{"vulnerability": "CVE-2025-47268", "sightings": [{"uuid": "ffc30da6-4992-49a7-9a7e-e8740ceab048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47268", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lqzf7jreys27", "content": "", "creation_timestamp": "2025-06-07T12:50:39.439486Z"}, {"uuid": "5570de09-e651-4d13-ae2b-ba476eaa3e50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47268", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lqipq63krc25", "content": "", "creation_timestamp": "2025-05-31T21:43:39.152816Z"}, {"uuid": "5b34fad1-5f42-41ec-92bf-6f18917923f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47268", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3logrdaiays2r", "content": "", "creation_timestamp": "2025-05-05T16:16:31.445851Z"}, {"uuid": "ed4cbf4f-3a5c-4835-87dd-cf5b37d7cd72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47268", "type": "seen", "source": "https://gist.github.com/EbonJaeger/94d6b11fee980a997a2d1e6007418f90", "content": "", "creation_timestamp": "2025-06-13T18:04:24.000000Z"}, {"uuid": "8d4c1e47-feca-4d2e-aa91-9b9e8dbe5dff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-47268", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1747", "content": "", "creation_timestamp": "2026-02-04T04:00:00.000000Z"}, {"uuid": "2ef8a462-bb00-400a-b17e-854293946236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47268", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114898122820778282", "content": "", "creation_timestamp": "2025-07-22T17:43:40.709049Z"}, {"uuid": "5b9d41ad-f64f-442a-956b-d8dedddd0b2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47268", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3luqszfy4sd25", "content": "", "creation_timestamp": "2025-07-25T00:44:32.181853Z"}, {"uuid": "814d1176-46ca-4286-b247-8a3485d94c31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47268", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3luqszhhs2w2q", "content": "", "creation_timestamp": "2025-07-25T00:44:33.884810Z"}, {"uuid": "b8ec9580-d672-4bbd-a43a-bc99f643bbf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47268", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15019", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47268\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: ping in iputils through 20240905 allows a denial of service (application error or incorrect data collection) via a crafted ICMP Echo Reply packet, because of a signed 64-bit integer overflow in timestamp multiplication.\n\ud83d\udccf Published: 2025-05-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-06T00:46:50.998Z\n\ud83d\udd17 References:\n1. https://github.com/iputils/iputils/issues/584\n2. https://github.com/Zephkek/ping-rtt-overflow/\n3. https://bugzilla.suse.com/show_bug.cgi?id=1242300\n4. https://github.com/iputils/iputils/pull/585", "creation_timestamp": "2025-05-06T01:20:32.000000Z"}, {"uuid": "52e69a29-d318-455b-9ae6-60987b2b7824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47268", "type": "seen", "source": "https://t.me/cvedetector/24453", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47268 - iputils Ping Denial of Service (DoS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-47268 \nPublished : May 5, 2025, 2:15 p.m. | 1\u00a0hour, 10\u00a0minutes ago \nDescription : ping in iputils through 20240905 allows a denial of service (application error or incorrect data collection) via a crafted ICMP Echo Reply packet, because of a signed 64-bit integer overflow in timestamp multiplication. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T17:33:00.000000Z"}]}