{"vulnerability": "cve-2025-3210", "sightings": [{"uuid": "c6636c95-7bb9-40ea-9734-428a8d9e3019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "exploited", "source": "https://t.me/jj_8tl/408", "content": "\u26a1\ufe0fThe vulnerability details are now available: https://t.co/OkzA9zFYq2\n\n\ud83d\udea8\ud83d\udea8CrushFTP Under Attack! \nCVE-2025-32102: SSRF alert! Attackers can exploit weak host/port validation to hijack requests.\nCVE-2025-32103: Directory traversal flaw exposes remote files to unauthorized access.  \n\ud83d\udd25PoC: https://t.co/ZUcRl7qA7m\n\nZoomEye Dork\ud83d\udc49app=\"CrushFTP\"\nReveals 71k+ vulnerable instances!  \nZoomEye Link: https://t.co/KBmxsCTUFo\nSHODAN Dork\ud83d\udc49server: CrushFTP HTTP Server\n\nRefer: https://t.co/5PLZhC5A6c\n\n#ZoomEye #NetSecMapping #cybersecurity #CyberSpaceInsights2025\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-15T03:57:35.000000Z"}, {"uuid": "1f556361-e34d-4480-917b-127aeccacf15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "exploited", "source": "https://t.me/jj_8tl/408", "content": "\u26a1\ufe0fThe vulnerability details are now available: https://t.co/OkzA9zFYq2\n\n\ud83d\udea8\ud83d\udea8CrushFTP Under Attack! \nCVE-2025-32102: SSRF alert! Attackers can exploit weak host/port validation to hijack requests.\nCVE-2025-32103: Directory traversal flaw exposes remote files to unauthorized access.  \n\ud83d\udd25PoC: https://t.co/ZUcRl7qA7m\n\nZoomEye Dork\ud83d\udc49app=\"CrushFTP\"\nReveals 71k+ vulnerable instances!  \nZoomEye Link: https://t.co/KBmxsCTUFo\nSHODAN Dork\ud83d\udc49server: CrushFTP HTTP Server\n\nRefer: https://t.co/5PLZhC5A6c\n\n#ZoomEye #NetSecMapping #cybersecurity #CyberSpaceInsights2025\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-15T03:57:35.000000Z"}, {"uuid": "bf62c396-aaab-48f7-ae83-a7981a267a82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32101", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-32101.yaml", "content": "", "creation_timestamp": "2025-04-09T10:42:31.000000Z"}, {"uuid": "4be989b6-48cf-4fd8-8c33-775bffe9eaed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lmpolytmar2r", "content": "", "creation_timestamp": "2025-04-13T18:31:15.015416Z"}, {"uuid": "dd0b3711-dce1-4641-8007-4534b56e2955", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lmpolytmar2r", "content": "", "creation_timestamp": "2025-04-13T18:31:15.106832Z"}, {"uuid": "f592d800-1732-4be8-bdc2-a31c22ce1140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114332086226987435", "content": "", "creation_timestamp": "2025-04-13T18:33:10.203154Z"}, {"uuid": "9fc184ad-9ba8-412b-8847-cafdd5da0c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114332086226987435", "content": "", "creation_timestamp": "2025-04-13T18:33:10.256597Z"}, {"uuid": "7a4ee791-642d-4eb8-a87c-a6d32ebfbf2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lmppolswya26", "content": "", "creation_timestamp": "2025-04-13T18:50:35.863785Z"}, {"uuid": "ae64f874-ad70-4355-85bc-831e632d354f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lmppolswya26", "content": "", "creation_timestamp": "2025-04-13T18:50:36.004965Z"}, {"uuid": "baba16c8-2b39-4516-8a64-99e0d2e8c1cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmq3yn5tmz2z", "content": "", "creation_timestamp": "2025-04-13T22:30:57.088984Z"}, {"uuid": "30993ef5-45a3-4cfd-a9f3-1d5a4997effa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmq3yn5tmz2z", "content": "", "creation_timestamp": "2025-04-13T22:30:57.192811Z"}, {"uuid": "453d6437-9a91-4298-8891-42a633019675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32107", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lmvra64at22e", "content": "", "creation_timestamp": "2025-04-16T04:34:21.477321Z"}, {"uuid": "df2f2f35-9dfc-4b48-a458-7ab328ba10a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32101", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lmvualkvsl2s", "content": "", "creation_timestamp": "2025-04-16T05:28:12.603067Z"}, {"uuid": "621b5377-11da-46fa-b59a-f1292ca1bfcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114604601719249667", "content": "", "creation_timestamp": "2025-05-31T21:37:24.617570Z"}, {"uuid": "4a760384-f21b-4375-ba8c-f4e52a763cae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114604601719249667", "content": "", "creation_timestamp": "2025-05-31T21:37:24.724803Z"}, {"uuid": "c78dab57-1db2-4d33-88ba-3a3e098e61e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32105", "type": "seen", "source": "https://bsky.app/profile/dasgeldco.bsky.social/post/3luqqbwevwt2y", "content": "", "creation_timestamp": "2025-07-24T23:55:37.051508Z"}, {"uuid": "0f28b88c-6f51-4291-9d47-4aec8b1f9324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32106", "type": "seen", "source": "https://bsky.app/profile/dasgeldco.bsky.social/post/3luqqbwevwt2y", "content": "", "creation_timestamp": "2025-07-24T23:55:37.158607Z"}, {"uuid": "1763886e-6a5f-4c6d-8469-19d87db9d90f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m4jernm2nq2f", "content": "", "creation_timestamp": "2025-10-31T21:02:50.041402Z"}, {"uuid": "76b30a1a-78cd-4aa0-8b86-aa827efadb7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:57.000000Z"}, {"uuid": "2f685b44-511f-44b2-ba95-22a82b364ed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:57.000000Z"}, {"uuid": "516f2365-7b35-4903-b531-bc919ec1be0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32105", "type": "seen", "source": "https://bsky.app/profile/dasgeldco.bsky.social/post/3lxpta6e5ax2n", "content": "", "creation_timestamp": "2025-08-31T19:31:14.366820Z"}, {"uuid": "fdcc8697-977b-4dd8-be01-bc9530f50ba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32106", "type": "seen", "source": "https://bsky.app/profile/dasgeldco.bsky.social/post/3lxpta6e5ax2n", "content": "", "creation_timestamp": "2025-08-31T19:31:14.457804Z"}, {"uuid": "ec9bb4ef-7845-4b3a-9c22-af6a116ddf92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3210", "type": "seen", "source": "https://t.me/cvedetector/22075", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3210 - \"Code-Projects Patient Record Management System SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-3210 \nPublished : April 4, 2025, 5:15 a.m. | 31\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Patient Record Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /birthing_pending.php. The manipulation of the argument birth_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T07:58:40.000000Z"}, {"uuid": "51242610-615f-4ba0-b516-24fe5ba320ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmujat67fg2z", "content": "", "creation_timestamp": "2025-04-15T16:38:52.268947Z"}, {"uuid": "38a88b37-1c80-486f-be66-d5be4cf1c6c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmujatqeuy2q", "content": "", "creation_timestamp": "2025-04-15T16:38:55.127580Z"}, {"uuid": "67595e11-5d1b-4953-93fa-fc11de235c47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32106", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqpz6icp5t2e", "content": "", "creation_timestamp": "2025-06-03T19:21:18.624857Z"}, {"uuid": "7ff1a891-1091-4455-af37-7ca990d82f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32100", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxuu47kyol2p", "content": "", "creation_timestamp": "2025-09-02T19:30:14.927705Z"}, {"uuid": "5922951c-978a-4f0e-8f16-b38e7ae24899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11784", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32102\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T12:36:27.306Z\n\ud83d\udd17 References:\n1. https://www.crushftp.com/\n2. https://www.crushftp.com/download/\n3. https://seclists.org/fulldisclosure/2025/Apr/17", "creation_timestamp": "2025-04-15T12:54:25.000000Z"}, {"uuid": "fedb928b-fbeb-444f-b3e7-26680c884bde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11783", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32103\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows directory traversal via the /WebInterface/function/ URI to read files accessible by SMB at UNC share pathnames, bypassing SecurityManager restrictions.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T12:37:10.601Z\n\ud83d\udd17 References:\n1. https://www.crushftp.com/\n2. https://www.crushftp.com/download/\n3. https://seclists.org/fulldisclosure/2025/Apr/17", "creation_timestamp": "2025-04-15T12:54:24.000000Z"}, {"uuid": "78c43b6b-4744-4a5c-9589-a126f67f6926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://t.me/cvedetector/22961", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32103 - CrushFTP SMB Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32103 \nPublished : April 15, 2025, 1:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows directory traversal via the /WebInterface/function/ URI to read files accessible by SMB at UNC share pathnames, bypassing SecurityManager restrictions. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T17:26:40.000000Z"}, {"uuid": "90aa7004-5ad5-4d82-a1af-f73e1d7149f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://t.me/cvedetector/22960", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32102 - CrushFTP SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32102 \nPublished : April 15, 2025, 1:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T17:26:40.000000Z"}, {"uuid": "6993839a-bd69-441f-a429-8409bf8ac87f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32101", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lmacfz7k7i26", "content": "", "creation_timestamp": "2025-04-07T15:43:12.659393Z"}, {"uuid": "72bc3913-d923-424a-a6e9-f46b35a0832d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32101", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lmaivzqr2u2l", "content": "", "creation_timestamp": "2025-04-07T17:39:32.509446Z"}, {"uuid": "26158c51-33b4-4c9f-ae58-cd7281df9f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32107", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114319569007070031", "content": "", "creation_timestamp": "2025-04-11T13:29:49.975753Z"}, {"uuid": "fe0ba09d-d6df-4665-b516-77dafa48760d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32101", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmkw4bcbyt2t", "content": "", "creation_timestamp": "2025-04-11T21:02:17.733927Z"}, {"uuid": "e7a60004-bb10-4251-8bf9-7710ae67ee0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32101", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114336356374051152", "content": "", "creation_timestamp": "2025-04-14T12:39:04.455685Z"}, {"uuid": "efc2472a-fd9b-4571-8d2b-ffc07a973376", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lmscuwbqm22x", "content": "", "creation_timestamp": "2025-04-14T19:39:29.003427Z"}, {"uuid": "4bfdfc19-68d2-403c-a603-664925d46e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lmscuwbqm22x", "content": "", "creation_timestamp": "2025-04-14T19:39:29.078135Z"}, {"uuid": "799acd18-e0b5-45e0-b490-e70e31e8bdbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lmthoujivk2h", "content": "", "creation_timestamp": "2025-04-15T06:38:15.985820Z"}, {"uuid": "a96c8838-2bc8-468f-84a5-26dfaf3058e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmtmlrhqge2t", "content": "", "creation_timestamp": "2025-04-15T08:05:58.350591Z"}, {"uuid": "0f267079-bdd1-4273-b427-ccb4dece4901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmtmlrhqge2t", "content": "", "creation_timestamp": "2025-04-15T08:05:58.443285Z"}, {"uuid": "bab0a35a-b676-4ed1-bf12-050fa573f242", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmxdsfj2xs2c", "content": "", "creation_timestamp": "2025-04-16T19:39:18.847978Z"}, {"uuid": "1266218b-e75d-45f3-a9fd-f3d8872cfdb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmxdsfj2xs2c", "content": "", "creation_timestamp": "2025-04-16T19:39:18.926887Z"}, {"uuid": "f3b7c36e-bfe9-4e31-98c4-fdc09a16c6d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmxigyfduc27", "content": "", "creation_timestamp": "2025-04-16T21:02:22.633738Z"}, {"uuid": "07cb5aad-ed12-4e99-8d17-f3e5ae2294f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmxigyhtwm2y", "content": "", "creation_timestamp": "2025-04-16T21:02:23.091866Z"}, {"uuid": "7f511232-2fe3-46ff-bb46-86dd83894455", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32105", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqpxgc44as2r", "content": "", "creation_timestamp": "2025-06-03T18:49:53.059439Z"}, {"uuid": "50005482-d336-488b-9a75-d23488e0fd89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32101", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:40.000000Z"}, {"uuid": "bc8b0030-b09f-43e3-b734-b515bf010e10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32101", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}, {"uuid": "5233bd1a-5433-47e8-b923-f2d392339a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:42.000000Z"}, {"uuid": "c71ac367-2110-4931-b2b7-403096843123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:42.000000Z"}, {"uuid": "cb816d9b-2ada-4085-984d-d1229abf9d6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3210", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10400", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3210\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in code-projects Patient Record Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /birthing_pending.php. The manipulation of the argument birth_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-04T05:00:13.723Z\n\ud83d\udccf Modified: 2025-04-04T05:00:13.723Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303164\n2. https://vuldb.com/?ctiid.303164\n3. https://vuldb.com/?submit.545962\n4. https://github.com/yujiyuji159/cve/blob/main/README.md\n5. https://code-projects.org/", "creation_timestamp": "2025-04-04T05:35:58.000000Z"}, {"uuid": "fe9b2301-484c-44fb-b143-5d7c4713bdc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "published-proof-of-concept", "source": "Telegram/nolm0rIyXvh0VaRouLmMJT-1_OzPIsfSh-28ANnb3cfZ3VI", "content": "", "creation_timestamp": "2025-05-21T07:05:59.000000Z"}, {"uuid": "3ffdcab1-1f84-4ab7-a74e-fa23e7a77eaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "published-proof-of-concept", "source": "Telegram/RcLFAo6jOer1k-VS2nA4Md0lDrYUPyjSKu6Fbc19Yb_ozIY", "content": "", "creation_timestamp": "2025-05-20T07:24:57.000000Z"}, {"uuid": "1f32223c-1af0-43fe-aebf-c077aef01a9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://t.me/TheDarkWebInformer/17737", "content": "\ud83d\udea8CVE-2025-32102 &amp; CVE-2025-32103: CrushFTP Server-Side Request Forgery (SSRF) and Directory Traversal\n\nFOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJDcnVzaEZUUCI%3D\n\nFOFA Query: app=\"CrushFTP\"\n\nResults: 342,867\n\nDisclosure: https://seclists.org/fulldisclosure/2025/Apr/17", "creation_timestamp": "2025-05-31T22:34:47.000000Z"}, {"uuid": "b7b9fc32-1a50-411e-842e-920cc1fa9e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://t.me/TheDarkWebInformer/17737", "content": "\ud83d\udea8CVE-2025-32102 &amp; CVE-2025-32103: CrushFTP Server-Side Request Forgery (SSRF) and Directory Traversal\n\nFOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJDcnVzaEZUUCI%3D\n\nFOFA Query: app=\"CrushFTP\"\n\nResults: 342,867\n\nDisclosure: https://seclists.org/fulldisclosure/2025/Apr/17", "creation_timestamp": "2025-05-31T22:34:47.000000Z"}]}