{"vulnerability": "CVE-2025-5220", "sightings": [{"uuid": "5a568c66-7861-4dec-931a-429489011dbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5220", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17591", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-5220\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in FreeFloat FTP Server 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the component GET Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-27T01:31:04.369Z\n\ud83d\udccf Modified: 2025-05-27T01:31:04.369Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.310316\n2. https://vuldb.com/?ctiid.310316\n3. https://vuldb.com/?submit.582970\n4. https://fitoxs.com/exploit/exploit-1c5dc6c9823d6c734b7dd46458c5196ad7a8c902542c54c7465d38de84bc3ee2.txt", "creation_timestamp": "2025-05-27T01:48:28.000000Z"}, {"uuid": "d6e12af9-453d-4c00-a354-b39bf2a2c9df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5220", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lq4rwz7hzd2s", "content": "", "creation_timestamp": "2025-05-27T03:51:17.105090Z"}, {"uuid": "6900d922-c6a7-42bf-bebf-20489779effe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52207", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m6ztoxo3d72j", "content": "", "creation_timestamp": "2025-12-02T21:02:37.216213Z"}, {"uuid": "bdea9dae-adde-45f4-9de3-1dbda6850f0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5220", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq4r46ory2z2", "content": "", "creation_timestamp": "2025-05-27T03:36:19.162557Z"}, {"uuid": "067aebbc-71f2-4d63-914b-eecbc97c1e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52207", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsmfg7nrju25", "content": "", "creation_timestamp": "2025-06-27T19:40:07.917725Z"}, {"uuid": "002fa4ce-8d65-4e78-8bd2-26ebb92a894a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52207", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lz7r6tpujy23", "content": "", "creation_timestamp": "2025-09-19T21:02:38.547802Z"}, {"uuid": "32823764-c6c9-4b82-93cd-4d5290633e05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52204", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/77212", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #XSS #Payload #Attack\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2025-52204\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a j0qq3r\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-03-25 19:55:03\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCVE-2025-52204: Reflected XSS / HTML Injection in Znuny OTRS\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-03-25T20:02:55.000000Z"}]}