{"vulnerability": "CVE-2025-47868", "sightings": [{"uuid": "fa315804-76df-4f2c-8e62-4e46854c11a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47868", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lrm4u2m6sb2a", "content": "", "creation_timestamp": "2025-06-14T23:41:36.340164Z"}, {"uuid": "46ebcdf3-3dcc-4637-8a3b-7d04dc52ca4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47868", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/249", "content": "", "creation_timestamp": "2025-06-14T21:26:17.000000Z"}, {"uuid": "c04c7007-cf77-40eb-8923-28ab5d1db4eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47868", "type": "published-proof-of-concept", "source": "Telegram/JshALOdQpCblmhGq7ZdhNztZhTTSoRL0JEZJxTcvHpwkABc", "content": "", "creation_timestamp": "2025-06-16T17:33:24.000000Z"}, {"uuid": "60e1cac5-381e-4400-950d-6eb90c6ed789", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47868", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18440", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47868\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Out-of-bounds Write resulting in possible Heap-based Buffer Overflow vulnerability was discovered in tools/bdf-converter font conversion utility that is part of Apache NuttX RTOS repository. This standalone program is optional and neither part of NuttX RTOS nor Applications runtime, but active bdf-converter users may be affected when this tool is exposed to external provided user data data (i.e. publicly available automation).\n\nThis issue affects Apache NuttX: from 6.9 before 12.9.0.\n\nUsers are recommended to upgrade to version 12.9.0, which fixes the issue.\n\ud83d\udccf Published: 2025-06-16T11:00:05.293Z\n\ud83d\udccf Modified: 2025-06-16T11:04:43.267Z\n\ud83d\udd17 References:\n1. https://github.com/apache/nuttx/pull/16000\n2. https://lists.apache.org/thread/p4o2lcqgspx3ws1n2p4wmoqbqow1w1pw", "creation_timestamp": "2025-06-16T11:39:56.000000Z"}]}