5f0-8744-4abf-94c6-895bdf069669", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lioqyal6wh27", "content": "", "creation_timestamp": "2025-02-21T12:00:27.009718Z"}, {"uuid": "44f77535-a42b-4f68-b159-af9e612f123a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "MISP/af1fbe07-e10c-40c4-844e-d4419bdf6f80", "content": "", "creation_timestamp": "2025-08-22T13:26:18.000000Z"}, {"uuid": "0e7250e8-52af-4123-8a55-2db55520bc2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-20051", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114060079289238869", "content": "", "creation_timestamp": "2025-02-24T17:38:10.775684Z"}, {"uuid": "476f7a81-be39-43db-8918-e724faefefd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3liwvayni2k2r", "content": "", "creation_timestamp": "2025-02-24T17:38:16.007974Z"}, {"uuid": "fdabfa4f-54e9-4c17-9eb7-8cf47ea436b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lj7yrkqrov2r", "content": "", "creation_timestamp": "2025-02-28T08:35:08.274107Z"}, {"uuid": "57ae197d-1ad1-4624-988c-742b13acffb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llt75kfedt2s", "content": "", "creation_timestamp": "2025-04-02T10:40:10.762818Z"}, {"uuid": "98dd19e9-c187-4629-bc62-7f9f656084f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114268208686044611", "content": "", "creation_timestamp": "2025-04-02T11:48:13.673368Z"}, {"uuid": "e31e762a-5019-4369-9062-15a75e2ace44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114268208686044611", "content": "", "creation_timestamp": "2025-04-02T11:48:13.675132Z"}, {"uuid": "fb0bafa4-868b-4948-b813-f16c37609816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lltdyemete2n", "content": "", "creation_timestamp": "2025-04-02T12:06:45.923492Z"}, {"uuid": "75134737-0c8b-4185-ba43-853133bf0882", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://bsky.app/profile/leekthehack.bsky.social/post/3liwprpljds25", "content": "", "creation_timestamp": "2025-02-24T16:00:13.829823Z"}, {"uuid": "812ced04-9158-48e6-8687-7b4f3d8153b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llzctfjpx32d", "content": "", "creation_timestamp": "2025-04-04T21:02:09.968753Z"}, {"uuid": "d78cac76-3b99-4e7d-8638-0c1a0f1baa69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "MISP/24306fae-b16b-4478-9297-d2973cdb583c", "content": "", "creation_timestamp": "2025-08-22T14:52:23.000000Z"}, {"uuid": "c3e0d514-e411-473f-9633-d07b7948c648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://t.me/cvedetector/18785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20051 - Mattermost File Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20051 \nPublished : Feb. 24, 2025, 8:15 a.m. | 30\u00a0minutes ago \nDescription : Mattermost versions 10.4.x &lt;=&lt;=&lt;=&lt;=\nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T10:26:02.000000Z"}, {"uuid": "5b62addb-f08e-4f10-820e-2d60d7b9181d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1471", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20055\n\ud83d\udd39 Description: OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may execute an arbitrary OS command.\n\ud83d\udccf Published: 2025-01-14T09:33:46.428Z\n\ud83d\udccf Modified: 2025-01-14T09:33:46.428Z\n\ud83d\udd17 References:\n1. https://stealthone.net/product_info/d220-d340%e3%80%8cv6-03-03%e3%80%8d%e5%8f%8a%e3%81%b3d440%e3%80%8cv7-00-11%e3%80%8d%e3%83%95%e3%82%a1%e3%83%bc%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%82%92%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9%e8%87%b4/\n2. https://jvn.jp/en/vu/JVNVU99653331/", "creation_timestamp": "2025-01-14T10:21:55.000000Z"}, {"uuid": "607dd682-910a-46aa-900a-4087911d0bbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "https://t.me/cvedetector/18545", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20059 - Ping Identity PingAM Java Policy Agent Relative Path Traversal Parameter Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20059 \nPublished : Feb. 20, 2025, 3:15 p.m. | 16\u00a0minutes ago \nDescription : Relative Path Traversal vulnerability in Ping Identity PingAM Java Policy Agent allows Parameter Injection.This issue affects PingAM Java Policy Agent: through 5.10.3, through 2023.11.1, through 2024.9. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T17:19:56.000000Z"}, {"uuid": "e9e0b6dd-55ad-4c8c-a046-b9d353df5d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "https://t.me/DarkWebInformer_News/1000", "content": "\ud83d\udea8 News Alert!