{"vulnerability": "CVE-2025-2007", "sightings": [{"uuid": "2c53197b-ee68-4637-a1ef-b5e35b704409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20072", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113839317504424625", "content": "", "creation_timestamp": "2025-01-16T17:55:33.252684Z"}, {"uuid": "ba599c9e-00af-4147-8041-31a25a24a650", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20072", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuv6ztrg72j", "content": "", "creation_timestamp": "2025-01-16T18:16:12.707271Z"}, {"uuid": "08555fcd-11d3-48f4-b5d6-f98edc4fd863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2007", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114261603469236457", "content": "", "creation_timestamp": "2025-04-01T07:48:25.851840Z"}, {"uuid": "391e4209-274f-483c-937b-bd79ed1032ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2007", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114261603469236457", "content": "", "creation_timestamp": "2025-04-01T07:48:25.857728Z"}, {"uuid": "35a03c9c-2661-4523-b857-dc704b4af78a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20075", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lifybwlg6q2t", "content": "", "creation_timestamp": "2025-02-18T00:17:10.223366Z"}, {"uuid": "e49bc7fd-3136-46dd-819f-a1b7c8a68d94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20075", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ligd4lrwic2m", "content": "", "creation_timestamp": "2025-02-18T03:31:02.621843Z"}, {"uuid": "8b2247ea-06bb-4067-9c52-2704d8cff81b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20072", "type": "seen", "source": "https://t.me/cvedetector/15591", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20072 - Mattermost Mobile Unvalidated Proto Style Crash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20072 \nPublished : Jan. 16, 2025, 6:15 p.m. | 43\u00a0minutes ago \nDescription : Mattermost Mobile versions &lt;=\nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T20:24:42.000000Z"}, {"uuid": "d58c9dce-5ec6-432a-b4a0-6fd262e167bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20075", "type": "seen", "source": "https://t.me/cvedetector/18265", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20075 - FileMegane SSRF\", \n  \"Content\": \"CVE ID : CVE-2025-20075 \nPublished : Feb. 18, 2025, 12:15 a.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Server-side request forgery (SSRF) vulnerability exists in FileMegane versions above 3.0.0.0 prior to 3.4.0.0. Executing arbitrary backend Web API requests could potentially lead to rebooting the services. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T02:35:19.000000Z"}, {"uuid": "5a6742f3-f6e8-4e76-b200-6b79cb20fb86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20075", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4725", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20075\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L)\n\ud83d\udd39 Description: Server-side request forgery (SSRF) vulnerability exists in FileMegane versions above 3.0.0.0 prior to 3.4.0.0. Executing arbitrary backend Web API requests could potentially lead to rebooting the services.\n\ud83d\udccf Published: 2025-02-17T23:57:07.153Z\n\ud83d\udccf Modified: 2025-02-17T23:57:07.153Z\n\ud83d\udd17 References:\n1. https://www.info-brdg.co.jp/support/report/megane/sec20250201.html\n2. https://jvn.jp/en/jp/JVN80527854/", "creation_timestamp": "2025-02-18T03:16:08.000000Z"}, {"uuid": "2875f5c2-c944-498a-9eb4-bd5735426f27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20079", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16620", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20079\n\ud83d\udd25 CVSS Score: 5.4 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Uncontrolled search path for some Intel(R) Advisor software may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-05-13T21:02:04.673Z\n\ud83d\udccf Modified: 2025-05-16T03:55:51.330Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01263.html", "creation_timestamp": "2025-05-16T04:34:03.000000Z"}]}