{"vulnerability": "CVE-2025-3113", "sightings": [{"uuid": "35280f66-f663-4c3a-8bb0-d1084291f0da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114263962596198001", "content": "", "creation_timestamp": "2025-04-01T17:48:23.720440Z"}, {"uuid": "f1a7d0c1-023f-495c-9e57-d2eb907bb512", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114263962596198001", "content": "", "creation_timestamp": "2025-04-01T17:48:23.724797Z"}, {"uuid": "7939ecbf-b03a-4bd2-8db0-dea68a6d331e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3llsambc4m726", "content": "", "creation_timestamp": "2025-04-02T01:33:38.442877Z"}, {"uuid": "84116bc3-0895-4b74-ad74-b4ea0297d165", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31132", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114263962644735987", "content": "", "creation_timestamp": "2025-04-01T17:48:24.327382Z"}, {"uuid": "25adb66a-a3dd-466b-a6fa-8a8b7fd0d1ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31132", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114263962644735987", "content": "", "creation_timestamp": "2025-04-01T17:48:24.341788Z"}, {"uuid": "f4e87b98-7bf9-44ff-8e10-986c98829b69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "seen", "source": "https://bsky.app/profile/slymb.net/post/3llwlf53yrs2e", "content": "", "creation_timestamp": "2025-04-03T18:57:15.324144Z"}, {"uuid": "b9375aaa-f5ef-45fe-b499-1a462eb9fe66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114264388612256212", "content": "", "creation_timestamp": "2025-04-01T19:36:44.134042Z"}, {"uuid": "67954322-d449-4fcb-8688-c824cc9fcff0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3llx55dvlck2a", "content": "", "creation_timestamp": "2025-04-04T00:15:06.334340Z"}, {"uuid": "8f49a193-a346-4abe-9b84-e048a1747bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114264388612256212", "content": "", "creation_timestamp": "2025-04-01T19:36:44.132617Z"}, {"uuid": "87c8a6f5-45de-492a-8bf6-3cf0bae2f02b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llva3g6nzb2j", "content": "", "creation_timestamp": "2025-04-03T06:02:12.751794Z"}, {"uuid": "84469591-2a35-4542-a94e-b66778d7a84c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llvh4u3jhc2s", "content": "", "creation_timestamp": "2025-04-03T08:08:19.661467Z"}, {"uuid": "5ba64111-8d7d-4898-baf6-edaca722c227", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-31131.yaml", "content": "", "creation_timestamp": "2025-04-02T13:27:45.000000Z"}, {"uuid": "07a27ca0-a59f-49db-926e-8911fa390a57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lms3shws3d2r", "content": "", "creation_timestamp": "2025-04-14T17:32:49.858147Z"}, {"uuid": "60a95730-64b0-4a7e-9e53-c5caec9ce2c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-31137", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lm4rxzkid22o", "content": "", "creation_timestamp": "2025-04-06T06:11:04.303905Z"}, {"uuid": "c55d7894-4067-4ad6-a62b-c4f863919292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmdep7rybn27", "content": "", "creation_timestamp": "2025-04-08T21:02:12.546732Z"}, {"uuid": "b3667afc-ee54-479c-bd75-4829e5b433d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/138", "content": "", "creation_timestamp": "2025-11-05T08:57:06.000000Z"}, {"uuid": "7e693e1e-427a-44ca-8357-5d6d398a2d5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "seen", "source": "https://bsky.app/profile/kriware.bsky.social/post/3lnmil7z3l22g", "content": "", "creation_timestamp": "2025-04-25T05:30:38.344794Z"}, {"uuid": "5b00caca-8a5d-40a9-9dce-6574981ad377", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31134", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqsm3io22v42", "content": "", "creation_timestamp": "2025-06-04T20:05:35.955953Z"}, {"uuid": "9e7062c0-b323-4085-bc33-016aabec857c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3m5jzkgfbhh2b", "content": "", "creation_timestamp": "2025-11-13T20:39:32.328696Z"}, {"uuid": "197c3674-6866-47f6-8487-0234fbb704aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3113", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmywmxuzyq2a", "content": "", "creation_timestamp": "2025-04-17T10:48:55.979374Z"}, {"uuid": "7f8a44c2-cb90-4399-8978-8460fe5920a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3113", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