{"vulnerability": "CVE-2025-26916", "sightings": [{"uuid": "17b7082b-1207-42a4-807e-be8003060b71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26916", "type": "seen", "source": "https://t.me/cvedetector/19972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26916 - EPC Massive Dynamic PHP Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26916 \nPublished : March 10, 2025, 3:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in EPC Massive Dynamic. This issue affects Massive Dynamic: from n/a through 8.2. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T19:02:39.000000Z"}, {"uuid": "222d7cc7-4d5d-4c7f-bf0b-45de63810818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26916", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lk2nrhchuv22", "content": "", "creation_timestamp": "2025-03-10T23:00:06.204216Z"}, {"uuid": "70180b04-7d8d-4765-9410-36714a262693", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26916", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lk3vyvso6n2r", "content": "", "creation_timestamp": "2025-03-11T11:00:05.681173Z"}, {"uuid": "cedc9426-b3dd-4044-ae5e-a0744fdf2897", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26916", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3ljzv6vfnc32b", "content": "", "creation_timestamp": "2025-03-10T15:40:13.407887Z"}, {"uuid": "3b3339fe-9d6a-4969-8481-06f627d620c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26916", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljzv7jqdfe2h", "content": "", "creation_timestamp": "2025-03-10T15:40:37.073417Z"}, {"uuid": "20250332-b68b-417d-8b50-c11395bceca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26916", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114138952269738221", "content": "", "creation_timestamp": "2025-03-10T15:56:38.532653Z"}, {"uuid": "ee55b9a6-680d-4741-9317-8dbba6ed45ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26916", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "5992b379-10cc-4548-bcd6-c7c72e3c5d13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26916", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:32.000000Z"}, {"uuid": "4cd03d82-b02c-4f1e-a850-2fa31a081ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26916", "type": "seen", "source": "Telegram/HZBjUbZMPmlIQCJxncJyI_117UYR7lVI-91X3-V67rMcQiIV", "content": "", "creation_timestamp": "2025-03-10T19:39:06.000000Z"}]}