{"vulnerability": "CVE-2025-1165", "sightings": [{"uuid": "9644264d-1c1c-40d9-9028-bcba8fcb90e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11652", "type": "seen", "source": "Telegram/R_GxXEeRer5kVi5nLeLcL052GAZFfig-LMnXOUBG_knIQyg", "content": "", "creation_timestamp": "2026-01-08T18:12:29.000000Z"}, {"uuid": "20493529-75b5-4c69-857b-e9f94f3897f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11651", "type": "published-proof-of-concept", "source": "Telegram/WIp-19cFECHu_hwH-OWXRA2nyjK5LkzfngLwe-whBDy50S8", "content": "", "creation_timestamp": "2026-01-08T19:12:51.000000Z"}, {"uuid": "b529dda2-5ced-49b4-85e5-8b3afb88e9a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "seen", "source": "Telegram/N3mDd0OzYAw1p4loOl4KYD7dnm7N3mA-5oGM4gQ63iax_nY7", "content": "", "creation_timestamp": "2025-02-14T10:01:38.000000Z"}, {"uuid": "971f1cf5-433e-4ad2-8467-839d71ebb3b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "published-proof-of-concept", "source": "Telegram/oYpT9FfnhKDDCRCq96vhDuDPYORP1VikoMTW0WhVgiwG2A0", "content": "", "creation_timestamp": "2025-02-11T02:00:19.000000Z"}, {"uuid": "81e97cfe-6f2a-4269-bcaa-4863dd6aab9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhusbvauif2m", "content": "", "creation_timestamp": "2025-02-11T04:14:32.532565Z"}, {"uuid": "043da2e6-8d83-4fcc-ad31-f818e8ee0444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-11652", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m32f7f36cy2i", "content": "", "creation_timestamp": "2025-10-13T04:35:08.111466Z"}, {"uuid": "3944c22b-8e66-4653-aaae-74ddb182c18e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982440858731555", "content": "", "creation_timestamp": "2025-02-11T00:33:42.326780Z"}, {"uuid": "906d2664-0e02-4048-8e00-f899550dfd73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuicdxh2y2o", "content": "", "creation_timestamp": "2025-02-11T01:15:48.600590Z"}, {"uuid": "160b36cb-eaa1-4c64-9624-fc8650a74b57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-11651", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m2zw2nafsz2m", "content": "", "creation_timestamp": "2025-10-13T00:04:03.534994Z"}, {"uuid": "28c04007-fb38-4045-a423-bd04eaa4c522", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "seen", "source": "https://t.me/cvedetector/17635", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1165 - Lumsoft ERP File Upload Unrestricted Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1165 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in Lumsoft ERP 8. Affected is the function DoUpload/DoWebUpload of the file /Api/FileUploadApi.ashx. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:08:03.000000Z"}]}