{"vulnerability": "cve-2025-2284", "sightings": [{"uuid": "a4a7f0f0-625c-4160-a6fb-93e990280609", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952551524178942", "content": "", "creation_timestamp": "2025-02-05T17:52:27.255595Z"}, {"uuid": "b6f07158-0092-43b7-b86c-234dd293e3ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22846", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhh6keqjwo2t", "content": "", "creation_timestamp": "2025-02-05T18:16:43.866843Z"}, {"uuid": "683797cb-2940-4f98-83f2-c1c5984b58a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22846", "type": "seen", "source": "https://t.me/cvedetector/17330", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22846 - F5 BIG-IP Unspecified Traffic Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2025-22846 \nPublished : Feb. 5, 2025, 6:15 p.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : When SIP Session and Router ALG profiles are configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  \n  \n  \n  \n\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T21:40:03.000000Z"}, {"uuid": "3032d654-9ffe-47e7-834f-0bb6461c280d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22847", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljjomgn4dc2l", "content": "", "creation_timestamp": "2025-03-04T04:59:57.030559Z"}, {"uuid": "4f592841-e91f-4254-b82d-a39ae49eddac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22841", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljjomgvot727", "content": "", "creation_timestamp": "2025-03-04T04:59:58.180002Z"}, {"uuid": "b4cd4744-0d36-4573-bcd8-63695b6010ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22847", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}, {"uuid": "585fca17-e55b-4bde-b5e1-e8f33d66c8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22847", "type": "seen", "source": "https://t.me/cvedetector/19453", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22847 - OpenHarmony OOB Read DOS\", \n  \"Content\": \"CVE ID : CVE-2025-22847 \nPublished : March 4, 2025, 4:15 a.m. | 22\u00a0minutes ago \nDescription : in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through  out-of-bounds read. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T05:48:01.000000Z"}, {"uuid": "94aa21a7-4a5c-424c-8a85-08b9f90b763e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22841", "type": "seen", "source": "https://t.me/cvedetector/19452", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22841 - OpenHarmony Out-of-Bounds Read DOS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22841 \nPublished : March 4, 2025, 4:15 a.m. | 22\u00a0minutes ago \nDescription : in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T05:48:00.000000Z"}, {"uuid": "8283daf1-0d39-42e5-a3fe-c3fbeeb1edc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2284", "type": "seen", "source": "https://t.me/cvedetector/20230", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2284 - Sante PACS Server Denial-of-Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2284 \nPublished : March 13, 2025, 5:15 p.m. | 43\u00a0minutes ago \nDescription : A denial-of-service vulnerability exists in the \"GetWebLoginCredentials\" function in \"Sante PACS Server.exe\". \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T19:48:05.000000Z"}, {"uuid": "83e3212e-f6e9-49ce-a833-07c45cdf494c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22841", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6327", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22841\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.\n\ud83d\udccf Published: 2025-03-04T03:44:42.029Z\n\ud83d\udccf Modified: 2025-03-04T03:44:42.029Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", "creation_timestamp": "2025-03-04T04:34:32.000000Z"}, {"uuid": "39ac665e-0196-4074-98b5-0fc961167e6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22842", "type": "seen", "source": "https://t.me/cvedetector/22247", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22842 - OpenHarmony Out-of-Bounds Read Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-22842 \nPublished : April 7, 2025, 3:15 a.m. | 1\u00a0hour, 8\u00a0minutes ago \nDescription : in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through  out-of-bounds read. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T07:01:26.000000Z"}, {"uuid": "940df8d9-b66a-4a07-9771-708e74951297", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22847", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6326", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22847\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through  out-of-bounds read.\n\ud83d\udccf Published: 2025-03-04T03:44:43.174Z\n\ud83d\udccf Modified: 2025-03-04T03:44:43.174Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", "creation_timestamp": "2025-03-04T04:34:31.000000Z"}, {"uuid": "e100ac47-fd98-4729-bcb4-bd5a9efbb72f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22843", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16443", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22843\n\ud83d\udd25 CVSS Score: 8.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Incorrect execution-assigned permissions for some Edge Orchestrator software for Intel(R) Tiber\u2122 Edge Platform may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-05-13T21:02:39.645Z\n\ud83d\udccf Modified: 2025-05-15T04:01:55.525Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html", "creation_timestamp": "2025-05-15T04:32:38.000000Z"}]}