114353492774012647", "content": "", "creation_timestamp": "2025-04-17T13:17:05.404690Z"}, {"uuid": "8a7b84f9-d2d1-4de4-96fb-a39a863058a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "seen", "source": "https://bsky.app/profile/feedbot.unronritaro.net/post/3lmzw7gaugj2u", "content": "", "creation_timestamp": "2025-04-17T20:14:01.325799Z"}, {"uuid": "b0a12f19-8a19-46e3-8625-a12c0dfd3627", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-31137", "type": "seen", "source": "https://bsky.app/profile/rss.y-u-e.workers.dev/post/3ln3azc3paf2b", "content": "", "creation_timestamp": "2025-04-18T09:00:06.081484Z"}, {"uuid": "065b159b-aaa6-48ad-9729-6bcf9bb44eec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m4uu364gd32h", "content": "", "creation_timestamp": "2025-11-05T10:35:36.784536Z"}, {"uuid": "49763387-b9b5-4327-a07b-bf0bf5775433", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-31133", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m4yzvkz3ung2", "content": "", "creation_timestamp": "2025-11-07T02:30:48.498265Z"}, {"uuid": "5527fd14-76eb-4a13-b38b-d5080617e56c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31138", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:40.000000Z"}, {"uuid": "622f0abe-0df5-433e-85b9-3185a533e847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m5i42wduf72d", "content": "", "creation_timestamp": "2025-11-13T02:19:13.841139Z"}, {"uuid": "b6dba124-45ac-484e-a535-39d67ece0837", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvjlbveas52f", "content": "", "creation_timestamp": "2025-08-03T21:02:42.316854Z"}, {"uuid": "23aa2a93-a20d-4dd5-a8b5-3c5f18dcf414", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvjlbvgsji25", "content": "", "creation_timestamp": "2025-08-03T21:02:42.919920Z"}, {"uuid": "b032f33b-0e79-4276-b3f9-9ab131e32f3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://mstdn.social/users/jschauma/statuses/115497683553103053", "content": "", "creation_timestamp": "2025-11-05T14:59:52.099895Z"}, {"uuid": "f3036984-2458-4b8e-ac87-8bc201b3a8d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/crowdcyber.bsky.social/post/3m4zhddekwl2v", "content": "", "creation_timestamp": "2025-11-07T06:30:51.265477Z"}, {"uuid": "5ebddf7e-fc28-494d-b446-dad0ea142531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m4zlknnvfo2s", "content": "", "creation_timestamp": "2025-11-07T07:46:31.783272Z"}, {"uuid": "7224bb30-21f1-430b-8d5d-814cbee260fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/jschauma.mstdn.social.ap.brid.gy/post/3m4vctyhbcyw2", "content": "", "creation_timestamp": "2025-11-05T15:00:35.567534Z"}, {"uuid": "6b14a453-113c-4f22-8a4f-bfa452c0c344", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/topickapp.bsky.social/post/3m5frftmbca22", "content": "", "creation_timestamp": "2025-11-12T04:03:09.122746Z"}, {"uuid": "42dd75bd-56d7-4857-9df9-73c5fbfa28de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3m54r4q6bn225", "content": "", "creation_timestamp": "2025-11-08T14:04:06.600898Z"}, {"uuid": "e78e022e-748a-4dff-aab9-12288e4dd6ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/lobsters-feed.bsky.social/post/3m4vk4i6c3e2n", "content": "", "creation_timestamp": "2025-11-05T17:10:04.446645Z"}, {"uuid": "66a3b1ce-081c-4e85-b3c3-cf2831c19e3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/technews4869.bsky.social/post/3m5kru4n4r52k", "content": "", "creation_timestamp": "2025-11-14T03:54:27.331153Z"}, {"uuid": "4f577e84-6b12-4c4a-aa25-bc34bff9b100", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m5kmhaur7g2s", "content": "", "creation_timestamp": "2025-11-14T02:17:46.784381Z"}, {"uuid": "8e4ea75d-f908-4a50-97e0-877f5bc6ead8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m5d32wfgbz2n", "content": "", "creation_timestamp": "2025-11-11T02:18:01.325269Z"}, {"uuid": "f4c9130e-95f0-4905-ae6a-eada34531035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/Kubernetes.activitypub.awakari.com.ap.brid.gy/post/3m4vmtpvavbw2", "content": "", "creation_timestamp": "2025-11-05T17:58:55.125821Z"}, {"uuid": "a13bb8bc-006c-4993-8606-a5774ae29d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3m5rvwzdn3c2o", "content": "", "creation_timestamp": "2025-11-16T23:56:21.291197Z"}, {"uuid": "d2de6d03-1453-4107-95b5-192c8a33699d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