{"vulnerability": "cve-2025-48929", "sightings": [{"uuid": "b6202b8e-6562-4b2c-b1cf-ec690245c241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48929", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114586815688198231", "content": "", "creation_timestamp": "2025-05-28T18:14:10.744974Z"}, {"uuid": "d1487728-74f2-4fec-a326-5a01d8d1b801", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48929", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lqb65hklr624", "content": "", "creation_timestamp": "2025-05-28T21:40:17.174108Z"}, {"uuid": "ebc19fc1-e0ea-4e79-9565-eb692c09842e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48929", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/20083", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48929\n\ud83d\udd25 CVSS Score: 4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a later date if discovered by an adversary.\n\ud83d\udccf Published: 2025-05-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-07-01T19:47:22.186Z\n\ud83d\udd17 References:\n1. https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", "creation_timestamp": "2025-07-01T20:09:44.000000Z"}]}