The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.
https://hackread.com/telemessage-sgnl-flaw-actively-exploited-by-attackers/
https://www.greynoise.io/blog/active-exploit-attempts-signal-based-messaging-app
https://www.theregister.com/2025/07/02/cisa_telemessage_patch/
https://www.securityweek.com/cisa-warns-of-two-exploited-telemessage-vulnerabilities/