{"vulnerability": "CVE-2025-2424", "sightings": [{"uuid": "11b642af-90eb-424f-aea5-ac1248075b2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2424", "type": "seen", "source": "https://t.me/cvedetector/22874", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2424 - Mattermost File Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-2424 \nPublished : April 14, 2025, 3:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : Mattermost versions 10.5.x &lt;=&lt;=\nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-14T18:51:33.000000Z"}, {"uuid": "60502ff8-6413-4416-92fe-dbe019e782bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24244", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114260469802135825", "content": "", "creation_timestamp": "2025-04-01T03:00:07.320830Z"}, {"uuid": "5cee9c58-d555-4048-b859-94cc188b0c9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24244", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114260469802135825", "content": "", "creation_timestamp": "2025-04-01T03:00:07.324063Z"}, {"uuid": "f7731032-db40-42aa-ab98-72edcaa52826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24243", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-189/", "content": "", "creation_timestamp": "2025-04-01T03:00:00.000000Z"}, {"uuid": "74eeefbc-49d6-4814-8eab-e64287d6e792", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24244", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-188/", "content": "", "creation_timestamp": "2025-04-01T03:00:00.000000Z"}, {"uuid": "0e0e187a-a6e1-4d1e-baef-70a77abc1293", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24242", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9797", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24242\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.4. An app with root privileges may be able to access private information.\n\ud83d\udccf Published: 2025-03-31T22:24:20.418Z\n\ud83d\udccf Modified: 2025-03-31T22:24:20.418Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122373", "creation_timestamp": "2025-03-31T23:31:37.000000Z"}, {"uuid": "6d00f167-38e9-4ce8-bc04-4e1f525a80b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24248", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9962", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24248\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to enumerate devices that have signed into the user's Apple Account.\n\ud83d\udccf Published: 2025-03-31T22:23:42.649Z\n\ud83d\udccf Modified: 2025-04-01T18:21:31.839Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122373", "creation_timestamp": "2025-04-01T18:32:39.000000Z"}, {"uuid": "db97b0a3-43e6-42e1-8de6-d2937db7c37e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24244", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10110", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24244\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted font may result in the disclosure of process memory.\n\ud83d\udccf Published: 2025-03-31T22:23:49.162Z\n\ud83d\udccf Modified: 2025-04-02T15:20:35.922Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122377\n2. https://support.apple.com/en-us/122371\n3. https://support.apple.com/en-us/122372\n4. https://support.apple.com/en-us/122373\n5. https://support.apple.com/en-us/122374\n6. https://support.apple.com/en-us/122375", "creation_timestamp": "2025-04-02T15:33:44.000000Z"}, {"uuid": "7d185958-cf54-433a-a00a-722a5567da8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2424", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmryimatkb2r", "content": "", "creation_timestamp": "2025-04-14T16:33:38.293951Z"}, {"uuid": "e8e0a7a9-5e7f-42c0-924c-22ef27d8e91d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24249", "type": "seen", "source": "Telegram/A1zSU9KcM20ZRLemoMFRz3NG5DsD-KNcnO6EGaNoIwAY1a4", "content": "", "creation_timestamp": "2026-04-02T22:15:08.000000Z"}, {"uuid": "5de193f2-b42b-4276-b21e-dd4730ce553e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24243", "type": "seen", "source": "Telegram/A1zSU9KcM20ZRLemoMFRz3NG5DsD-KNcnO6EGaNoIwAY1a4", "content": "", "creation_timestamp": "2026-04-02T22:15:08.000000Z"}, {"uuid": "49ca3ff6-3000-475a-a8a0-43d7c7abddaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24246", "type": "seen", "source": "Telegram/A1zSU9KcM20ZRLemoMFRz3NG5DsD-KNcnO6EGaNoIwAY1a4", "content": "", "creation_timestamp": "2026-04-02T22:15:08.000000Z"}, {"uuid": "768d4947-7199-4a2f-ba1d-8b0e2f630fcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24247", "type": "seen", "source": "Telegram/A1zSU9KcM20ZRLemoMFRz3NG5DsD-KNcnO6EGaNoIwAY1a4", "content": "", "creation_timestamp": "2026-04-02T22:15:08.000000Z"}, {"uuid": "817c872b-cd59-46c1-9769-24e36f12a23d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24241", "type": "seen", "source": "Telegram/A1zSU9KcM20ZRLemoMFRz3NG5DsD-KNcnO6EGaNoIwAY1a4", "content": "", "creation_timestamp": "2026-04-02T22:15:08.000000Z"}, {"uuid": "a6b2edd4-3651-43bb-a137-ccd3a9201a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24249", "type": "seen", "source": "Telegram/LEjwKyu_BTB6b6mFnoSKeIfUM-CoxQ2buHbucYd1vZ1GovQ", "content": "", "creation_timestamp": "2026-04-02T22:15:13.000000Z"}, {"uuid": "23ff3942-cf89-4ba3-a1fb-b26912a2d824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24247", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9905", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24247\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker may be able to cause unexpected app termination.\n\ud83d\udccf Published: 2025-03-31T22:23:00.495Z\n\ud83d\udccf Modified: 2025-04-01T14:22:20.596Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122373\n2. https://support.apple.com/en-us/122374\n3. https://support.apple.com/en-us/122375", "creation_timestamp": "2025-04-01T14:33:07.000000Z"}]}