{"vulnerability": "CVE-2025-2487", "sightings": [{"uuid": "456600c6-49c8-44fe-bff2-28db8d801493", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24870", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuid2r7ew2v", "content": "", "creation_timestamp": "2025-02-11T01:16:12.739372Z"}, {"uuid": "5bb3cba9-89a2-4ab0-9802-c2a7be82bca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24872", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuid5gydm2n", "content": "", "creation_timestamp": "2025-02-11T01:16:15.289635Z"}, {"uuid": "5846009a-dd98-4f9b-8166-456f47b76963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24874", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuida3ra42n", "content": "", "creation_timestamp": "2025-02-11T01:16:18.172966Z"}, {"uuid": "c80a8f22-121b-43ee-94a0-0750f8c58bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24875", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuidcjzot2q", "content": "", "creation_timestamp": "2025-02-11T01:16:20.727580Z"}, {"uuid": "95299411-ff29-4e21-b5fb-f8b75dd97f3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24876", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuideudha2o", "content": "", "creation_timestamp": "2025-02-11T01:16:23.270678Z"}, {"uuid": "8b3a719e-a198-40f6-88ea-a81b338815f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24870", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982647746256616", "content": "", "creation_timestamp": "2025-02-11T01:26:19.169359Z"}, {"uuid": "65b4daf7-bcac-4a0b-822a-f555341ff0cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24876", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3ll5g72me7f26", "content": "", "creation_timestamp": "2025-03-24T18:47:43.486705Z"}, {"uuid": "509d559c-13aa-44b1-b5f1-244a789ba25c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24872", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982647760239311", "content": "", "creation_timestamp": "2025-02-11T01:26:19.619443Z"}, {"uuid": "7bd15d61-dafc-46d0-a7ec-b5fc9c2cfe22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24874", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982706780554563", "content": "", "creation_timestamp": "2025-02-11T01:41:20.077685Z"}, {"uuid": "7fb83cf2-8181-4771-ba58-7b9849ea1b03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24875", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982706794771316", "content": "", "creation_timestamp": "2025-02-11T01:41:20.535798Z"}, {"uuid": "10994b2e-019e-4034-8317-ed7bdb92ad9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24876", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982706808856440", "content": "", "creation_timestamp": "2025-02-11T01:41:20.698769Z"}, {"uuid": "f2bfea02-0c05-4943-9065-baa60adf0fe5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2487", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:28.000000Z"}, {"uuid": "85537122-5af5-46df-8610-c05f90127107", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24876", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113982969766255920", "content": "", "creation_timestamp": "2025-02-11T02:48:13.564379Z"}, {"uuid": "3e04b140-ac30-4c3c-afc5-42021b9ea50c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24874", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhusbvvezy2f", "content": "", "creation_timestamp": "2025-02-11T04:14:38.434554Z"}, {"uuid": "cdb1686a-cccf-4543-b542-c68208726371", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2487", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkoihzu4k72n", "content": "", "creation_timestamp": "2025-03-18T20:18:41.507920Z"}, {"uuid": "acc338bc-387f-43ed-9db0-d51dcc041891", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2487", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "dd49466f-6f1f-49d0-8f0f-4d157b7e1492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24875", "type": "seen", "source": "https://t.me/cvedetector/17623", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24875 - SAP Commerce SameSite Cookie Insecurity\", \n  \"Content\": \"CVE ID : CVE-2025-24875 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : SAP Commerce, by default, sets certain cookies with the SameSite attribute configured to None (SameSite=None). This includes authentication cookies utilized in SAP Commerce Backoffice. Applying this setting reduces defense in depth against CSRF and may lead to future compatibility issues. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:07:49.000000Z"}, {"uuid": "99cf1af5-6488-4f07-b99a-1bd86c80be88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24874", "type": "seen", "source": "https://t.me/cvedetector/17622", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24874 - SAP Commerce Clickjacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24874 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : SAP Commerce (Backoffice) uses the deprecated X-FRAME-OPTIONS header to protect against clickjacking. While this protection remains effective now, it may not be the case in the future as browsers might discontinue support for this header in favor of the frame-ancestors CSP directive. Hence, clickjacking could become possible then, and lead to exposure and modification of sensitive information. