{"vulnerability": "CVE-2025-0064", "sightings": [{"uuid": "d542c3a6-0306-4f8a-ad8d-8b4a655bc430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0064", "type": "seen", "source": "https://t.me/cvedetector/17634", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0064 - SAP BusinessObjects Business Intelligence Impersonation Token Generation\", \n  \"Content\": \"CVE ID : CVE-2025-0064 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : Under specific conditions, the Central Management Console of the SAP BusinessObjects Business Intelligence platform allows an attacker with admin rights to generate or retrieve a secret passphrase, enabling them to impersonate any user in the system. This results in a high impact on confidentiality and integrity, with no impact on availability. \nSeverity: 8.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:08:02.000000Z"}, {"uuid": "0df440f1-1946-4e54-8923-76a57ce00f77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0064", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113982969702867858", "content": "", "creation_timestamp": "2025-02-11T02:48:13.268983Z"}, {"uuid": "368d37f0-31b4-4733-88a1-73b9f102321f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0064", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhusbvl5xo2w", "content": "", "creation_timestamp": "2025-02-11T04:14:35.546860Z"}, {"uuid": "928db44e-6005-42d1-bd3f-20c7fb9977bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0064", "type": "seen", "source": "Telegram/fDpnFMDycR34vnlZyVn6O0P_sOi8Y8G1NOFj_RFl-QCg24A", "content": "", "creation_timestamp": "2025-02-11T03:01:32.000000Z"}, {"uuid": "024dce53-7ec2-4e34-8688-b18ad23ad64c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0064", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982529620441491", "content": "", "creation_timestamp": "2025-02-11T00:56:17.788473Z"}, {"uuid": "d9c1c90d-de8c-470f-a30f-769d38f32a02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0064", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuicb5ql522", "content": "", "creation_timestamp": "2025-02-11T01:15:45.789264Z"}]}