\n\nSource: Dark Web Informer - Cyber Threat Intelligence\nTitle: CVE-2025-20059: PingAM Java Agent Security Advisory #202404\nLink: https://darkwebinformer.com/cve-2025-20059-pingam-java-agent-security-advisory-202404/", "creation_timestamp": "2025-02-20T15:01:54.000000Z"}, {"uuid": "9ec04f16-1a80-41ab-81f7-5d2dc63cb46a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20052", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16336", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20052\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Improper access control for some Intel(R) Graphics software may allow an authenticated user to potentially enable denial of service via local access.\n\ud83d\udccf Published: 2025-05-13T21:01:55.597Z\n\ud83d\udccf Modified: 2025-05-14T17:19:37.016Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html", "creation_timestamp": "2025-05-14T17:32:06.000000Z"}, {"uuid": "9723adc4-8875-44a9-994a-3a423cb04aec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10046", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2005\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\ud83d\udccf Published: 2025-04-02T09:21:42.633Z\n\ud83d\udccf Modified: 2025-04-02T09:21:42.633Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/102223a1-07f5-485b-a6af-49cf316d9797?source=cve\n2. https://wordpress.org/support/plugin/front-end-only-users/", "creation_timestamp": "2025-04-02T09:34:30.000000Z"}, {"uuid": "b4c402ba-dc44-43a4-b2ad-d03a2acc9f0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20054", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16332", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20054\n\ud83d\udd25 CVSS Score: 6.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Uncaught exception in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access.\n\ud83d\udccf Published: 2025-05-13T21:01:56.981Z\n\ud83d\udccf Modified: 2025-05-14T15:49:18.199Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html", "creation_timestamp": "2025-05-14T16:33:51.000000Z"}, {"uuid": "45ca1fd8-1046-4795-8279-72020c915e48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/30164", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aWordPress FEUP Arbitrary File Upload Exploit (CVE-2025-2005)\nURL\uff1ahttps://github.com/mrmtwoj/CVE-2025-2005\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-06T18:21:28.000000Z"}, {"uuid": "c961e893-fa5c-46d5-92db-7b41eafab95f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/160", "content": "\ud83d\udea8 Critical 0-Day Alert: CVE-2025-2005 (CVSS 10) \u2013 WordPress Plugin File Upload Vulnerability!\n\nA Critical RCE vulnerability has been discovered in the Front End Users Plugin for WordPress, affecting versions \u2264 3.2.32. This flaw allows unauthenticated attackers to upload arbitrary files, potentially leading to remote code execution on the server!\n\n\u2e3b\n\n\u26a0\ufe0f Vulnerability Details:\n \u2022 Plugin: Front End Only Users\n \u2022 Version Affected: \u2264 3.2.32\n \u2022 Impact: Unauthenticated File Upload \u2192 Full Server Takeover\n \u2022 CVSS Score: 10.0 (Critical)\n\n\u2e3b\n\n\ud83d\udd25 Proof of Concept:\n\nPoC available here:\ngithub.com/Nxploited/CVE-\u2026\n\n\u2e3b\n\nFOFA Dork:\n\nbody=\"/wp-content/plugins/front-end-only-users/\"\n\n\u2e3b\n\n\u2705 Recommendation:\n \u2022 Update the plugin immediately or remove it if not in use\n \u2022 Monitor for suspicious uploads and unexpected PHP files\n \u2022 Harden server file permissions and enable WAF rules\n\n\u2e3b\n\nStay ahead of zero-days with us!\nJoin @CyberSecPlayground for exclusive vulnerability alerts, private tools, and real-time bug bounty tips.\n\n\n#CVE2025_2005 #WordPress #Exploit #0day #CyberSecurity #FOFA #OSINT #BugBounty #CyberSecPlayground", "creation_timestamp": "2025-04-04T09:02:05.000000Z"}, {"uuid": "405c100d-66c9-4423-b53b-386efaa7564e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/12957", "content": "\ud83d\udea8CVE-2025-20059: PingAM Java Agent Security Advisory #202404\n\nhttps://darkwebinformer.com/cve-2025-20059-pingam-java-agent-security-advisory-202404/", "creation_timestamp": "2025-02-20T16:01:08.000000Z"}, {"uuid": "1df19410-7677-44f0-afe8-7ff7f7373efc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://t.me/cvedetector/15242", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20055 - \"Y'S STEALTHONE D220/D340 Command Injection\"\", \n  \"Content\": \"CVE ID : CVE-2025-20055 \nPublished : Jan. 14, 2025, 10:15 a.m. | 39\u00a0minutes ago \nDescription : OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may execute an arbitrary OS command. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T12:18:59.000000Z"}, {"uuid": "11592857-0432-4bae-8804-0e54683f5f39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "https://t.me/DarkWebInformer_News/1119", "content": "\ud83d\udea8 News Alert!\n\nSource: Dark Web Informer - Cyber Threat Intelligence\nTitle: CVE-2025-20051/24490/25279: Mattermost Boards Arbitrary File Read Vulnerability in Multiple Versions\nLink: https://darkwebinformer.com/cve-2025-20051-24490-25279-mattermost-boards-arbitrary-file-read-vulnerability-in-multiple-versions/", "creation_timestamp": "2025-02-24T17:38:13.000000Z"}, {"uuid": "b48ef13e-4fab-450a-a18c-22bd7f2fc2be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "seen", "source": "https://t.me/cvedetector/21857", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2005 - WordPress Front End Users Arbitrary File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2005 \nPublished : April 2, 2025, 10:15 a.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T14:58:58.000000Z"}, {"uuid": "1d2c4cc6-20b4-4099-bcac-69b4800db5c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/13255", "content": "\ud83d\udea8CVE-2025-20051/24490/25279: Mattermost Boards Arbitrary File Read Vulnerability in Multiple Versions\n\nhttps://darkwebinformer.com/cve-2025-20051-24490-25279-mattermost-boards-arbitrary-file-read-vulnerability-in-multiple-versions/", "creation_timestamp": "2025-02-24T18:38:04.000000Z"}, {"uuid": "7eea71cb-a54f-41d4-a838-23e167d72231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "published-proof-of-concept", "source": "Telegram/kXZvd58izIQiU_MwCLyFKxklQIm_6IOm5Js_A1mT7KUydck", "content": "", "creation_timestamp": "2025-04-02T11:00:05.000000Z"}, {"uuid": "c93ef658-0829-409b-afdc-1f15a459d3fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20059", "type": "seen", "source": "https://t.me/CyberBulletin/2426", "content": "\u26a1CVE-2025-20059 (CVSS 9.2): Urgent Action Needed to Patch PingAM Java Agent Vulnerability.\n\n#CyberBulletin", "creation_timestamp": "2025-02-28T05:03:18.000000Z"}, {"uuid": "e5a2ed89-c4b1-45a0-9bac-b4b377ce12e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "published-proof-of-concept", "source": "Telegram/wJJNpcmq9kx21MPfY9-4icgXC2_RjU8KWi9ZvsTo6oz7fwk", "content": "", "creation_timestamp": "2025-04-07T01:00:08.000000Z"}, {"uuid": "890d82df-04c5-4e72-90a6-d51c316f0f58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "published-proof-of-concept", "source": "Telegram/aVBd3ldNRLl7Xo5CPtKzp3UErMxRgMRg31wU9VFi81ukDXk", "content": "", "creation_timestamp": "2025-04-04T01:00:08.000000Z"}, {"uuid": "66ae720e-2293-443d-9afd-b07310e49f12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20051", "type": "seen", "source": "Telegram/Vvd5MA2nmu0duCxF3bbKYEKW__TKbzMFIp2pUAfan9WmCtw", "content": "", "creation_timestamp": "2025-02-24T09:30:39.000000Z"}, {"uuid": "f3417595-39e3-4a25-8563-2cb29444e73b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "published-proof-of-concept", "source": "Telegram/5f8moqVvh3k2gjIAjrFuBAFbMIoO7wtT9tjxgSLfNmIi8Mo", "content": "", "creation_timestamp": "2025-04-06T23:00:05.000000Z"}, {"uuid": "815d030d-f237-4d7f-a7ef-736ae69915a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/4265", "content": "WordPress Front End Users Plugin &lt;= 3.2.32 is vulnerable to Arbitrary File Upload.\n\nhttps://github.com/Nxploited/CVE-2025-2005", "creation_timestamp": "2025-04-04T14:52:16.000000Z"}, {"uuid": "08943436-1f2a-41b5-81d2-c5af516c8343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2579", "content": "CVE-2025-2005 WordPress \n*\nFront-End Users Plugin \nVersion Affected: &lt;= 3.2.32\n*\n2 POC Exploit", "creation_timestamp": "2025-04-03T07:47:35.000000Z"}, {"uuid": "40409b36-dd50-4f43-a43c-4275914b17a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2005", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1318", "content": "CVE-2025-2005 WordPress\n*\n\u0627\u0641\u0632\u0648\u0646\u0647 Front-End Users\n*\n\u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631: \u06f3.\u06f2.\u06f3\u06f2 \u0648 \u067e\u0627\u06cc\u06cc\u0646\u200c\u062a\u0631\n*\n\u062f\u0648 \u0627\u062b\u0628\u0627\u062a \u0645\u0641\u0647\u0648\u0645\u06cc (PoC) \u0628\u0631\u0627\u06cc \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a\n\n\nCVE-2025-2005 WordPress \n*\nFront-End Users Plugin \nVersion Affected: &lt;= 3.2.32\n*\n2 POC Exploit\n\n@MrVGunz", "creation_timestamp": "2025-04-04T11:37:31.000000Z"}]}