{"vulnerability": "cve-2025-2008", "sightings": [{"uuid": "e6b7a512-f984-4462-84b2-575cdec7d472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20088", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbfiuret2f", "content": "", "creation_timestamp": "2025-01-15T17:16:35.623000Z"}, {"uuid": "ec114c4e-b916-4b56-aaa7-860617c97ae7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20086", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbfghxaa2r", "content": "", "creation_timestamp": "2025-01-15T17:16:33.230270Z"}, {"uuid": "d26341d5-00b6-4539-abcf-115ba4019f43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20083", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16618", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20083\n\ud83d\udd25 CVSS Score: 7.1 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Improper authentication in the firmware for the Intel(R) Slim Bootloader may allow a privileged user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-05-13T21:02:07.706Z\n\ud83d\udccf Modified: 2025-05-16T03:55:54.097Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01290.html", "creation_timestamp": "2025-05-16T04:33:58.000000Z"}, {"uuid": "70ec6433-3a57-485f-9dfc-aecf2b1489b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20083", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lp3hdg6xzk24", "content": "", "creation_timestamp": "2025-05-13T21:43:30.314771Z"}, {"uuid": "fe01bd0a-7eac-470c-9736-130779f06ba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20085", "type": "seen", "source": "https://infosec.place/objects/5651c9d6-1439-4848-b30f-92c6e70e799e", "content": "", "creation_timestamp": "2025-12-01T15:30:34.134655Z"}, {"uuid": "e21c0a5a-891f-4481-b861-32dca0d579d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20081", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:45.000000Z"}, {"uuid": "29a356c3-3f86-4df3-870b-ebd1098be4a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2008", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114261603503504354", "content": "", "creation_timestamp": "2025-04-01T07:48:26.248154Z"}, {"uuid": "4168da62-06e9-403b-bd84-32bee3a0211d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2008", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114261603503504354", "content": "", "creation_timestamp": "2025-04-01T07:48:26.255737Z"}, {"uuid": "cd548143-7f9c-49fd-8830-117d15c5173f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20081", "type": "seen", "source": "https://t.me/cvedetector/19459", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20081 - OpenHarmony Use After Free Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-20081 \nPublished : March 4, 2025, 4:15 a.m. | 22\u00a0minutes ago \nDescription : in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T05:48:11.000000Z"}, {"uuid": "76c3c90d-c305-4a60-aca3-b04fc50fe2fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20082", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16619", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20082\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Time-of-check time-of-use race condition in the UEFI firmware SmiVariable driver for the Intel(R) Server D50DNP and M50FCP boards may allow a privileged user to enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-05-13T21:02:06.185Z\n\ud83d\udccf Modified: 2025-05-16T03:55:52.704Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01269.html", "creation_timestamp": "2025-05-16T04:33:59.000000Z"}, {"uuid": "bb593828-5a26-4a9d-9dd9-5546dab60132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20088", "type": "seen", "source": "https://t.me/cvedetector/15488", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20088 - Mattermost Authentication Crash\", \n  \"Content\": \"CVE ID : CVE-2025-20088 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : Mattermost versions 10.2.x &lt;=&lt;=&lt;=&lt;=\nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:18:41.000000Z"}, {"uuid": "4ae17fef-c81c-414e-a236-60a672058e05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20086", "type": "seen", "source": "https://t.me/cvedetector/15487", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20086 - Mattermost Crashable Post Prop Validation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20086 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : Mattermost versions 10.2.x &lt;=&lt;=&lt;=&lt;=\nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:18:40.000000Z"}]}