{"vulnerability": "CVE-2025-4720", "sightings": [{"uuid": "4d685c75-e150-41ff-8e0e-ff4a94442d5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lp32fjux2x2h", "content": "", "creation_timestamp": "2025-05-13T17:52:03.339825Z"}, {"uuid": "11d2880f-a93e-4294-ba5c-1d54152a205a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47201", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo6e7qmkrq2e", "content": "", "creation_timestamp": "2025-05-02T08:00:41.885267Z"}, {"uuid": "e4833d26-1785-4eab-8c64-f0fe787ae814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lomgxv5hzr2h", "content": "", "creation_timestamp": "2025-05-07T22:27:12.654081Z"}, {"uuid": "6d8034b9-a18d-456d-aa86-f8feb2167a4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3loqvfx3m532t", "content": "", "creation_timestamp": "2025-05-09T16:56:11.064064Z"}, {"uuid": "c3b64125-da6d-4fad-8aa4-31e79b91071c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/116", "content": "", "creation_timestamp": "2025-05-09T14:17:40.000000Z"}, {"uuid": "499d863a-3019-443b-92bd-2caa7ed43039", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3loyqfginj72p", "content": "", "creation_timestamp": "2025-05-12T19:47:42.213532Z"}, {"uuid": "fa447ffe-e7fa-41e2-b4a2-84142041d570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "58d6a530-519b-46a9-a1a7-c0b900f7db6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "21b7a552-a73c-433b-88e4-3aa28baff601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/125", "content": "", "creation_timestamp": "2025-05-13T13:19:36.000000Z"}, {"uuid": "5cb570d7-cdc0-49b1-ab1b-777b51bca665", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "2cef4cc1-894e-4b5f-a344-009c3b8e21eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/122", "content": "", "creation_timestamp": "2025-05-12T17:22:32.000000Z"}, {"uuid": "fd83daed-2d74-4be4-84f9-89fc0eeaa918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lozcc3wwql23", "content": "", "creation_timestamp": "2025-05-13T01:07:57.954843Z"}, {"uuid": "0eb442f4-8c25-4fd0-ac63-567d14bb7c64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/132", "content": "", "creation_timestamp": "2025-05-13T16:41:19.000000Z"}, {"uuid": "6e077732-5960-428f-854d-f90a57c3cd47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "a97170bd-0a4e-4b2c-9550-55b3341d3f17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "876636c2-664b-43c4-a959-11cd69229076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "df005b06-e7a0-44eb-96d4-4d4ed9eca98c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lozs2cokc52v", "content": "", "creation_timestamp": "2025-05-13T05:49:56.640099Z"}, {"uuid": "82f0b803-d1f6-4701-b5bf-e752fe4028aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "a3628f35-8461-4738-ae98-a470a4a7cf5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "007964fc-1107-4c8d-9554-ea8ab325cd2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "d597e171-2442-4ca6-9b2e-4701b5ad9eba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47204", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp2wst7ywx22", "content": "", "creation_timestamp": "2025-05-13T16:47:57.130465Z"}, {"uuid": "d6f50110-c561-4fb9-b8ed-c294cc1686f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lp2xwbwwss2p", "content": "", "creation_timestamp": "2025-05-13T17:07:44.066932Z"}, {"uuid": "1674fab3-5534-44d2-98a0-f918b2782f1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "40d89bfa-4dff-4faa-b3b9-f04580d91887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "8440f34f-8043-4785-8994-7230069e3ff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "49552401-9a54-45ec-a5ce-7f52b69990f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/123", "content": "", "creation_timestamp": "2025-05-12T22:49:58.000000Z"}, {"uuid": "98d796b1-4e43-40e9-9f4f-5e83f9ff72a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47204", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lpafxu6bzg2w", "content": "", "creation_timestamp": "2025-05-15T21:02:33.515995Z"}, {"uuid": "3a7da5ff-0a66-411a-97d8-54cc651083b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15828", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47203\n\ud83d\udd25 CVSS Score: 4.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: dbclient in Dropbear SSH before 2025.88 allows command injection via an untrusted hostname argument, because a shell is used.