{"vulnerability": "CVE-2025-4288", "sightings": [{"uuid": "8e7072fc-4099-4bd7-8155-5de7709354fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-42887", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m5d5k2bztr2l", "content": "", "creation_timestamp": "2025-11-11T03:02:16.662760Z"}, {"uuid": "59850ef3-40ba-4536-8373-a923a4588d96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://bsky.app/profile/hackread.bsky.social/post/3m5jarnzwbs2a", "content": "", "creation_timestamp": "2025-11-13T13:16:12.937911Z"}, {"uuid": "ce9519b4-81ec-40b4-b12e-26fa966b7ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://bsky.app/profile/hackread.bsky.social/post/3m5jasho6dc2a", "content": "", "creation_timestamp": "2025-11-13T13:16:39.564624Z"}, {"uuid": "7b93fa1c-5d06-4448-bdff-859eafd50300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-42887", "type": "seen", "source": "https://mstdn.social/users/Hackread/statuses/115542577725165838", "content": "", "creation_timestamp": "2025-11-13T13:17:02.239956Z"}, {"uuid": "d47ba5a9-0ca5-4402-bd13-c21ac7b02258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://bsky.app/profile/newshub2.bsky.social/post/3m5gye7dma724", "content": "", "creation_timestamp": "2025-11-12T15:40:11.200431Z"}, {"uuid": "2e144fe7-7127-4ac4-b75d-1f5bc083890b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42880", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7jlcydjvn2s", "content": "", "creation_timestamp": "2025-12-09T03:15:13.269168Z"}, {"uuid": "f1c8c859-e8b8-40e0-be87-afccfd98d7b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-42880", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115688097177014155", "content": "", "creation_timestamp": "2025-12-09T06:04:34.051974Z"}, {"uuid": "bea02475-9887-4aa7-9efe-3d1e9c8fd7de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-42880", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m7jursglj72p", "content": "", "creation_timestamp": "2025-12-09T06:04:34.607788Z"}, {"uuid": "98c3af93-0aaa-427a-9ff8-f5e73d586741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42880", "type": "seen", "source": "https://gist.github.com/Darkcrai86/4af9d9702e41c06f253a28dfee51bfb3", "content": "", "creation_timestamp": "2025-12-09T07:41:19.000000Z"}, {"uuid": "d5703063-3668-4a3d-80a9-cbd92ce0bfe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42880", "type": "seen", "source": "https://gist.github.com/Darkcrai86/0b28350a8fcfc00292f28a0da1d2a731", "content": "", "creation_timestamp": "2025-12-09T08:08:43.000000Z"}, {"uuid": "81ad2104-c5e9-44de-827f-309d4282f671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42880", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-f644f578-a1a252ed9ba56e48", "content": "", "creation_timestamp": "2025-12-09T11:05:02.266800Z"}, {"uuid": "5cfc5a98-b26f-461e-8c83-fdfaa729a4a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42880", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m7kjyhkor72q", "content": "", "creation_timestamp": "2025-12-09T12:24:06.450073Z"}, {"uuid": "c2e238ba-7b55-49c8-9c2c-0040e354c24a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42880", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3m7kob346lr2b", "content": "", "creation_timestamp": "2025-12-09T13:40:31.028145Z"}, {"uuid": "9215a467-0d15-4cf9-b3a3-411e12468559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42880", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mahivfew4c2b", "content": "", "creation_timestamp": "2025-12-21T00:51:42.359888Z"}, {"uuid": "35952099-2576-4bac-8d50-79824f2edb51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://t.me/TengkorakCyberCrewzz/6615", "content": "SAP Pushes Emergency Patch for 9.9 Rated CVE-2025-42887 After Full Takeover Risk \u2013 hackread.com\n\nThu, 13 Nov 2025 21:10:24", "creation_timestamp": "2025-11-13T16:04:13.000000Z"}, {"uuid": "70dcb314-6dea-4d10-84ea-97d5d67ebb75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4288", "type": "exploited", "source": "https://t.me/cvedetector/24498", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4288 - PCMan FTP Server RNFR Command Handler Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4288 \nPublished : May 5, 2025, 9:15 p.m. | 25\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in PCMan FTP Server 2.0.7. This affects an unknown part of the component