{"vulnerability": "cve-2025-2064", "sightings": [{"uuid": "1a144485-651b-4de7-b0a0-fc28db47e03c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20640", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhaoo4d7yw2t", "content": "", "creation_timestamp": "2025-02-03T04:16:30.870232Z"}, {"uuid": "8b6eb545-5133-4c00-84af-b7a5fec897e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20641", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhaoo73b5327", "content": "", "creation_timestamp": "2025-02-03T04:16:34.245802Z"}, {"uuid": "0f37aa1d-4940-45c9-a47a-e67085b13692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20642", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhaoobi2fb2f", "content": "", "creation_timestamp": "2025-02-03T04:16:36.477184Z"}, {"uuid": "70c26e57-c6f0-4d09-860f-f06e6d07eaf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20643", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhaoodjpqn2w", "content": "", "creation_timestamp": "2025-02-03T04:16:38.452328Z"}, {"uuid": "3113fc14-fe64-473a-bd2e-39aaa09a1ada", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20643", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhb3eg4e542w", "content": "", "creation_timestamp": "2025-02-03T08:03:52.244712Z"}, {"uuid": "b9a5ae12-a592-4cee-b8b2-e93b49c0a9a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20640", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhb3ef7kvf2k", "content": "", "creation_timestamp": "2025-02-03T08:03:47.822731Z"}, {"uuid": "c0d912a3-7c5c-4b22-aee6-c31a66467b3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20641", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhb3efhuul2e", "content": "", "creation_timestamp": "2025-02-03T08:03:48.938023Z"}, {"uuid": "3dd57519-5eff-4eb3-840c-9dfc7ddc3331", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20642", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhb3efowgg2r", "content": "", "creation_timestamp": "2025-02-03T08:03:50.017914Z"}, {"uuid": "62923018-67f5-41e0-ad74-c7a744ff27cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20647", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljh4yl5zcw2a", "content": "", "creation_timestamp": "2025-03-03T04:39:16.559047Z"}, {"uuid": "7e2e56e3-1244-4a7f-96bf-67f1deaa996f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20646", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljh4ylgvbm2o", "content": "", "creation_timestamp": "2025-03-03T04:39:17.738673Z"}, {"uuid": "bca1f882-6822-43a0-896d-ca2b47da0f48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2064", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljrkdh3lu32e", "content": "", "creation_timestamp": "2025-03-07T08:04:37.911746Z"}, {"uuid": "389cb3a1-9fb7-49bf-89a9-d12c998495bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20649", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljh4ym3fqo2a", "content": "", "creation_timestamp": "2025-03-03T04:39:19.792985Z"}, {"uuid": "27d938e6-31c2-4929-9e10-2e35edb41bfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20644", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljh4ymgfsw2d", "content": "", "creation_timestamp": "2025-03-03T04:39:21.066370Z"}, {"uuid": "14e9ab98-1f41-4db8-8784-be3fc3ef2db7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20648", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:28.000000Z"}, {"uuid": "0503887a-3389-4fcf-931a-70cdcf2d302b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20649", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:28.000000Z"}, {"uuid": "bb95f64c-6cdd-4b77-a88e-61b12eb2912b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20646", "type": "seen", "source": "https://t.me/cvedetector/19293", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20646 - Aruba WLAN AP Firmware Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20646 \nPublished : March 3, 2025, 3:15 a.m. | 35\u00a0minutes ago \nDescription : In wlan AP FW, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389074; Issue ID: MSV-1803. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T05:29:58.000000Z"}, {"uuid": "8b31b3ab-a631-4a79-b836-d9a29b871990", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20649", "type": "seen", "source": "https://t.me/cvedetector/19296", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20649 - Intel Bluetooth Stack Missing Permission Check Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20649 \nPublished : March 3, 2025, 3:15 a.m. | 35\u00a0minutes ago \nDescription : In Bluetooth Stack SW, there is a possible information disclosure due to a missing permission check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00396437; Issue ID: MSV-2184. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T05:30:04.000000Z"}, {"uuid": "f358e61e-f9ba-44fb-95bf-f5bb292383e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20648", "type": "seen", "source": "https://t.me/cvedetector/19295", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20648 - Apu APU Out-of-Bounds Read Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-20648 \nPublished : March 3, 2025, 3:15 a.m. | 35\u00a0minutes ago \nDescription : In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09456673; Issue ID: MSV-2584. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T05:30:03.000000Z"}, {"uuid": "0cffc3b0-cbfc-45f6-9e38-96dc91b97639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20647", "type": "seen", "source": "https://t.me/cvedetector/19294", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20647 - \"Modem Remote Denial of Service Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-20647 \nPublished : March 3, 2025, 3:15 a.m. | 35\u00a0minutes ago \nDescription : In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00791311 /  MOLY01067019; Issue ID: MSV-2721. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T05:30:02.000000Z"}, {"uuid": "7f37484b-551a-4065-9176-512fd71fafd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20645", "type": "seen", "source": "https://t.me/cvedetector/19292", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20645 - KeyInstall Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20645 \nPublished : March 3, 2025, 3:15 a.m. | 35\u00a0minutes ago \nDescription : In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09475476; Issue ID: MSV-2599. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T05:29:58.000000Z"}, {"uuid": "31e9a491-ccd1-49ca-adc7-80bd38f8a5be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20644", "type": "seen", "source": "https://t.me/cvedetector/19291", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20644 - \"Modem Denial of Service Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-20644 \nPublished : March 3, 2025, 3:15 a.m. | 35\u00a0minutes ago \nDescription : In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T05:29:57.000000Z"}, {"uuid": "ea9eb1b3-7017-4e8d-8e7f-0bf90e89275a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2064", "type": "seen", "source": "https://t.me/cvedetector/19779", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2064 - Projectworlds Life Insurance Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2064 \nPublished : March 7, 2025, 4:15 a.m. | 36\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in projectworlds Life Insurance Management System 1.0. Affected by this issue is some unknown functionality of the file /deletePayment.php. The manipulation of the argument recipt_no leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T06:34:23.000000Z"}, {"uuid": "dbdeb000-32ba-4615-82aa-7b8198ffe24d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20641", "type": "seen", "source": "https://t.me/cvedetector/17038", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20641 - Dell Authenticate Out-of-Bounds Write Vulnerability (Local Privilege Escalation)\", \n  \"Content\": \"CVE ID : CVE-2025-20641 \nPublished : Feb. 3, 2025, 4:15 a.m. | 1\u00a0hour, 43\u00a0minutes ago \nDescription : In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2058. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T07:46:36.000000Z"}, {"uuid": "0dde9181-fb0e-45fe-a53c-faa1a8fe4a41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2064", "type": "seen", "source": "Telegram/prGLvRVHywXsA1tTIMGjxb680PE9-fEYqgF4-6_YpAWerJY1", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}, {"uuid": "fd0e49f6-1c67-4809-bec7-be40060e25d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20648", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6139", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20648\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09456673; Issue ID: MSV-2584.\n\ud83d\udccf Published: 2025-03-03T02:25:42.280Z\n\ud83d\udccf Modified: 2025-03-03T02:25:42.280Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2025", "creation_timestamp": "2025-03-03T03:33:44.000000Z"}, {"uuid": "9ae222b1-d152-4caf-bc33-c07c9d32ffe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20649", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6138", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20649\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Bluetooth Stack SW, there is a possible information disclosure due to a missing permission check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00396437; Issue ID: MSV-2184.\n\ud83d\udccf Published: 2025-03-03T02:25:43.966Z\n\ud83d\udccf Modified: 2025-03-03T02:25:43.966Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2025", "creation_timestamp": "2025-03-03T03:33:43.000000Z"}, {"uuid": "1b7f84e5-803e-4c03-9e82-26a4aa79bdb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20644", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6143", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20644\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747.