{"vulnerability": "CVE-2025-20234", "sightings": [{"uuid": "a9e5f480-dbc7-49f7-8a58-501c5865fab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrvssnykqq2s", "content": "", "creation_timestamp": "2025-06-18T20:08:29.555998Z"}, {"uuid": "2472b536-017a-410a-8554-33a55e640bf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20234", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-417/", "content": "", "creation_timestamp": "2025-06-23T03:00:00.000000Z"}, {"uuid": "d1733397-0719-468f-b0ca-7dfb7ec420cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20234", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3ls2nv4wgye2p", "content": "", "creation_timestamp": "2025-06-20T18:23:42.614098Z"}, {"uuid": "49478035-517f-4930-b1dc-8d2c1faa6e2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20234", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18783", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20234\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\n\nThis vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.\nFor a description of this vulnerability, see the .\n\ud83d\udccf Published: 2025-06-18T16:20:01.175Z\n\ud83d\udccf Modified: 2025-06-18T16:20:01.175Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-udf-hmwd9nDy\n2. https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html", "creation_timestamp": "2025-06-18T16:43:31.000000Z"}]}