{"vulnerability": "CVE-2025-23247", "sightings": [{"uuid": "c8534efb-1999-40b8-a5cd-ab2672910db2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq6ao4uatyn2", "content": "", "creation_timestamp": "2025-05-27T17:47:32.948140Z"}, {"uuid": "f33e0617-10dc-4eaf-8c40-ddd30dfc3273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "seen", "source": "https://infosec.place/objects/02bb63af-de7a-4815-9f9b-43f6f04d73f9", "content": "", "creation_timestamp": "2025-06-02T15:00:05.796175Z"}, {"uuid": "d3d57c29-2c1b-4844-a45e-b029d8eadef2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/60308", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1awip for CVE-2025-23247 . ATM just crash PoC which shows we control buffer and offset, so we got aaw \nURL\uff1ahttps://github.com/SpiralBL0CK/CVE-2025-23247\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-20T15:54:56.000000Z"}, {"uuid": "ea950b44-5ea7-425a-832c-8864b618bc3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lq6nmt2fpx2w", "content": "", "creation_timestamp": "2025-05-27T21:39:19.172326Z"}, {"uuid": "7273d926-ac6b-4b34-9df2-de54aff88dc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "published-proof-of-concept", "source": "Telegram/nY5-0lCVx8RKsRPrkDgSL_kXo8AbHt3usOoKy9LAJ3yK8Xw", "content": "", "creation_timestamp": "2025-11-20T21:00:05.000000Z"}, {"uuid": "ec0975a5-e8b0-4cfc-83ea-2cf8ccaa9e2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23247", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17662", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23247\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a failure to check the length of a buffer could allow a user to cause the tool to crash or execute arbitrary code by passing in a malformed ELF file. A successful exploit of this vulnerability might lead to arbitrary code execution.\n\ud83d\udccf Published: 2025-05-27T16:43:37.229Z\n\ud83d\udccf Modified: 2025-05-27T16:43:37.229Z\n\ud83d\udd17 References:\n1. https://nvidia.custhelp.com/app/answers/detail/a_id/5643", "creation_timestamp": "2025-05-27T16:52:48.000000Z"}]}