\n\ud83d\udccf Published: 2025-03-03T02:25:27.877Z\n\ud83d\udccf Modified: 2025-03-03T02:25:27.877Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2025", "creation_timestamp": "2025-03-03T03:33:50.000000Z"}, {"uuid": "a49d3c1c-f974-4784-9b9e-43c2204c8288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20645", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6142", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20645\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09475476; Issue ID: MSV-2599.\n\ud83d\udccf Published: 2025-03-03T02:25:29.510Z\n\ud83d\udccf Modified: 2025-03-03T02:25:29.510Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2025", "creation_timestamp": "2025-03-03T03:33:49.000000Z"}, {"uuid": "c8c99e2a-895a-4786-be24-81c6e606737a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20646", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6141", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20646\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In wlan AP FW, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389074; Issue ID: MSV-1803.\n\ud83d\udccf Published: 2025-03-03T02:25:31.065Z\n\ud83d\udccf Modified: 2025-03-03T02:25:31.065Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2025", "creation_timestamp": "2025-03-03T03:33:45.000000Z"}, {"uuid": "7117d58b-02ee-431a-ac16-aaa3b41b7171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20647", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6140", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20647\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00791311 /  MOLY01067019; Issue ID: MSV-2721.\n\ud83d\udccf Published: 2025-03-03T02:25:32.706Z\n\ud83d\udccf Modified: 2025-03-03T02:25:32.706Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2025", "creation_timestamp": "2025-03-03T03:33:44.000000Z"}, {"uuid": "6b7f1210-43f4-4c18-9bcb-15ce66d1d651", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2064", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6795", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2064\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in projectworlds Life Insurance Management System 1.0. Affected by this issue is some unknown functionality of the file /deletePayment.php. The manipulation of the argument recipt_no leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-07T04:00:09.372Z\n\ud83d\udccf Modified: 2025-03-07T04:00:09.372Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.298820\n2. https://vuldb.com/?ctiid.298820\n3. https://vuldb.com/?submit.514751\n4. https://github.com/ubfbuz3/cve/issues/6", "creation_timestamp": "2025-03-07T04:34:07.000000Z"}, {"uuid": "084bb763-92b1-4109-b654-e03288e2526d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20647", "type": "seen", "source": "Telegram/xKHI-T-LGOC-t9WKYC0AbjLWq9cXmjnrD0T6qJ2Xgzl-6UA", "content": "", "creation_timestamp": "2026-01-12T17:04:50.000000Z"}, {"uuid": "766fbba9-336d-4a26-a713-81698221d8fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20643", "type": "seen", "source": "https://t.me/cvedetector/17040", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20643 - \"Dell Alienware out-of-bounds read vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-20643 \nPublished : Feb. 3, 2025, 4:15 a.m. | 1\u00a0hour, 43\u00a0minutes ago \nDescription : In DA, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, if a malicious actor has already obtained the System privilege. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2056. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T07:46:40.000000Z"}, {"uuid": "ab016615-e4b1-4836-af69-b052d1b0bc78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20642", "type": "seen", "source": "https://t.me/cvedetector/17039", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20642 - Dell Access Point Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20642 \nPublished : Feb. 3, 2025, 4:15 a.m. | 1\u00a0hour, 43\u00a0minutes ago \nDescription : In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2057. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T07:46:37.000000Z"}, {"uuid": "f4eae832-d4a9-419e-8687-fb6b8025880e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20640", "type": "seen", "source": "https://t.me/cvedetector/17037", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20640 - Dell Anywhere Workspace Out of Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20640 \nPublished : Feb. 3, 2025, 4:15 a.m. | 1\u00a0hour, 43\u00a0minutes ago \nDescription : In DA, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2059. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T07:46:35.000000Z"}, {"uuid": "d951a980-4ea2-4a7c-882b-5126f1ed0542", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2064", "type": "published-proof-of-concept", "source": "Telegram/5yp7nL0030ls3Gne3VU8N-XFXoAZl_f1wMfRIbXn_0P0E5M", "content": "", "creation_timestamp": "2025-03-07T06:02:24.000000Z"}]}