{"vulnerability": "CVE-2025-2517", "sightings": [{"uuid": "7a3db3c5-1029-4f1c-9d98-100328e62638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25175", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-130/", "content": "", "creation_timestamp": "2025-03-13T04:00:00.000000Z"}, {"uuid": "cc74ac4a-455c-4d82-9291-49aa3a2ece7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2517", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lndtv72wvt2v", "content": "", "creation_timestamp": "2025-04-21T18:59:07.682138Z"}, {"uuid": "63c28a81-c3cd-4f75-af5f-ba5fbef09797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25175", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-079-03", "content": "", "creation_timestamp": "2025-03-20T11:00:00.000000Z"}, {"uuid": "5dd37901-b63b-4486-95b1-6d7bd20ad041", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25179", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqm5rbjggjm2", "content": "", "creation_timestamp": "2025-06-02T06:32:53.742382Z"}, {"uuid": "029c8a43-f50e-49f6-9dbd-8b20b507fc2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25179", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqmdvc6wsd2k", "content": "", "creation_timestamp": "2025-06-02T08:22:22.481809Z"}, {"uuid": "1ca85d49-6b0c-465c-b187-249980c623a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2517", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:37.000000Z"}, {"uuid": "a3b3776a-484a-4102-94bb-80d232b8d063", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2517", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:56.000000Z"}, {"uuid": "55a84a29-c4a0-4643-847e-1586f3da4771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25175", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-876/", "content": "", "creation_timestamp": "2025-08-28T03:00:00.000000Z"}, {"uuid": "c694a052-8a00-4b0a-823c-0a54c55529a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25177", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lzgpdnsdwf2j", "content": "", "creation_timestamp": "2025-09-22T15:18:01.792106Z"}, {"uuid": "3cb5e4dc-36a7-45b6-a281-2715eec806ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25175", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-875/", "content": "", "creation_timestamp": "2025-08-28T03:00:00.000000Z"}, {"uuid": "87700758-2cf9-4b97-aa0e-5bc2bef5a713", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25175", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-874/", "content": "", "creation_timestamp": "2025-08-28T03:00:00.000000Z"}, {"uuid": "bd816442-31cc-4563-8028-8e498f58f61b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2517", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12666", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2517\n\ud83d\udd25 CVSS Score: 2.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: Reference to Expired Domain Vulnerability in OpenText\u2122 ArcSight Enterprise Security Manager.\n\ud83d\udccf Published: 2025-04-21T14:26:04.804Z\n\ud83d\udccf Modified: 2025-04-21T14:55:54.336Z\n\ud83d\udd17 References:\n1. https://portal.microfocus.com/s/article/KM000040103", "creation_timestamp": "2025-04-21T15:02:45.000000Z"}, {"uuid": "1be3c5fb-96a1-491a-8ca1-a30581f6f131", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25176", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mcd3kpktlp2x", "content": "", "creation_timestamp": "2026-01-13T17:32:49.166226Z"}, {"uuid": "3843a836-7058-410c-8b90-6ae15af6409d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25175", "type": "seen", "source": "https://t.me/cvedetector/20203", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25175 - Femap Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25175 \nPublished : March 13, 2025, 9:15 a.m. | 31\u00a0minutes ago \nDescription : A vulnerability has been identified in Simcenter Femap V2401 (All versions &lt; V2401.0003), Simcenter Femap V2406 (All versions &lt; V2406.0002). The affected application contains a memory corruption vulnerability while  parsing specially crafted .NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25443) \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T11:26:18.000000Z"}, {"uuid": "ac8c1072-3af0-4647-b4ea-05c26d4e8cbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25173", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19715", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25173\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FasterThemes FastBook allows Stored XSS. This issue affects FastBook: from n/a through 1.1.\n\ud83d\udccf Published: 2025-06-27T11:52:46.174Z\n\ud83d\udccf Modified: 2025-06-27T13:41:44.926Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/fastbook-responsive-appointment-booking-and-scheduling-system/vulnerability/wordpress-fastbook-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-06-27T13:50:53.000000Z"}, {"uuid": "09cfcc48-03de-4dd6-a1b3-5cff0a276192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2517", "type": "seen", "source": "https://t.me/cvedetector/23440", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2517 - OpenText ArcSight Enterprise Security Manager Domain Reference Leak\", \n  \"Content\": \"CVE ID : CVE-2025-2517 \nPublished : April 21, 2025, 3:16 p.m. | 26\u00a0minutes ago \nDescription : Reference to Expired Domain Vulnerability in OpenText\u2122 ArcSight Enterprise Security Manager. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-21T18:09:14.000000Z"}, {"uuid": "6084033f-8613-4a68-89c2-14ef1c316efd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25175", "type": "seen", "source": "Telegram/sYjWk0jf6234z4ClFhLqwsZqcZc81SztNeSCz0F1d0Waf3o", "content": "", "creation_timestamp": "2025-03-13T11:30:26.000000Z"}]}