{"vulnerability": "CVE-2025-2094", "sightings": [{"uuid": "3f9b5406-5f22-468a-8c10-6477c724ae3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2094", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljthjqqsfk2w", "content": "", "creation_timestamp": "2025-03-08T02:19:47.136778Z"}, {"uuid": "4a831b86-1604-4ec1-baaf-74e4c8c912b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2094", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:36.000000Z"}, {"uuid": "816dc077-469a-44df-93db-d422435605d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2094", "type": "seen", "source": "https://t.me/cvedetector/19867", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2094 - TOTOLINK EX1800T OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2094 \nPublished : March 7, 2025, 10:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : A vulnerability was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. It has been rated as critical. Affected by this issue is the function setWiFiExtenderConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument apcliKey/key leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-08T00:58:48.000000Z"}, {"uuid": "1941f871-9095-4a1a-b845-632d8ae89aa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20947", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10831", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20947\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Improper handling of insufficient permission or privileges in ClipboardService prior to SMR Apr-2025 Release 1 allows local attackers to access image files across multiple users. User interaction is required for triggering this vulnerability.\n\ud83d\udccf Published: 2025-04-08T04:40:01.908Z\n\ud83d\udccf Modified: 2025-04-08T04:40:01.908Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04", "creation_timestamp": "2025-04-08T04:46:13.000000Z"}, {"uuid": "5e06dd78-a828-4530-9b7c-e8075da28d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2094", "type": "seen", "source": "Telegram/qh0zCeZUXoN4lOiujWxvfOOV-6ZsyRCS21QV1q8od_tHGnbL", "content": "", "creation_timestamp": "2025-03-08T04:36:10.000000Z"}, {"uuid": "562392c3-b81f-44c0-a98b-43a7123322e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20944", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lqovx6sb5m22", "content": "", "creation_timestamp": "2025-06-03T08:50:53.122962Z"}, {"uuid": "17305125-92ef-46b7-97fb-a10dedc08b6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2094", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6898", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2094\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. It has been rated as critical. Affected by this issue is the function setWiFiExtenderConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument apcliKey/key leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-07T21:31:09.611Z\n\ud83d\udccf Modified: 2025-03-07T22:27:35.683Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.298952\n2. https://vuldb.com/?ctiid.298952\n3. https://vuldb.com/?submit.515319\n4. https://github.com/kn0sky/cve/blob/main/TOTOLINK%20EX1800T/OS%20Command%20Injection%2001%20setWiFiExtenderConfig-_apcliKey.md\n5. https://www.totolink.net/", "creation_timestamp": "2025-03-07T22:35:47.000000Z"}, {"uuid": "54af7a35-a98d-4372-946d-3b46ba350310", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20940", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10837", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20940\n\ud83d\udd25 CVSS Score: 4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Improper handling of insufficient permission in Samsung Device Health Manager Service prior to SMR Apr-2025 Release 1 allows local attackers to access provider in SDMHS.\n\ud83d\udccf Published: 2025-04-08T04:39:54.112Z\n\ud83d\udccf Modified: 2025-04-08T04:39:54.112Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04", "creation_timestamp": "2025-04-08T04:46:22.000000Z"}, {"uuid": "593f660c-3605-4f9e-82de-fc080d45bea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20941", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10836", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20941\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Improper access control in InputManager to SMR Apr-2025 Release 1 allows local attackers to access the scancode of specific input device.\n\ud83d\udccf Published: 2025-04-08T04:39:55.352Z\n\ud83d\udccf Modified: 2025-04-08T04:39:55.352Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04", "creation_timestamp": "2025-04-08T04:46:21.000000Z"}, {"uuid": "682020e8-efea-4de1-835e-0f611bfad73f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20942", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10835", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20942\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Improper Verification of Intent by Broadcast Receiver in DeviceIdService prior to SMR Apr-2025 Release 1 allows local attackers to reset OAID.\n\ud83d\udccf Published: 2025-04-08T04:39:56.536Z\n\ud83d\udccf Modified: 2025-04-08T04:39:56.536Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04", "creation_timestamp": "2025-04-08T04:46:20.000000Z"}, {"uuid": "aa156765-1368-4baa-9f7b-779b63c9eb85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20943", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10834", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20943\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Out-of-bounds write in secfr trustlet prior to SMR Apr-2025 Release 1 allows local privileged attackers to cause memory corruption.\n\ud83d\udccf Published: 2025-04-08T04:39:58.167Z\n\ud83d\udccf Modified: 2025-04-08T04:39:58.167Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04", "creation_timestamp": "2025-04-08T04:46:19.000000Z"}, {"uuid": "fb3ef5cb-a1ac-4c31-8a14-0a0e85da4f33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20944", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10833", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20944\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Out-of-bounds read in parsing audio data in libsavsac.so prior to SMR Apr-2025 Release 1 allows local attackers to read out-of-bounds memory.\n\ud83d\udccf Published: 2025-04-08T04:39:59.420Z\n\ud83d\udccf Modified: 2025-04-08T04:39:59.420Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04", "creation_timestamp": "2025-04-08T04:46:18.000000Z"}, {"uuid": "754daa67-cf53-4d27-bfec-99f0fdd37e1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20945", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10832", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20945\n\ud83d\udd25 CVSS Score: 4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Improper access control in Galaxy Watch prior to SMR Apr-2025 Release 1 allows local attackers to access sensitive information of Galaxy watch.