RNFR Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T00:15:07.000000Z"}, {"uuid": "d58dae51-4a13-4db9-ac86-6e4e49097c32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4288", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lohmh7y5xz2o", "content": "", "creation_timestamp": "2025-05-06T00:21:53.416929Z"}, {"uuid": "11945b42-3dba-481c-b198-512d6f37a5ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-42887", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5k4yvqoz7o2", "content": "", "creation_timestamp": "2025-11-13T21:42:12.157989Z"}, {"uuid": "52018f9f-13f4-4095-b65a-41363c5bbbb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-42887", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3m5ktk4z5o22k", "content": "", "creation_timestamp": "2025-11-14T04:24:59.181088Z"}, {"uuid": "220575d4-ee82-4fa4-9ddf-6334e806677f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3m5lbq7x7ck25", "content": "", "creation_timestamp": "2025-11-14T08:38:36.923258Z"}, {"uuid": "10e40c32-d936-42a9-91be-a6b16a1a5bb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3m5jbshdt3q2q", "content": "", "creation_timestamp": "2025-11-13T13:34:32.441190Z"}, {"uuid": "71bfa6bc-e047-4c52-9723-70b14e677331", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m5jwfcxatr27", "content": "", "creation_timestamp": "2025-11-13T19:42:59.861178Z"}, {"uuid": "82aa6da3-c9a7-415f-b87e-c5d16c18c7ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-42887", "type": "seen", "source": "https://infosec.exchange/users/patrickcmiller/statuses/115557893444196202", "content": "", "creation_timestamp": "2025-11-16T06:12:02.468822Z"}, {"uuid": "ef5b3bbf-24b5-4574-b32a-5b47beea9734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://bsky.app/profile/cyberdudebivash.bsky.social/post/3mcipnhoaks2f", "content": "", "creation_timestamp": "2026-01-15T23:15:41.318317Z"}, {"uuid": "27bbb011-7a9b-4bd6-ad1a-770e594a387c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://t.me/DarkWebInformer_News/10373", "content": "\ud83d\udea8 News Alert!\n\nSource: Hackread \u2013 Cybersecurity News, Data Breaches, Tech, AI, Crypto and More\nTitle: SAP Pushes Emergency Patch for 9.9 Rated CVE-2025-42887 After Full Takeover Risk\nLink: https://hackread.com/sap-patch-cve-2025-42887-takeover-vulnerability/", "creation_timestamp": "2025-11-13T13:11:16.000000Z"}, {"uuid": "be17c74f-caf7-472e-a8c5-115abfcc846f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4288", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14999", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4288\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in PCMan FTP Server 2.0.7. This affects an unknown part of the component RNFR Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-05T20:31:04.050Z\n\ud83d\udccf Modified: 2025-05-05T20:31:04.050Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.307395\n2. https://vuldb.com/?ctiid.307395\n3. https://vuldb.com/?submit.561625\n4. https://fitoxs.com/exploit/exploit-aab361888e671e1705f94c27c26f9bc7c9c63d3c66d5df89e31dcaf7fa17f528.txt", "creation_timestamp": "2025-05-05T21:20:16.000000Z"}, {"uuid": "226c9204-6d76-4918-8188-04172b8c90ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5d2ic7e2s2w", "content": "", "creation_timestamp": "2025-11-11T02:07:36.116542Z"}, {"uuid": "9746d425-5686-4532-8a06-3c90b4094699", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3m5dqhxplsc2b", "content": "", "creation_timestamp": "2025-11-11T08:41:07.143234Z"}, {"uuid": "44d8c8a7-5b29-4d18-854a-9f57086bb52b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42887", "type": "seen", "source": "https://gist.github.com/Darkcrai86/9d3902f61c7c558b0561e7eff1724dc2", "content": "", "creation_timestamp": "2025-11-13T13:57:32.000000Z"}, {"uuid": "dec5c3a8-4bae-41b5-91ae-2e2fa826bc65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42880", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3m7ln3idlss2u", "content": "", "creation_timestamp": "2025-12-09T22:52:08.618560Z"}, {"uuid": "0a9e797d-9bd9-47ef-a262-1e74cc3ee686", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42880", "type": "seen", "source": "https://bsky.app/profile/earlybirdsinvest.bsky.social/post/3m7lxtmtshf2k", "content": "", "creation_timestamp": "2025-12-10T02:04:36.124309Z"}, {"uuid": "3319a44f-4281-42ad-a61f-c7d21a4be3bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42880", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115693753438790202", "content": "", "creation_timestamp": "2025-12-10T06:03:01.223690Z"}, {"uuid": "61d6586e-2f2f-41a3-961d-3ba238f4c083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-42880", "type": "seen", "source": "https://bsky.app/profile/ahmandonk.bsky.social/post/3m7mrubqbsu2p", "content": "", "creation_timestamp": "2025-12-10T09:50:15.269843Z"}]}