31138", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}, {"uuid": "77ae1328-36e8-42a2-9cc9-2eedbbe48d29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3m57n3r3lqk2m", "content": "", "creation_timestamp": "2025-11-09T17:29:58.678106Z"}, {"uuid": "2dbfaf52-7823-462e-96d4-cb70b5559216", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3m5dhjbsrlq2m", "content": "", "creation_timestamp": "2025-11-11T06:00:47.874492Z"}, {"uuid": "ee33e750-af63-41f7-828e-35fff1069d1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3m4w4idjgus22", "content": "", "creation_timestamp": "2025-11-05T22:38:49.271937Z"}, {"uuid": "02e5f956-7928-40f6-9646-de73cabbdc23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3m4wkasrf2k2t", "content": "", "creation_timestamp": "2025-11-06T02:45:09.161923Z"}, {"uuid": "5cb0dd36-2ecb-41e0-b5d2-0ab1e5b316bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m52gkem42z2y", "content": "", "creation_timestamp": "2025-11-07T15:49:32.813767Z"}, {"uuid": "bb0d8fe7-feec-4202-9355-4160cac1bb7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/115509020963066977", "content": "", "creation_timestamp": "2025-11-07T15:03:08.327265Z"}, {"uuid": "ba51099e-1104-4ea0-adfd-1a1dab317260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/115508745643459318", "content": "", "creation_timestamp": "2025-11-07T13:53:06.840875Z"}, {"uuid": "518d221a-1124-43d7-a7b1-6b67b122005e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m5akqvnh3k2o", "content": "", "creation_timestamp": "2025-11-10T02:20:45.769851Z"}, {"uuid": "92ed3502-3a64-4990-b0c5-d8788df9272a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://gist.github.com/EbonJaeger/f7d172d49605e41a6829980152c0f6d1", "content": "", "creation_timestamp": "2025-11-07T20:31:33.000000Z"}, {"uuid": "67f60986-9143-4544-ab0f-e4e5e35f6bb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/115530729480225730", "content": "", "creation_timestamp": "2025-11-11T11:03:52.638784Z"}, {"uuid": "b010a63e-e80f-4adc-839c-fbe0c9d22d2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/161", "content": "", "creation_timestamp": "2025-11-07T16:16:11.000000Z"}, {"uuid": "709fa4c8-8698-4796-8e6f-eb655b42ee3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/tech-trending.bsky.social/post/3m5ehpotboz2n", "content": "", "creation_timestamp": "2025-11-11T15:37:03.296671Z"}, {"uuid": "ac24bc52-5edd-4ccb-a403-4a9b584cb1db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/Kubernetes.activitypub.awakari.com.ap.brid.gy/post/3m53huj3yzn52", "content": "", "creation_timestamp": "2025-11-08T01:45:49.171564Z"}, {"uuid": "701e2885-19f9-4673-a72f-c1a5d6dc2141", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://sploitus.com/exploit?id=9B6F99FA-39EA-5A7D-88A2-02E9B24BEC12", "content": "", "creation_timestamp": "2025-11-06T11:57:59.000000Z"}, {"uuid": "9a00e4ab-1a99-4dad-aeec-b203e71af010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6azss24", "content": "", "creation_timestamp": "2025-11-12T17:17:32.410367Z"}, {"uuid": "0f451e4b-76b7-4fe0-a40f-52b093926468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6by3k24", "content": "", "creation_timestamp": "2025-11-12T17:17:33.029983Z"}, {"uuid": "d66691fd-b973-468f-87d5-a678baf95a06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6cfr224", "content": "", "creation_timestamp": "2025-11-12T17:17:34.912220Z"}, {"uuid": "079a491d-6301-40f8-b00c-4082ab5fffcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6c7vk24", "content": "", "creation_timestamp": "2025-11-12T17:17:33.696776Z"}, {"uuid": "f766b84a-4209-45ce-8d70-03d492b97c2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6cctc24", "content": "", "creation_timestamp": "2025-11-12T17:17:34.314672Z"}, {"uuid": "cc402a96-d7e0-4384-9d45-46335de0c16a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/flatcar.org/post/3m5h5s6cknc24", "content": "", "creation_timestamp": "2025-11-12T17:17:35.549061Z"}, {"uuid": "fc6af9ee-d1ec-4f78-ae21-ae02c462c9a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/technadu.com/post/3m5biuocsjc2a", "content": "", "creation_timestamp": "2025-11-10T11:20:03.582127Z"}, {"uuid": "8768e7ff-f9a5-4d1e-b06e-121809c376c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/msbiro.net/post/3m6p7e6r6422h", "content": "", "creation_timestamp": "2025-11-28T15:31:58.508911