{"vulnerability": "CVE-2025-2244", "sightings": [{"uuid": "ef841fd6-8b2d-4ab4-8536-99ded8a1b273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22449", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfc6m53xrj2g", "content": "", "creation_timestamp": "2025-01-09T07:44:01.766106Z"}, {"uuid": "41eb8dec-faca-4848-9f5d-d2d39197f2d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22449", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfc52ohlmn2e", "content": "", "creation_timestamp": "2025-01-09T07:16:21.470613Z"}, {"uuid": "6723aef2-ebcd-40e7-abc2-def1d1b3228a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22445", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797093464257227", "content": "", "creation_timestamp": "2025-01-09T06:57:25.585165Z"}, {"uuid": "ffbccbfc-241b-4c8a-b941-271ab1e3a94a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22449", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797093478066074", "content": "", "creation_timestamp": "2025-01-09T06:57:26.707514Z"}, {"uuid": "437c4409-f409-4a47-ad9f-2057d228d01f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22445", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797106886568510", "content": "", "creation_timestamp": "2025-01-09T07:00:50.528155Z"}, {"uuid": "2ef60333-ad3d-4381-8c06-2e7778d5fb93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22449", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797106903236698", "content": "", "creation_timestamp": "2025-01-09T07:00:51.417076Z"}, {"uuid": "2b08258b-dd4e-4875-afee-f4a5be8bf47f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22445", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfc52lvvpw25", "content": "", "creation_timestamp": "2025-01-09T07:16:18.961676Z"}, {"uuid": "e95a159a-a4b5-4379-b668-dae5a242fb33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22445", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfc6m575n32k", "content": "", "creation_timestamp": "2025-01-09T07:44:02.288406Z"}, {"uuid": "9865bb03-6385-4515-8140-37444bb6243f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2244", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llya3ocjwm2s", "content": "", "creation_timestamp": "2025-04-04T10:40:20.123109Z"}, {"uuid": "8c39852d-cd76-4efa-9c45-f02e1066170c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2244", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114284280716155501", "content": "", "creation_timestamp": "2025-04-05T07:55:33.037454Z"}, {"uuid": "ccfd075b-79ae-43c1-a3f0-80b10e10a51e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2244", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114284280716155501", "content": "", "creation_timestamp": "2025-04-05T07:55:33.039111Z"}, {"uuid": "56236e4a-e79d-4930-9855-0d4280e02c25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2244", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114279693824501382", "content": "", "creation_timestamp": "2025-04-04T12:29:03.070733Z"}, {"uuid": "7e25ce84-d839-41e8-a64e-9fe63dd93186", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2244", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114279693824501382", "content": "", "creation_timestamp": "2025-04-04T12:29:03.075349Z"}, {"uuid": "16037939-d458-4a85-8105-ff78e4e5e41a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2244", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyichs5t72z", "content": "", "creation_timestamp": "2025-04-04T13:07:20.177782Z"}, {"uuid": "065dae9d-1492-4f39-bbed-ed063d0a8d24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22443", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}, {"uuid": "504ddd04-8142-4c1c-8e7e-0513f804ea49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2244", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmddl7nckk2a", "content": "", "creation_timestamp": "2025-04-08T20:42:00.473703Z"}, {"uuid": "23bda6f0-897b-41a1-8953-694850117454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2244", "type": "seen", "source": "https://bsky.app/profile/walknews.bsky.social/post/3lmdiugblmn2o", "content": "", "creation_timestamp": "2025-04-08T22:16:37.628833Z"}, {"uuid": "9553eb1f-ac06-4fa2-9c17-363dce8161d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22447", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:48.000000Z"}, {"uuid": "815e693c-97a7-4aa0-85dd-416542272bb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22447", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "6f098658-f379-4085-acdc-deade6c8b820", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22442", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxvolwzgvc2v", "content": "", "creation_timestamp": "2025-09-03T03:24:18.903896Z"}, {"uuid": "259b6230-180c-410c-bb46-c02156ed137a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-22442", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/9d7fef5d-952d-4ecc-880d-94d02304e7a3", "content": "", "creation_timestamp": "2025-07-30T07:59:24.597474Z"}, {"uuid": "7c569310-3b9e-4204-8be6-2033ee6ff806", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22443", "type": "seen", "source": "https://t.me/cvedetector/19456", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22443 - OpenHarmony Out-of-Bounds Read Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22443 \nPublished : March 4, 2025, 4:15 a.m. | 22\u00a0minutes ago \nDescription : in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through  out-of-bounds read. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T05:48:06.000000Z"}, {"uuid": "c3e208aa-ea63-4911-be93-662da92031bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22441", "type": "published-proof-of-concept", "source": "Telegram/StnFq2aD-oVk9_iOn0KNijqZJTdZ-dJJ6jhCB9DJIxPvPVY", "content": "", "creation_timestamp": "2025-10-08T21:00:04.000000Z"}, {"uuid": "368c3584-b4b4-414c-a43a-bfaffd8c4c4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22441", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/54650", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aWriteup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted ApplicationInfo to LoadedApk\nURL\uff1ahttps://github.com/michalbednarski/ResourcePoison\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-10-08T13:16:02.000000Z"}, {"uuid": "4d682167-51af-4c7e-bf78-d2426d09035c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22443", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6330", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22443\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through  out-of-bounds read.\n\ud83d\udccf Published: 2025-03-04T03:44:38.676Z\n\ud83d\udccf Modified: 2025-03-04T03:44:38.676Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", "creation_timestamp": "2025-03-04T04:34:38.000000Z"}, {"uuid": "4d9208ff-2936-443c-a272-ad7fb7f1b861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22446", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16442", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22446\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: Inadequate encryption strength for some Edge Orchestrator software for Intel(R) Tiber\u2122 Edge Platform may allow an authenticated user to potentially enable escalation of privilege via adjacent access.\n\ud83d\udccf Published: 2025-05-13T21:02:36.588Z\n\ud83d\udccf Modified: 2025-05-15T04:01:56.914Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html", "creation_timestamp": "2025-05-15T04:32:37.000000Z"}, {"uuid": "f9a6966a-408a-40ca-93d7-bc442b2a39aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22449", "type": "seen", "source": "https://t.me/cvedetector/14794", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22449 - Mattermost Invite Permission Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22449 \nPublished : Jan. 9, 2025, 7:15 a.m. | 40\u00a0minutes ago \nDescription : Mattermost versions 9.11.x &lt;=\nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T09:23:26.000000Z"}, {"uuid": "06b26758-68b0-47aa-b9c0-0fa4750d0140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22445", "type": "seen", "source": "https://t.me/cvedetector/14791", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22445 - Mattermost Incorrect UI Reporting Against Calls Configuration\", \n  \"Content\": \"CVE ID : CVE-2025-22445 \nPublished : Jan. 9, 2025, 7:15 a.m. | 40\u00a0minutes ago \nDescription : Mattermost versions 10.x &lt;=\nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T09:23:23.000000Z"}, {"uuid": "4d6ad59e-2fa8-4039-a4a9-37a190084feb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22447", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6631", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22447\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Incorrect access permission of a specific service issue exists in RemoteView Agent (for Windows) versions prior to v8.1.5.2. If this vulnerability is exploited, a non-administrative user on the remote PC may execute an arbitrary OS command with LocalSystem privilege.\n\ud83d\udccf Published: 2025-03-06T03:56:03.508Z\n\ud83d\udccf Modified: 2025-03-06T03:56:03.508Z\n\ud83d\udd17 References:\n1. https://help.rview.com/hc/ja/articles/38287019277843-%E7%B7%8A%E6%80%A5%E3%83%91%E3%83%83%E3%83%81%E4%BD%9C%E6%A5%AD%E3%81%AE%E3%81%94%E6%A1%88%E5%86%85-2025-02-13-%E5%AE%8C%E4%BA%86\n2. https://jvn.jp/en/jp/JVN24992507/", "creation_timestamp": "2025-03-06T04:35:44.000000Z"}, {"uuid": "85e93f91-6b07-442b-aca9-68825e93aecf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2244", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10453", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2244\n\ud83d\udd25 CVSS Score: 9.5 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: A vulnerability in the\u00a0sendMailFromRemoteSource\u00a0method in Emails.php\u00a0 as used in Bitdefender GravityZone Console unsafely uses php unserialize()\u00a0on user-supplied input without validation. By crafting a malicious serialized payload, an attacker can trigger PHP object injection, perform a file write, and gain arbitrary command execution on the host system.\n\ud83d\udccf Published: 2025-04-04T09:52:48.684Z\n\ud83d\udccf Modified: 2025-04-04T14:26:11.160Z\n\ud83d\udd17 References:\n1. http://bitdefender.com/support/security-advisories/insecure-php-deserialization-issue-in-gravityzone-console-va-12634", "creation_timestamp": "2025-04-04T14:35:59.000000Z"}, {"uuid": "9f971cc9-8770-45a6-b840-860d651db77a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2244", "type": "seen", "source": "https://t.me/cvedetector/22117", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2244 - Bitdefender GravityZone Console PHP Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2244 \nPublished : April 4, 2025, 10:15 a.m. | 1\u00a0hour, 40\u00a0minutes ago \nDescription : A vulnerability in the\u00a0sendMailFromRemoteSource\u00a0method in Emails.php\u00a0 as used in Bitdefender GravityZone Console unsafely uses php unserialize()\u00a0on user-supplied input without validation. By crafting a malicious serialized payload, an attacker can trigger PHP object injection, perform a file write, and gain arbitrary command execution on the host system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T14:40:24.000000Z"}]}