\n\ud83d\udccf Published: 2025-05-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-09T19:02:37.943Z\n\ud83d\udd17 References:\n1. https://github.com/mkj/dropbear/blob/master/src/cli-main.c\n2. https://github.com/mkj/dropbear/blob/master/CHANGES", "creation_timestamp": "2025-05-09T19:26:23.000000Z"}, {"uuid": "3ed0357b-d69d-4e04-8256-ede2b9f58fc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-47206", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lwnzxxuofj2p", "content": "", "creation_timestamp": "2025-08-18T09:01:24.514189Z"}, {"uuid": "7a3038c5-9645-4343-b599-560187eba2c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47206", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lwofa3h5no2e", "content": "", "creation_timestamp": "2025-08-18T12:22:47.531964Z"}, {"uuid": "2650828f-3ba7-466f-b0a2-505b6db3d480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47204", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-10)", "content": "", "creation_timestamp": "2026-01-10T00:00:00.000000Z"}, {"uuid": "000e51b2-d3fc-4aaa-9bf3-44a2f57fbb78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47201", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14447", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47201\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: In Intrexx Portal Server before 12.0.4, multiple Velocity-Scripts are susceptible to the execution of unrequested JavaScript code in HTML, aka XSS.\n\ud83d\udccf Published: 2025-05-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T05:20:59.126Z\n\ud83d\udd17 References:\n1. https://security.intrexx.com/en/security-advisories/ixsa-20250429-01/", "creation_timestamp": "2025-05-02T06:15:20.000000Z"}, {"uuid": "f738ac96-5c82-4b05-a12d-b0ba3c3b727a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47204", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16162", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47204\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. A PHP script in the source code echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF).\n\ud83d\udccf Published: 2025-05-13T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-13T15:58:00.907Z\n\ud83d\udd17 References:\n1. https://github.com/davidstutz/bootstrap-multiselect/releases\n2. https://github.com/projectdiscovery/nuclei-templates/commit/11e1a6c11d3954f44acfb0274b6dad4bd8045103", "creation_timestamp": "2025-05-13T16:30:44.000000Z"}, {"uuid": "432162df-fe93-439e-88d1-e5c755a83950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4720", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16576", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4720\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in SourceCodester Student Result Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file academic/core/drop_student.php. The manipulation of the argument img leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-15T21:00:08.439Z\n\ud83d\udccf Modified: 2025-05-15T21:00:08.439Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309022\n2. https://vuldb.com/?ctiid.309022\n3. https://vuldb.com/?submit.569855\n4. https://github.com/Xiaoyi-ing/CVE/issues/4\n5. https://www.sourcecodester.com/", "creation_timestamp": "2025-05-15T21:33:31.000000Z"}, {"uuid": "6c4cb0e8-24d7-484f-bd15-fa28ad3d6f4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47201", "type": "seen", "source": "https://t.me/cvedetector/24331", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47201 - Intrexx Portal Server Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-47201 \nPublished : May 2, 2025, 6:15 a.m. | 37\u00a0minutes ago \nDescription : In Intrexx Portal Server before 12.0.4, multiple Velocity-Scripts are susceptible to the execution of unrequested JavaScript code in HTML, aka XSS. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T09:15:13.000000Z"}, {"uuid": "8ce5ef0c-ef1c-419a-a9ae-17c593f5a571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47204", "type": "seen", "source": "https://t.me/cvedetector/25204", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47204 - Bootstrap Multiselect PHP Post Data Echos Reflective Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-47204 \nPublished : May 13, 2025, 4:15 p.m. | 59\u00a0minutes ago \nDescription : An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. A PHP script in the source code echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T19:43:47.000000Z"}, {"uuid": "3433874a-57f5-46bb-bf52-2bc7893667de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47203", "type": "seen", "source": "https://t.me/cvedetector/24736", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47203 - Dropbear SSH Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-47203 \nPublished : May 7, 2025, 6:15 p.m. | 26\u00a0minutes ago \nDescription : dbclient in Dropbear SSH before 2025.88 allows command injection via an untrusted hostname argument, because a shell is used. \nSeverity: 4.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T21:31:34.000000Z"}]}