Z"}, {"uuid": "5c44b4c2-260f-4f10-99b2-3e40d4bc77d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/155", "content": "", "creation_timestamp": "2025-11-06T16:48:32.000000Z"}, {"uuid": "500207b3-d6d3-4097-b61a-e121c04b6c04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3m54cfnvlwc25", "content": "", "creation_timestamp": "2025-11-08T09:40:40.216217Z"}, {"uuid": "83d24ae9-d682-41ac-a655-563a18445ba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m4y7nkxdan2o", "content": "", "creation_timestamp": "2025-11-06T18:40:44.718040Z"}, {"uuid": "873c2694-cf32-4321-b110-5f3a261fa8f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/matricedigitale.bsky.social/post/3m4yfwmff4f2h", "content": "", "creation_timestamp": "2025-11-06T20:33:11.308585Z"}, {"uuid": "eeac1792-8f32-48e7-aac9-6a35d2226c02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/r-redteamsec.bsky.social/post/3mi7kpnksdm27", "content": "", "creation_timestamp": "2026-03-29T16:24:31.890612Z"}, {"uuid": "b8577d21-d4b5-4b10-a568-35ff18154d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/alexpulver.bsky.social/post/3m7kyzwfzsm2e", "content": "", "creation_timestamp": "2025-12-09T16:53:21.647224Z"}, {"uuid": "2ca05cbc-10d8-4834-b7d7-703dc126cf87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3113", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3majevgyzy523", "content": "", "creation_timestamp": "2025-12-21T18:45:28.416304Z"}, {"uuid": "c8fa1b60-3dae-4917-b3d5-c9d2976f0db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3m4yeeozlcj25", "content": "", "creation_timestamp": "2025-11-06T20:05:15.596044Z"}, {"uuid": "6c09cd3c-9567-4d88-917e-b6453e7c3fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "13965f7b-8b92-42f8-b157-eb4e0cdf6360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://gist.github.com/denhamparry/5ab60bf197097628223cf296dd65b22d", "content": "", "creation_timestamp": "2026-04-13T16:47:38.000000Z"}, {"uuid": "fdf3a00e-36d8-4f74-a9f5-946e3479c8e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://gist.github.com/calenwalshe/e60488e3998fd3d2e527c4af1317edbc", "content": "", "creation_timestamp": "2026-04-15T04:32:14.000000Z"}, {"uuid": "e6f93a69-4033-4231-bf1e-86b971c43fea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/59386", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-31133 PoC\nURL\uff1ahttps://github.com/skynet-f-nvidia/CVE-2025-31133\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-12T09:55:01.000000Z"}, {"uuid": "7c28afad-c0ba-490c-a59f-45a849d27768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://t.me/GithubRedTeam/59132", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aDEPRECATED See CVE-2025-31133, CVE-2025-52565, CVE-2025-52881\nURL\uff1ahttps://github.com/omne-earth/arca\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-10T15:28:52.000000Z"}, {"uuid": "488db91f-7dbb-47da-8d51-4945f895cf5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "published-proof-of-concept", "source": "Telegram/TnTlInxxzNpt0OgbsDLOj6rIodSNCMGeXkGWTk3FIFq8dbI", "content": "", "creation_timestamp": "2025-11-12T15:00:09.000000Z"}, {"uuid": "e226b3e4-98c6-4eb1-8d71-5eb2aada37b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "published-proof-of-concept", "source": "Telegram/kpAlRRu8xQlgCfNCQq-OX6dzLUBUTIsUWhjuGGIHBx_QeuA", "content": "", "creation_timestamp": "2025-11-07T04:08:30.000000Z"}, {"uuid": "f859b95e-2765-4e24-98ed-1c8d4bf01ec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://t.me/information_security_channel/54431", "content": "Runc Vulnerabilities Can Be Exploited to Escape Containers\nhttps://www.securityweek.com/runc-vulnerabilities-can-be-exploited-to-escape-containers/\n\nThe flaws tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881 have been patched.\nThe post Runc Vulnerabilities Can Be Exploited to Escape Containers (https://www.securityweek.com/runc-vulnerabilities-can-be-exploited-to-escape-containers/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2025-11-10T16:54:08.000000Z"}, {"uuid": "3c82d645-1428-44f4-bd89-888c536dbdf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9963", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31137\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: React Router is a multi-strategy router for React bridging the gap from React 18 to React 19. There is a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming Request by putting a URL pathname in the port section of a URL that is part of a Host or X-Forwarded-Host header sent to a Remix/React Router request handler. This issue has been patched and released in Remix 2.16.3 and React Router 7.4.1.