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:07:48.000000Z"}, {"uuid": "202e8bb3-979c-43c1-9773-2908f99f6d8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24872", "type": "seen", "source": "https://t.me/cvedetector/17621", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24872 - SAP ABAP Platform Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24872 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : The ABAP Build Framework in SAP ABAP Platform allows an authenticated attacker to gain unauthorized access to a specific transaction. By executing the add-on build functionality within the ABAP Build Framework, an attacker could call the transaction and view its details. This has a limited impact on the confidentiality of the application with no effect on the integrity and availability of the application. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:07:44.000000Z"}, {"uuid": "06c7f2af-8ec4-4410-aa7c-222ec03a33d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24870", "type": "seen", "source": "https://t.me/cvedetector/17620", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24870 - SAP GUI for Windows Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-24870 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : SAP GUI for Windows &amp; RFC service credentials are incorrectly stored in the memory of the program allowing an unauthenticated attacker to access information within systems, resulting in privilege escalation. On successful exploitation, this could result in disclosure of highly sensitive information. This has no impact on integrity, and availability. \nSeverity: 6.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:07:44.000000Z"}, {"uuid": "705763fc-0106-453d-bf16-751bcb00be62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2487", "type": "seen", "source": "https://t.me/cvedetector/20589", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2487 - Apache 389-ds-base LDAP Server Denial of Service/DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2487 \nPublished : March 18, 2025, 5:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : A flaw was found in the 389-ds-base LDAP Server. This issue occurs when issuing a Modify DN LDAP operation through the ldap protocol, when the function return value is not tested and a NULL pointer is dereferenced. If a privileged user performs a ldap MODDN operation after a failed operation, it could lead to a Denial of Service (DoS) or system crash. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T20:15:00.000000Z"}, {"uuid": "a3b23b53-f724-43c3-a7c8-bc3ec039c99b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24876", "type": "seen", "source": "https://t.me/cvedetector/17624", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24876 - \"SAP Approuter Node.js Authentication Bypass\"\", \n  \"Content\": \"CVE ID : CVE-2025-24876 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : The SAP Approuter Node.js package version v16.7.1 and before is vulnerable to Authentication bypass. When trading an authorization code an attacker can steal the session of the victim by injecting malicious payload causing High impact on confidentiality and integrity of the application \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:07:49.000000Z"}, {"uuid": "0db3385f-5fe0-475d-811a-35c1f277f40d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2487", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7934", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2487\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in the 389-ds-base LDAP Server. This issue occurs when issuing a Modify DN LDAP operation through the ldap protocol, when the function return value is not tested and a NULL pointer is dereferenced. If a privileged user performs a ldap MODDN operation after a failed operation, it could lead to a Denial of Service (DoS) or system crash.\n\ud83d\udccf Published: 2025-03-18T16:25:43.712Z\n\ud83d\udccf Modified: 2025-03-18T16:25:43.712Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-2487\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2353071", "creation_timestamp": "2025-03-18T16:51:25.000000Z"}, {"uuid": "45958282-1385-4a83-b3f8-c411ad2eaa4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2487", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10806", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2487\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in the 389-ds-base LDAP Server. This issue occurs when issuing a Modify DN LDAP operation through the ldap protocol, when the function return value is not tested and a NULL pointer is dereferenced. If a privileged user performs a ldap MODDN operation after a failed operation, it could lead to a Denial of Service (DoS) or system crash.\n\ud83d\udccf Published: 2025-03-18T16:25:43.712Z\n\ud83d\udccf Modified: 2025-04-08T00:16:54.819Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:3670\n2. https://access.redhat.com/security/cve/CVE-2025-2487\n3. https://bugzilla.redhat.com/show_bug.cgi?id=2353071", "creation_timestamp": "2025-04-08T00:46:12.000000Z"}, {"uuid": "28aa64cf-e58a-480c-8c1b-c42b33eaec08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24872", "type": "seen", "source": "Telegram/bWZaTY6MBYPYAydSjwSheAPqmEUnxDgz-z5VcPDFYCnn3AJN", "content": "", "creation_timestamp": "2025-02-14T10:01:39.000000Z"}, {"uuid": "1e7b078c-e012-4ad7-b251-ce3a6986c7af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24870", "type": "seen", "source": "Telegram/4s346eqNwyz4jzD8t5uV0-YnUZK9wtRfOubZIzb4AazKjq5K", "content": "", "creation_timestamp": "2025-02-14T10:01:38.000000Z"}, {"uuid": "c6d92693-38ca-4c40-8066-8bdcc78621b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24876", "type": "seen", "source": "Telegram/fDpnFMDycR34vnlZyVn6O0P_sOi8Y8G1NOFj_RFl-QCg24A", "content": "", "creation_timestamp": "2025-02-11T03:01:32.000000Z"}]}