{"vulnerability": "CVE-2025-23239", "sightings": [{"uuid": "822e9675-530d-46b4-ad56-52c4d57e2995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23239", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952610543794801", "content": "", "creation_timestamp": "2025-02-05T18:07:27.889653Z"}, {"uuid": "161f9a5a-1d4d-465d-8159-905f88d482f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23239", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhhljgs45d2k", "content": "", "creation_timestamp": "2025-02-05T22:08:54.265716Z"}, {"uuid": "9c84c8f6-3ace-4e0b-b298-6956aad2ff32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23239", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhh6kjnt562t", "content": "", "creation_timestamp": "2025-02-05T18:16:48.995482Z"}, {"uuid": "fa71251a-f5f4-4468-921f-81e12f5493ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23239", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113952771302180953", "content": "", "creation_timestamp": "2025-02-05T18:48:33.579334Z"}, {"uuid": "c29873a7-9572-4cf9-a219-29762f742a98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23239", "type": "seen", "source": "https://t.me/cvedetector/17328", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23239 - Pulse Secure iControl Remote Command Injection\", \n  \"Content\": \"CVE ID : CVE-2025-23239 \nPublished : Feb. 5, 2025, 6:15 p.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.  \n  \n   \n  \n  \nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated. \nSeverity: 8.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T21:40:01.000000Z"}]}