\n\ud83d\udccf Published: 2025-04-01T18:20:32.660Z\n\ud83d\udccf Modified: 2025-04-01T18:20:32.660Z\n\ud83d\udd17 References:\n1. https://github.com/remix-run/react-router/security/advisories/GHSA-4q56-crqp-v477", "creation_timestamp": "2025-04-01T18:32:39.000000Z"}, {"uuid": "bafedb44-120f-4729-89f5-c72519e11ee0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31139", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9063", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31139\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: In JetBrains TeamCity before 2025.03 base64 encoded password could be exposed in build log\n\ud83d\udccf Published: 2025-03-27T11:24:30.733Z\n\ud83d\udccf Modified: 2025-03-27T11:24:30.733Z\n\ud83d\udd17 References:\n1. https://www.jetbrains.com/privacy-security/issues-fixed/", "creation_timestamp": "2025-03-27T12:26:17.000000Z"}, {"uuid": "c92f0855-4817-4424-a112-9bdb85548ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31135", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10023", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31135\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Go-Guerrilla SMTP Daemon is a lightweight SMTP server written in Go. Prior to 1.6.7, when ProxyOn is enabled, the PROXY command will be accepted multiple times, with later invocations overriding earlier ones. The proxy protocol only supports one initial PROXY header; anything after that is considered part of the exchange between client and server, so the client is free to send further PROXY commands with whatever data it pleases. go-guerrilla will treat these as coming from the reverse proxy, allowing a client to spoof its IP address. This vulnerability is fixed in 1.6.7.\n\ud83d\udccf Published: 2025-04-01T22:03:09.405Z\n\ud83d\udccf Modified: 2025-04-01T22:03:09.405Z\n\ud83d\udd17 References:\n1. https://github.com/phires/go-guerrilla/security/advisories/GHSA-c2c3-pqw5-5p7c\n2. https://github.com/phires/go-guerrilla/commit/7673947f2d5204a135d7ae0b7f80759e548abee6", "creation_timestamp": "2025-04-01T22:32:44.000000Z"}, {"uuid": "5f89bfe0-c70f-4ad3-b704-e98de0dae0c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9944", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31131\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.\n\ud83d\udccf Published: 2025-04-01T14:56:45.222Z\n\ud83d\udccf Modified: 2025-04-01T16:11:20.111Z\n\ud83d\udd17 References:\n1. https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w34w-fvp3-68xm\n2. https://github.com/YesWiki/yeswiki/commit/f78c915369a60c74ab8f38561ae93a4aaca9b989", "creation_timestamp": "2025-04-01T16:32:25.000000Z"}, {"uuid": "e2107b29-4477-4dc8-a53e-98b6c04abc3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "published-proof-of-concept", "source": "https://t.me/captainsmok3r_official/77", "content": "website:\nhttps://makeafrica.net/\nhttps://reseau.s-mart.fr/\nhttps://ressources.csconnectes.eu/\nhttps://classe-dehors.org/\nvulnerability: CVE-2025-31131\nexploit: https://github.com/nak000/CVE-2025-31131-RCE/blob/main/exploit.py", "creation_timestamp": "2025-08-22T02:26:38.000000Z"}, {"uuid": "3bc0f208-fc58-449e-9428-5281181f864f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3113", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12192", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3113\n\ud83d\udd25 CVSS Score: 9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance\u2019s internal database configurations can leverage the application\u2019s built-in Connector functionality to access Continuous Compliance\u2019s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets.\n\ud83d\udccf Published: 2025-04-17T06:41:47.667Z\n\ud83d\udccf Modified: 2025-04-17T06:50:51.255Z\n\ud83d\udd17 References:\n1. https://portal.perforce.com/s/detail/a91PA000001SeefYAC", "creation_timestamp": "2025-04-17T06:57:12.000000Z"}, {"uuid": "79ba41f5-bc6b-410b-9b4c-970442615dd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/39586", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-31131\nURL\uff1ahttps://github.com/B1ack4sh/Blackash-CVE-2025-31131\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-07T09:20:10.000000Z"}, {"uuid": "cc97990c-21af-4ca9-9930-f4f074374bd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31130", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10475", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31130\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: gitoxide is an implementation of git written in Rust. Before 0.42.0, gitoxide uses SHA-1 hash implementations without any collision detection, leaving it vulnerable to hash collision attacks. gitoxide uses the sha1_smol or sha1 crate, both of which implement standard SHA-1 without any mitigations for collision attacks. This means that two distinct Git objects with colliding SHA-1 hashes would break the Git object model and integrity checks when used with gitoxide. This vulnerability is fixed in 0.42.0.\n\ud83d\udccf Published: 2025-04-04T14:41:56.355Z\n\ud83d\udccf Modified: 2025-04-04T14:51:51.207Z\n\ud83d\udd17 References:\n1. https://github.com/GitoxideLabs/gitoxide/security/advisories/GHSA-2frx-2596-x5r6\n2. https://github.com/GitoxideLabs/gitoxide/commit/4660f7a6f71873311f68f170b0f1f6659a02829d", "creation_timestamp": "2025-04-04T15:37:01.000000Z"}, {"uuid": "d2480872-bb09-4ec2-ac20-ac6ec1a61946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31138", "type": "seen", "source": "https://t.me/cvedetector/22334", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31138 - Tarteaucitron.js Clickjacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31138 \nPublished : April 7, 2025, 3:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : tarteaucitron.js is a compliant and accessible cookie banner. A vulnerability was identified in tarteaucitron.js prior to 1.20.1, where user-controlled inputs for element dimensions (width and height) were not properly validated. This allowed an attacker with direct access to the site's source code or a CMS plugin to set values like 100%;height:100%;position:fixed;, potentially covering the entire viewport and facilitating clickjacking attacks. An attacker with high privileges could exploit this vulnerability to overlay malicious UI elements on top of legitimate content, trick users into interacting with hidden elements (clickjacking), or disrupt the intended functionality and accessibility of the website. This vulnerability is fixed in 1.20.1. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T18:45:02.000000Z"}, {"uuid": "b541deb5-2ac6-4f01-a04c-4af09fa32143", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "published-proof-of-concept", "source": "Telegram/Mu4J56rbgMxUjpsQgufxtJwNSOwCf2oGVYYwILA_0otXlrE", "content": "", "creation_timestamp": "2025-06-07T15:00:07.000000Z"}, {"uuid": "78fa56c5-7bad-4b54-acf6-0a9f8caafe9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3113", "type": "seen", "source": "https://t.me/cvedetector/23214", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3113 - Continuous Compliance Internal Database Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-3113 \nPublished : April 17, 2025, 7:15 a.m. | 56\u00a0minutes ago \nDescription : A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance\u2019s internal database configurations can leverage the application\u2019s built-in Connector functionality to access Continuous Compliance\u2019s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T10:28:09.000000Z"}, {"uuid": "9aad20f3-fc67-49f6-a484-5ec50e145ef7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "seen", "source": "https://t.me/cvedetector/21799", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31137 - Remix/React Router URL Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31137 \nPublished : April 1, 2025, 7:15 p.m. | 25\u00a0minutes ago \nDescription : React Router is a multi-strategy router for React bridging the gap from React 18 to React 19. There is a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming Request by putting a URL pathname in the port section of a URL that is part of a Host or X-Forwarded-Host header sent to a Remix/React Router request handler. This issue has been patched and released in Remix 2.16.3 and React Router 7.4.1. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T22:15:41.000000Z"}, {"uuid": "1fccd7dc-6db3-4e4a-9a10-cbb7e302ff22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31139", "type": "seen", "source": "https://t.me/cvedetector/21280", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31139 - JetBrains TeamCity Password Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31139 \nPublished : March 27, 2025, 12:15 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : In JetBrains TeamCity before 2025.03 base64 encoded password could be exposed in build log \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T14:58:29.000000Z"}, {"uuid": "b95a4601-1fba-47ae-aefe-076331e9951e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31135", "type": "seen", "source": "https://t.me/cvedetector/21826", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31135 - Go-Guerrilla SMTP Daemon Reverse Proxy IP Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31135 \nPublished : April 1, 2025, 10:15 p.m. | 1\u00a0hour, 30\u00a0minutes ago \nDescription : Go-Guerrilla SMTP Daemon is a lightweight SMTP server written in Go. Prior to 1.6.7, when ProxyOn is enabled, the PROXY command will be accepted multiple times, with later invocations overriding earlier ones. The proxy protocol only supports one initial PROXY header; anything after that is considered part of the exchange between client and server, so the client is free to send further PROXY commands with whatever data it pleases. go-guerrilla will treat these as coming from the reverse proxy, allowing a client to spoof its IP address. This vulnerability is fixed in 1.6.7. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T02:26:40.000000Z"}, {"uuid": "d837317f-ab74-4944-92fa-19523a232d19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31130", "type": "seen", "source": "https://t.me/cvedetector/22129", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31130 - Gitoxide SHA-1 Hash Collision Attack Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31130 \nPublished : April 4, 2025, 3:15 p.m. | 41\u00a0minutes ago \nDescription : gitoxide is an implementation of git written in Rust. Before 0.42.0, gitoxide uses SHA-1 hash implementations without any collision detection, leaving it vulnerable to hash collision attacks. gitoxide uses the sha1_smol or sha1 crate, both of which implement standard SHA-1 without any mitigations for collision attacks. This means that two distinct Git objects with colliding SHA-1 hashes would break the Git object model and integrity checks when used with gitoxide. This vulnerability is fixed in 0.42.0. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T18:01:13.000000Z"}, {"uuid": "90123b3a-ba9f-4b2b-98ac-4f50a179035e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31137", "type": "published-proof-of-concept", "source": "Telegram/m_VX8ITBtSBz-wC_458XeKLmc3TfY-HOZ02yPgCyfuW9sk0", "content": "", "creation_timestamp": "2025-04-23T21:00:07.000000Z"}, {"uuid": "5a71f8c2-cc01-4eef-b466-1c2ae81423ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3113", "type": "seen", "source": "Telegram/jrReKndJEIIsIC3ejcV3Cb0KdRjUvz--FOWMYVkZUyMQ3kk", "content": "", "creation_timestamp": "2025-04-17T10:00:35.000000Z"}, {"uuid": "0937afa3-4552-4f72-90a3-7e899e633dbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "published-proof-of-concept", "source": "Telegram/sQCbqznhLKENEy-bIT4Xf2mLEDHHNqQzKWW8VQqo_AcxwBM", "content": "", "creation_timestamp": "2025-04-04T23:00:05.000000Z"}, {"uuid": "13a085bc-74f3-482f-8a5c-66d9c6e4b8c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31131", "type": "published-proof-of-concept", "source": "Telegram/gptxcG5Jvg83wR56zKKTs8fGBMXLE7PNQ-HCnd7IEVmsKx8", "content": "", "creation_timestamp": "2025-04-05T21:00:06.000000Z"}, {"uuid": "f40a1843-3b75-49e4-97cf-98c4ab396946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31133", "type": "seen", "source": "https://bsky.app/profile/unraid.net/post/3mkocnold3a2s", "content": "Security first. \ud83d\udee1\ufe0f\n\nUnraid 7.3.0-rc.1 brings a major security-forward reason to upgrade your test servers.\n\nPatched:\n\ud83d\udd12 Docker 29.3.1 runc fixes (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881)\n\ud83d\udd12 bind updated for outstanding CVEs\n\nPlus: AMD XDNA support &amp; QEMU 10.2.2!", "creation_timestamp": "2026-04-30T00:00:35.871235Z"}]}