{"vulnerability": "cve-2025-5218", "sightings": [{"uuid": "a05927a9-147d-43dc-99fb-0d368f42ebd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5218", "type": "seen", "source": "https://bsky.app/profile/FunctionalProgramming.activitypub.awakari.com.ap.brid.gy/post/3lq4r4gchxn52", "content": "", "creation_timestamp": "2025-05-27T03:36:31.919084Z"}, {"uuid": "1b6942c9-45bd-4c46-86b5-5a8afe5bcaac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52187", "type": "seen", "source": "https://gist.github.com/sanjay70023/67c698a4c88cc9000a127c02850a3915", "content": "", "creation_timestamp": "2025-07-22T10:06:06.000000Z"}, {"uuid": "6a4984f7-a64e-4d45-8885-8654baf3a0e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52187", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lv5pzoimw32a", "content": "", "creation_timestamp": "2025-07-30T03:55:38.068762Z"}, {"uuid": "3015b667-d991-4793-aee5-a4482b2f6a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52186", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5jnxeskoi2x", "content": "", "creation_timestamp": "2025-11-13T17:12:01.797659Z"}, {"uuid": "0e2210e5-ce59-4e28-90e8-6ee0c4e939b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5218", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lq4s7xovd42y", "content": "", "creation_timestamp": "2025-05-27T03:56:17.041744Z"}, {"uuid": "12503f17-d8d1-41e7-9a14-08ac41a8d327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52187", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lv7l3436uo2a", "content": "", "creation_timestamp": "2025-07-30T21:32:14.931905Z"}, {"uuid": "5ec8d35f-9d24-4863-8766-c96431f57dba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52184", "type": "seen", "source": "https://gist.github.com/gmrvh/eeb6aa8b379c7ad3860d78ee054f6123", "content": "", "creation_timestamp": "2025-08-09T13:45:16.000000Z"}, {"uuid": "0a6791d9-1eb4-46d9-a715-cb39253fd39a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52180", "type": "seen", "source": "https://gist.github.com/alex-xor/8d0f9f456e6840a955889305ea789ef8", "content": "", "creation_timestamp": "2025-10-20T17:13:42.000000Z"}, {"uuid": "7a25316e-51dc-4051-8763-755f45fecd51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52185", "type": "seen", "source": "https://gist.github.com/Liyw979/5f9fe6121ac99c7be2f2359c9259bb63", "content": "", "creation_timestamp": "2025-12-11T09:24:49.000000Z"}, {"uuid": "b0d5c1f1-b5db-473b-85de-60ada5d563bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5218", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17594", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-5218\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0.0. Affected is an unknown function of the component LITERAL Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-27T01:00:09.362Z\n\ud83d\udccf Modified: 2025-05-27T01:00:09.362Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.310314\n2. https://vuldb.com/?ctiid.310314\n3. https://vuldb.com/?submit.582965\n4. https://fitoxs.com/exploit/exploit-f66cb45bc43c5d8d4240ce755cfd9a7be5b31de1e85f92ccf8e1c607b849bb5a.txt", "creation_timestamp": "2025-05-27T01:48:31.000000Z"}]}