{"vulnerability": "CVE-2025-2090", "sightings": [{"uuid": "a7cdf0a8-f063-4875-ace9-f273bed13df0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20904", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113944437768898733", "content": "", "creation_timestamp": "2025-02-04T07:29:01.231546Z"}, {"uuid": "5a350909-b91d-48e7-9bb0-b214c4f63213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20905", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113944437787766779", "content": "", "creation_timestamp": "2025-02-04T07:29:01.688974Z"}, {"uuid": "4b5b1b07-4cf6-4fa4-ad96-a9bdb5a49de8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20900", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdmks2bpz2f", "content": "", "creation_timestamp": "2025-02-04T08:16:51.273288Z"}, {"uuid": "0f06f35b-caeb-4b45-8d1b-c974154594bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20905", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdml3wgp42w", "content": "", "creation_timestamp": "2025-02-04T08:17:02.053909Z"}, {"uuid": "7986e2b5-89cf-4dbd-920b-c4bcf9e679c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20901", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhe23z4ptq2e", "content": "", "creation_timestamp": "2025-02-04T12:19:11.993032Z"}, {"uuid": "f0158297-07a2-400d-acfc-f752c8e422bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20905", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhe23zhdhh25", "content": "", "creation_timestamp": "2025-02-04T12:19:13.476473Z"}, {"uuid": "9900b1e0-af75-46f8-99a0-7c113d4ad324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2090", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:35.000000Z"}, {"uuid": "59c07409-85db-42ef-831e-6d7518855f9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20904", "type": "seen", "source": "Telegram/p0hQGSzciMLxHZoCHB7bqLKiP0jooCuqju6vVWjaYzfndD4t", "content": "", "creation_timestamp": "2025-02-14T10:05:07.000000Z"}, {"uuid": "39b0f1f1-84c6-41a6-bc30-16ef335c7b37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20909", "type": "seen", "source": "Telegram/FUbA-y0qb9CMAdoISJ_Vy1VysW8_vrZGqagq8QnYj1ULYNa9", "content": "", "creation_timestamp": "2025-03-08T04:34:09.000000Z"}, {"uuid": "db6e6a7b-6080-4510-9f8f-9226fa54b02c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20908", "type": "seen", "source": "Telegram/XyKbC1v41QHfnJoc1ld5OTL88I6k9icG3I3NLBAEbIsLYHf7", "content": "", "creation_timestamp": "2025-03-08T04:34:09.000000Z"}, {"uuid": "a1ccd843-42eb-4944-86d3-f05c9ad8d7a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20903", "type": "seen", "source": "Telegram/XAIzYFYFcLbUvYnmEfvTBST5cPXD1RLrS1ekNLZsrnUNHLTp", "content": "", "creation_timestamp": "2025-03-08T04:34:09.000000Z"}, {"uuid": "712a4be3-6f6e-4e01-87cb-942dcc7925f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2090", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6840", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2090\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/add-subadmin.php of the component Sub Admin Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-07T15:00:16.296Z\n\ud83d\udccf Modified: 2025-03-07T15:00:16.296Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.298904\n2. https://vuldb.com/?ctiid.298904\n3. https://vuldb.com/?submit.515017\n4. https://github.com/SECWG/cve/issues/3\n5. https://phpgurukul.com/", "creation_timestamp": "2025-03-07T15:35:17.000000Z"}, {"uuid": "3f883b7b-79b2-4488-a3ce-23698d4a6d23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20905", "type": "seen", "source": "https://t.me/cvedetector/17158", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20905 - NCR mPOS TUI Trustlet OOB R/W Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20905 \nPublished : Feb. 4, 2025, 8:15 a.m. | 43\u00a0minutes ago \nDescription : Out-of-bounds read and write in mPOS TUI trustlet prior to SMR Feb-2025 Release 1 allows local privileged attackers to read and write out-of-bounds memory. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T10:32:27.000000Z"}, {"uuid": "a6c84363-3828-40e8-92a0-e47ec9a531da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20902", "type": "seen", "source": "https://t.me/cvedetector/17165", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20902 - Android Media Controller Escalation of Privilege\", \n  \"Content\": \"CVE ID : CVE-2025-20902 \nPublished : Feb. 4, 2025, 8:15 a.m. | 43\u00a0minutes ago \nDescription : Improper access control in Media Controller prior to version 1.0.24.5282 allows local attacker to launch activities in MediaController's privilege. \nSeverity: 5.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T10:32:35.000000Z"}, {"uuid": "f4dab89c-e003-4b7e-b100-210dd5b823a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20901", "type": "seen", "source": "https://t.me/cvedetector/17164", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20901 - Blockchain Keystore Out-of-bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20901 \nPublished : Feb. 4, 2025, 8:15 a.m. | 43\u00a0minutes ago \nDescription : Out-of-bounds read in Blockchain Keystore prior to version 1.3.16.5 allows local privileged attackers to read out-of-bounds memory. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T10:32:34.000000Z"}, {"uuid": "e5b5ed72-ed57-4978-8380-42091369cffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20900", "type": "seen", "source": "https://t.me/cvedetector/17163", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20900 - Blockchain Keystore OOB Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20900 \nPublished : Feb. 4, 2025, 8:15 a.m. | 43\u00a0minutes ago \nDescription : Out-of-bounds write in Blockchain Keystore prior to version 1.3.16.5 allows local privileged attackers to write out-of-bounds memory. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T10:32:33.000000Z"}, {"uuid": "31851dc8-40ae-4637-8abc-ed058ee02b42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2090", "type": "seen", "source": "Telegram/T_wH6mg8JJrlhOo0fD0n87zd4nxxC1od5yPPzeoIxxx-lQyj", "content": "", "creation_timestamp": "2025-03-08T04:34:57.000000Z"}, {"uuid": "8c981715-4eaf-4e78-ae06-e9d888c763df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20907", "type": "seen", "source": "Telegram/IoiQjBIWBHcIbgJCgVRl48Xlb3adkq4HFfzFSJI62j2VjfYQ", "content": "", "creation_timestamp": "2025-02-14T10:05:07.000000Z"}, {"uuid": "05f1a125-f63c-41e3-bba6-c77dbbabd34f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20905", "type": "seen", "source": "Telegram/GLdxAwoj0NYLNnldMi3pM7nIL0aXHcWgs5EZh57Xmjt9MJKm", "content": "", "creation_timestamp": "2025-02-14T10:05:07.000000Z"}, {"uuid": "1085d899-89fd-489b-8e10-64c538034afe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20907", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdmlazknb2f", "content": "", "creation_timestamp": "2025-02-04T08:17:07.068539Z"}, {"uuid": "3afed74d-bdff-4c16-9acc-8fe4ca74d08e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20906", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdml6hnxt2e", "content": "", "creation_timestamp": "2025-02-04T08:17:04.443511Z"}, {"uuid": "d295a4ff-cfef-4346-b400-59a1d64c04aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20904", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdmkzraad2t", "content": "", "creation_timestamp": "2025-02-04T08:16:59.343636Z"}, {"uuid": "c25ce135-cba6-499d-8000-dcbf83cac279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20902", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdmkwtmgl2j", "content": "", "creation_timestamp": "2025-02-04T08:16:56.264177Z"}, {"uuid": "8f902d17-69be-4982-99aa-faa94278ecfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20901", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhdmkuhcbf2c", "content": "", "creation_timestamp": "2025-02-04T08:16:53.894790Z"}, {"uuid": "1e343fa7-a628-4054-b7b4-f514a9bb51b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2090", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "4012e137-4529-4584-ae54-0fc25fc922a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2090", "type": "seen", "source": "https://t.me/cvedetector/19836", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2090 - PHPGurukul Pre-School Enrollment System Sub Admin Handler Remote Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2090 \nPublished : March 7, 2025, 3:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/add-subadmin.php of the component Sub Admin Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T18:17:25.000000Z"}, {"uuid": "6e6ddcfe-77c8-42bd-a465-20fb638010f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20907", "type": "seen", "source": "https://t.me/cvedetector/17160", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20907 - Samsung Find Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20907 \nPublished : Feb. 4, 2025, 8:15 a.m. | 43\u00a0minutes ago \nDescription : Improper privilege management in Samsung Find prior to SMR Feb-2025 Release 1 allows local privileged attackers to disable Samsung Find. \nSeverity: 6.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T10:32:28.000000Z"}, {"uuid": "5ce1fb06-9c7d-496d-af04-508268b5acfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2090", "type": "seen", "source": "Telegram/GxJIdxxx8oCVcYXLLKOViti2Xi0I6qHDmCn0Qhzp-BiNzm6X", "content": "", "creation_timestamp": "2025-03-08T04:35:53.000000Z"}, {"uuid": "bdc5b1f3-2fd4-41ac-9f18-a26133ea5114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20906", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113944496791279440", "content": "", "creation_timestamp": "2025-02-04T07:44:01.894099Z"}, {"uuid": "55900873-f56b-4ff0-b786-5b7ebf675ffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20907", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113944496805784548", "content": "", "creation_timestamp": "2025-02-04T07:44:02.208433Z"}, {"uuid": "ea4b69ca-01f6-48d8-a9ba-0bd6c55f099a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20900", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhe23xomdb2w", "content": "", "creation_timestamp": "2025-02-04T12:19:06.282968Z"}, {"uuid": "21f24b50-50b0-49b1-bd6b-89f997bc3815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20902", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhe23yenk42k", "content": "", "creation_timestamp": "2025-02-04T12:19:08.425901Z"}, {"uuid": "f4502eb4-0cbe-4e0c-a57d-3634241eb379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20906", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhe23ysq772k", "content": "", "creation_timestamp": "2025-02-04T12:19:10.523710Z"}, {"uuid": "b0ed042b-f400-4a79-ab87-79c7bf778d41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20907", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhe23yvyi52g", "content": "", "creation_timestamp": "2025-02-04T12:19:11.032735Z"}, {"uuid": "68f522bb-bfbb-456b-b551-43c8ede79dfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2090", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljsfhmfim72e", "content": "", "creation_timestamp": "2025-03-07T16:10:10.638687Z"}, {"uuid": "05dd367e-babd-4398-83dd-c8da8f369293", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20906", "type": "seen", "source": "https://t.me/cvedetector/17159", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20906 - Google Android Settings Unsecured Component Export Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20906 \nPublished : Feb. 4, 2025, 8:15 a.m. | 43\u00a0minutes ago \nDescription : Improper Export of Android Application Components in Settings prior to SMR Feb-2025 Release 1 allows local attackers to enable ADB. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T10:32:28.000000Z"}, {"uuid": "be97ca3d-cb1a-4930-97e7-a1c22ccd2868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20904", "type": "seen", "source": "https://t.me/cvedetector/17157", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20904 - Verifone mPOS TUI Trustlet Out-of-Bounds Write Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20904 \nPublished : Feb. 4, 2025, 8:15 a.m. | 43\u00a0minutes ago \nDescription : Out-of-bounds write in mPOS TUI trustlet prior to SMR Feb-2025 Release 1 allows local privileged attackers to cause memory corruption. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T10:32:26.000000Z"}]}