{"vulnerability": "cve-2025-2067", "sightings": [{"uuid": "66c8ec42-30a2-4b5f-afc8-08ebed5dea5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20670", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lofpric5m22n", "content": "", "creation_timestamp": "2025-05-05T06:16:00.349649Z"}, {"uuid": "5892483c-ef18-48ae-affd-4533d239d5aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2067", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljrkdgxnw52f", "content": "", "creation_timestamp": "2025-03-07T08:04:37.369042Z"}, {"uuid": "20d395df-918e-48d8-9f0b-d5419e57a5e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20671", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lofpritbea2j", "content": "", "creation_timestamp": "2025-05-05T06:16:03.603204Z"}, {"uuid": "fd07ea18-4e7f-4bc2-a4d0-f2f95052bd8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20671", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114454003697734760", "content": "", "creation_timestamp": "2025-05-05T07:18:20.119913Z"}, {"uuid": "21aac999-849a-4fa1-be7c-10f55d51a97e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20672", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqlxwz2kdf2k", "content": "", "creation_timestamp": "2025-06-02T04:48:35.035090Z"}, {"uuid": "474389c2-3a97-4d06-a50d-1cd1d30c458f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20674", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqlvk25mfcm2", "content": "", "creation_timestamp": "2025-06-02T04:05:45.900297Z"}, {"uuid": "df6412b4-e027-4df1-b882-51cf79ee492f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20673", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqlvkbxtvln2", "content": "", "creation_timestamp": "2025-06-02T04:06:20.271075Z"}, {"uuid": "7f0e6577-5c6c-420d-abbc-264be239ac5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20677", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqlvk4lmsb42", "content": "", "creation_timestamp": "2025-06-02T04:06:43.863730Z"}, {"uuid": "a11d8e21-6c5e-43a4-877b-d0bc18cad3bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20675", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqlvk5ek4sb2", "content": "", "creation_timestamp": "2025-06-02T04:08:50.890124Z"}, {"uuid": "54b2bff1-1094-4915-a8e9-db3ca3819576", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20674", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqly7xljko2k", "content": "", "creation_timestamp": "2025-06-02T04:53:35.668422Z"}, {"uuid": "07cc1706-b35b-4e99-b80b-8a0f1c9aca4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20676", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqlwnpt2gl2e", "content": "", "creation_timestamp": "2025-06-02T04:25:29.592811Z"}, {"uuid": "891feeec-68aa-45ec-9d22-cf3ed289a09f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20678", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqlvjyvabm62", "content": "", "creation_timestamp": "2025-06-02T04:05:46.515868Z"}, {"uuid": "81ee94ea-b51a-4838-a3c0-fe501e0c79ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20677", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqlyiw344i2q", "content": "", "creation_timestamp": "2025-06-02T04:58:35.892533Z"}, {"uuid": "971457af-80ed-4c8a-9dd5-e2a7c7289d8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20678", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3m3pqfik6ss2g", "content": "", "creation_timestamp": "2025-10-21T16:21:18.533715Z"}, {"uuid": "d97a1be5-503a-4a82-b8bd-24b935f1dac6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20676", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqlvk5kwt3b2", "content": "", "creation_timestamp": "2025-06-02T04:05:56.348117Z"}, {"uuid": "878beeed-9fa5-4636-8f20-6fc66b6945ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2067", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:44.000000Z"}, {"uuid": "b64dd991-b741-4782-aec4-62b204eff38c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20675", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqlx45gmuj2e", "content": "", "creation_timestamp": "2025-06-02T04:33:33.586155Z"}, {"uuid": "94d330d3-0b61-468e-b740-cc149377619d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20678", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqlxf3wy3z2k", "content": "", "creation_timestamp": "2025-06-02T04:38:34.062275Z"}, {"uuid": "fdf38aca-f76f-4e2b-9568-ef761acafeae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20673", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqlxo2krzf2e", "content": "", "creation_timestamp": "2025-06-02T04:43:34.715818Z"}, {"uuid": "9c349adb-4193-492d-9d7b-f8dbe181c4f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2067", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:23.000000Z"}, {"uuid": "49091a5e-47f2-40a6-b1bb-c458dc1dda38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2067", "type": "seen", "source": "https://t.me/cvedetector/19788", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2067 - Projectworlds Life Insurance Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2067 \nPublished : March 7, 2025, 5:15 a.m. | 1\u00a0hour, 37\u00a0minutes ago \nDescription : A vulnerability was found in projectworlds Life Insurance Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /search.php. The manipulation of the argument key leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T08:14:52.000000Z"}, {"uuid": "1720e7c5-c09f-4f49-988a-53bbe9e7fcb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2067", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6792", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2067\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in projectworlds Life Insurance Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /search.php. The manipulation of the argument key leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-07T04:31:05.867Z\n\ud83d\udccf Modified: 2025-03-07T04:31:05.867Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.298823\n2. https://vuldb.com/?ctiid.298823\n3. https://vuldb.com/?submit.514762\n4. https://github.com/ubfbuz3/cve/issues/9", "creation_timestamp": "2025-03-07T04:34:04.000000Z"}, {"uuid": "90b060e7-d462-4d98-8ccc-7a60c8fab7bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2067", "type": "seen", "source": "Telegram/pN88h9kV9kUrY36gEMZZcngNymmsg42Bf33189vC7RHMHORG", "content": "", "creation_timestamp": "2025-03-08T04:34:56.000000Z"}, {"uuid": "36ef6d9b-fe0a-4dda-b3a9-cd86f0d53d1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20678", "type": "published-proof-of-concept", "source": "Telegram/evyU1N_0NEzlqWkLQZaMrYM3OKb94J6CqLDhasOVakxq7P0", "content": "", "creation_timestamp": "2025-06-02T17:01:55.000000Z"}, {"uuid": "9761add5-c5d7-4b23-b73d-54726072011b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20670", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14825", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20670\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772.\n\ud83d\udccf Published: 2025-05-05T02:49:16.856Z\n\ud83d\udccf Modified: 2025-05-05T02:49:16.856Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/May-2025", "creation_timestamp": "2025-05-05T03:19:54.000000Z"}, {"uuid": "c9e842a0-aaa3-45ad-8eb4-753783bfddb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20672", "type": "seen", "source": "Telegram/fX0om1lzt-J-U1vDcCreXz4a4OyDcfhKm_un5TOssmgFS9U", "content": "", "creation_timestamp": "2025-06-02T17:01:56.000000Z"}, {"uuid": "3c8d2dfa-1f3c-401b-bd8a-3f09d7f75d37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20674", "type": "seen", "source": "Telegram/fX0om1lzt-J-U1vDcCreXz4a4OyDcfhKm_un5TOssmgFS9U", "content": "", "creation_timestamp": "2025-06-02T17:01:56.000000Z"}, {"uuid": "48486d9a-79e6-485e-9cbc-3b5c80b1bf92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20671", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14827", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20671\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In thermal, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09698599; Issue ID: MSV-3228.\n\ud83d\udccf Published: 2025-05-05T02:49:13.461Z\n\ud83d\udccf Modified: 2025-05-05T02:49:13.461Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/May-2025", "creation_timestamp": "2025-05-05T03:19:56.000000Z"}, {"uuid": "7b857710-60ab-44ce-a617-d43fbdd50f93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20670", "type": "seen", "source": "https://t.me/cvedetector/24435", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20670 - Huawei Modem Certificate Validation Bypass Remote Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20670 \nPublished : May 5, 2025, 3:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T07:30:53.000000Z"}, {"uuid": "3e668de6-43be-4b7a-a0b9-ccc2735404a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2067", "type": "published-proof-of-concept", "source": "Telegram/5yp7nL0030ls3Gne3VU8N-XFXoAZl_f1wMfRIbXn_0P0E5M", "content": "", "creation_timestamp": "2025-03-07T06:02:24.000000Z"}, {"uuid": "07e500a6-b42d-42ff-8ca3-c1a4db89bf22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20671", "type": "seen", "source": "https://t.me/cvedetector/24436", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20671 - Thermal Out-of-Bounds Write Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20671 \nPublished : May 5, 2025, 3:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : In thermal, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09698599; Issue ID: MSV-3228. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T07:30:54.000000Z"}]}