{"vulnerability": "cve-2025-2000", "sightings": [{"uuid": "8a72a756-feb9-4b8d-96b9-6dfa80c1015f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20002", "type": "seen", "source": "https://t.me/cvedetector/19566", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20002 - \"GMOD Apollo Local Path Information Disclosure Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-20002 \nPublished : March 5, 2025, 12:15 a.m. | 35\u00a0minutes ago \nDescription : After attempting to upload a file that does not meet prerequisites, GMOD Apollo will respond with local path information disclosure \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T01:53:18.000000Z"}, {"uuid": "9aaecbc6-d358-4898-b69e-41b50a137ae4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20002", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6464", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20002\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: After attempting to upload a file that does not meet prerequisites, GMOD Apollo will respond with local path information disclosure\n\ud83d\udccf Published: 2025-03-05T00:08:13.877Z\n\ud83d\udccf Modified: 2025-03-05T00:10:29.116Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-07\n2. https://github.com/GMOD/Apollo", "creation_timestamp": "2025-03-05T00:33:46.000000Z"}, {"uuid": "cc13f2c5-531a-443f-9179-78226270003f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20003", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16438", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20003\n\ud83d\udd25 CVSS Score: 7.3 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Improper link resolution before file access ('Link Following') for some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-05-13T21:01:26.302Z\n\ud83d\udccf Modified: 2025-05-15T04:02:12.301Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html", "creation_timestamp": "2025-05-15T04:32:33.000000Z"}, {"uuid": "ad9b6a74-ad64-46fc-ad9b-644d8f65d688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2000", "type": "seen", "source": "https://t.me/cvedetector/20308", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2000 - Qiskit QPY File Deserialization Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2000 \nPublished : March 14, 2025, 1:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats &lt; 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T16:42:44.000000Z"}, {"uuid": "bdbe1edd-feda-43fc-8ccc-6d76c2480c18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2000", "type": "seen", "source": "Telegram/7JMoJAQEhPOIVteXEuNh9KSphNivDPm_BTKZ1UGMe2rmK8c", "content": "", "creation_timestamp": "2025-03-14T15:02:35.000000Z"}, {"uuid": "53eb5c1c-a247-4c8c-bb99-0cbf928134b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2000", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkmqfyrpv22n", "content": "", "creation_timestamp": "2025-03-18T03:35:19.053812Z"}, {"uuid": "996f7c56-1e0e-4d8f-9ba4-80f33713b237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20002", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-07", "content": "", "creation_timestamp": "2025-03-04T11:00:00.000000Z"}, {"uuid": "d33513da-5559-4731-abb3-1bdd6a4eca73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2000", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114161097463600507", "content": "", "creation_timestamp": "2025-03-14T13:48:26.029126Z"}, {"uuid": "885608ed-add4-4e42-80b7-156b88b264aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2000", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114161473496876918", "content": "", "creation_timestamp": "2025-03-14T15:24:03.582665Z"}, {"uuid": "1e2c99a8-f163-49c7-ba6e-6f590c3691c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20001", "type": "seen", "source": "https://infosec.place/objects/160aaaaf-e7ad-4a25-ae50-4c1e58628e24", "content": "", "creation_timestamp": "2025-06-02T15:00:11.488266Z"}, {"uuid": "3407c83c-c480-4094-bd24-263062daf42e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2000", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkepn6rcvt2g", "content": "", "creation_timestamp": "2025-03-14T23:00:12.210539Z"}, {"uuid": "d7719eda-6f30-49cc-9fa7-a76f148834f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2000", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lkdtpk2smx24", "content": "", "creation_timestamp": "2025-03-14T14:40:21.669699Z"}, {"uuid": "9646c911-56ed-4a4f-88bc-1acc2435ae79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20001", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqn5f2t4pxc2", "content": "", "creation_timestamp": "2025-06-02T16:00:06.348065Z"}, {"uuid": "f8e75364-f600-449a-855c-461151e7d4ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20008", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16364", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20008\n\ud83d\udd25 CVSS Score: 5.4 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Insecure inherited permissions for some Intel(R) Simics(R) Package Manager software before version 1.12.0 may allow a privileged user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-05-13T21:01:30.603Z\n\ud83d\udccf Modified: 2025-05-14T18:09:30.053Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01297.html", "creation_timestamp": "2025-05-14T18:32:00.000000Z"}, {"uuid": "b0ca7c7a-37cf-4d70-adb4-6535fb337a43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2000", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkfxun5tgp2g", "content": "", "creation_timestamp": "2025-03-15T11:00:09.859757Z"}, {"uuid": "3b4b0744-9361-4174-ac08-3a21d430e8c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2000", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkdra5uxik26", "content": "", "creation_timestamp": "2025-03-14T13:55:58.808685Z"}, {"uuid": "edf6a602-51c8-4706-9f1f-7e842bf6d38a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20001", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqndrkofcz2r", "content": "", "creation_timestamp": "2025-06-02T17:52:56.735778Z"}]}