\n\ud83d\udccf Published: 2025-04-08T04:40:00.610Z\n\ud83d\udccf Modified: 2025-04-08T04:40:00.610Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04", "creation_timestamp": "2025-04-08T04:46:14.000000Z"}, {"uuid": "e1b6cbe9-ee02-4f4b-85f6-635a11084543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20948", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10830", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20948\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Out-of-bounds read in enrollment with cdsp frame secfr trustlet prior to SMR Apr-2025 Release 1 allows local privileged attackers to read out-of-bounds memory.\n\ud83d\udccf Published: 2025-04-08T04:40:03.518Z\n\ud83d\udccf Modified: 2025-04-08T04:40:03.518Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04", "creation_timestamp": "2025-04-08T04:46:12.000000Z"}, {"uuid": "c384dcb2-b243-41ec-b360-6a304f2a3033", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20946", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10853", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20946\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper handling of exceptional conditions in pairing specific bluetooth devices in Galaxy Watch Bluetooth pairing prior to SMR Apr-2025 Release 1 allows local attackers to pair with specific bluetooth devices without user interaction.\n\ud83d\udccf Published: 2025-04-08T04:50:11.304Z\n\ud83d\udccf Modified: 2025-04-08T04:50:11.304Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04", "creation_timestamp": "2025-04-08T05:47:28.000000Z"}, {"uuid": "899cf543-d09c-426e-b627-6a4018b2d8a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20941", "type": "seen", "source": "https://t.me/cvedetector/22412", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20941 - Logitech InputManager Unauthenticated Scancode Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-20941 \nPublished : April 8, 2025, 5:15 a.m. | 2\u00a0hours, 3\u00a0minutes ago \nDescription : Improper access control in InputManager to SMR Apr-2025 Release 1 allows local attackers to access the scancode of specific input device. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T09:48:51.000000Z"}, {"uuid": "3cfdc14a-d94a-441c-aa62-54225db2261f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20940", "type": "seen", "source": "https://t.me/cvedetector/22411", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20940 - Samsung Device Health Manager Service Permission Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20940 \nPublished : April 8, 2025, 5:15 a.m. | 2\u00a0hours, 3\u00a0minutes ago \nDescription : Improper handling of insufficient permission in Samsung Device Health Manager Service prior to SMR Apr-2025 Release 1 allows local attackers to access provider in SDMHS. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T09:48:50.000000Z"}, {"uuid": "9309686e-ccb3-4220-8b5b-e94ee00c622e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20946", "type": "seen", "source": "https://t.me/cvedetector/22407", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20946 - Galaxy Watch Bluetooth Vulnerability: Unauthenticated Bluetooth Pairing\", \n  \"Content\": \"CVE ID : CVE-2025-20946 \nPublished : April 8, 2025, 5:15 a.m. | 2\u00a0hours, 3\u00a0minutes ago \nDescription : Improper handling of exceptional conditions in pairing specific bluetooth devices in Galaxy Watch Bluetooth pairing prior to SMR Apr-2025 Release 1 allows local attackers to pair with specific bluetooth devices without user interaction. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T09:48:43.000000Z"}, {"uuid": "a29f51da-456b-4844-a871-c6fedd5a7168", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20945", "type": "seen", "source": "https://t.me/cvedetector/22406", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20945 - Samsung Galaxy Watch Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20945 \nPublished : April 8, 2025, 5:15 a.m. | 2\u00a0hours, 3\u00a0minutes ago \nDescription : Improper access control in Galaxy Watch prior to SMR Apr-2025 Release 1 allows local attackers to access sensitive information of Galaxy watch. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T09:48:43.000000Z"}, {"uuid": "4789221a-59d5-4122-af3b-a77162273cdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20942", "type": "seen", "source": "https://t.me/cvedetector/22413", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20942 - Google Android Intent Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20942 \nPublished : April 8, 2025, 5:15 a.m. | 2\u00a0hours, 3\u00a0minutes ago \nDescription : Improper Verification of Intent by Broadcast Receiver in DeviceIdService prior to SMR Apr-2025 Release 1 allows local attackers to reset OAID. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T09:48:51.000000Z"}, {"uuid": "955fcecb-5aca-44cd-8302-9ca359e34a2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20948", "type": "seen", "source": "https://t.me/cvedetector/22402", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20948 - Qualcomm Snapdragon CDSP Frame Secfr Trustlet OOB Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20948 \nPublished : April 8, 2025, 5:15 a.m. | 2\u00a0hours, 3\u00a0minutes ago \nDescription : Out-of-bounds read in enrollment with cdsp frame secfr trustlet prior to SMR Apr-2025 Release 1 allows local privileged attackers to read out-of-bounds memory. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T09:48:37.000000Z"}, {"uuid": "de321033-70fa-477c-be94-75da680758f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20947", "type": "seen", "source": "https://t.me/cvedetector/22401", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20947 - Microsoft ClipboardService Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20947 \nPublished : April 8, 2025, 5:15 a.m. | 2\u00a0hours, 3\u00a0minutes ago \nDescription : Improper handling of insufficient permission or privileges in ClipboardService prior to SMR Apr-2025 Release 1 allows local attackers to access image files across multiple users. User interaction is required for triggering this vulnerability. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T09:48:36.000000Z"}, {"uuid": "25856b92-2944-4f3f-9062-2d005e217535", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20946", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114301239272400759", "content": "", "creation_timestamp": "2025-04-08T07:48:21.255528Z"}, {"uuid": "deff9fc3-b719-4775-a1ba-cd7fd5eb6d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20946", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmbzf47cvk2g", "content": "", "creation_timestamp": "2025-04-08T08:06:58.023029Z"}, {"uuid": "e32f84be-6f68-4946-bb1d-5cb81f63088c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2094", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}]}