{"vulnerability": "CVE-2025-20153", "sightings": [{"uuid": "684257a1-218e-4407-99be-d28ac762350d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20153", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lildp2ssnc2e", "content": "", "creation_timestamp": "2025-02-20T03:24:40.913169Z"}, {"uuid": "6d5d8c35-32ea-4d3b-acf6-eb02314826c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20153", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likej7hfto2p", "content": "", "creation_timestamp": "2025-02-19T18:06:41.237160Z"}, {"uuid": "9aa0d496-d11d-4588-a554-213a5cfe94c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20153", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "71232263-fbdf-466b-9a71-6fc2ad6b9501", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20153", "type": "seen", "source": "https://t.me/cvedetector/18464", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20153 - \"Cisco Secure Email Gateway Email Filter Bypass Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-20153 \nPublished : Feb. 19, 2025, 4:15 p.m. | 2\u00a0hours, 23\u00a0minutes ago \nDescription : A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass the configured rules and allow emails that should have been denied to flow through an affected device. \u00a0  \n  \nThis vulnerability is due to improper handling of email that passes through an affected device. An attacker could exploit this vulnerability by sending a crafted email through the affected device. A successful exploit could allow the attacker to bypass email filters on the affected device. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:25:11.000000Z"}]}