{"vulnerability": "CVE-2025-3117", "sightings": [{"uuid": "277be89a-1010-4137-bafb-bae459043221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31172", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114295078467818703", "content": "", "creation_timestamp": "2025-04-07T05:41:33.736013Z"}, {"uuid": "9df55cae-5cd8-4791-8e93-5d6a33ead889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31170", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114295107298124120", "content": "", "creation_timestamp": "2025-04-07T05:48:53.839831Z"}, {"uuid": "55fffd44-4c07-450e-bb6c-a24b0f254aba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31173", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114295107323797874", "content": "", "creation_timestamp": "2025-04-07T05:48:54.160887Z"}, {"uuid": "8321af8d-60cd-4ae2-a158-c4a28c156681", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31175", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114295107356607964", "content": "", "creation_timestamp": "2025-04-07T05:48:55.773750Z"}, {"uuid": "ad9e86be-ee44-423d-a90b-7460b3b3975e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31172", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm7g63tsxp2z", "content": "", "creation_timestamp": "2025-04-07T07:17:44.684134Z"}, {"uuid": "4ad867f4-18d2-4c03-b95f-eff704851172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31174", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm7g644c6x2h", "content": "", "creation_timestamp": "2025-04-07T07:17:45.749676Z"}, {"uuid": "e9ba17e8-9cfa-4b3b-90ed-3c09387b31d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31173", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm7g647icc2q", "content": "", "creation_timestamp": "2025-04-07T07:17:46.263382Z"}, {"uuid": "38100206-3d23-447e-8f74-bf666e1c7fe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31175", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm7g64thx22q", "content": "", "creation_timestamp": "2025-04-07T07:17:49.644190Z"}, {"uuid": "c4f101b1-6fa2-40fd-9775-c90c76f27a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31171", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm7g64xbcl2b", "content": "", "creation_timestamp": "2025-04-07T07:17:50.182803Z"}, {"uuid": "c07d3e09-767b-4de0-9a12-d8108c748c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31170", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm7g655vwk2q", "content": "", "creation_timestamp": "2025-04-07T07:17:51.281262Z"}, {"uuid": "a6bec3eb-806b-4486-83c1-a6279980e21f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31177", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lomckwmwph24", "content": "", "creation_timestamp": "2025-05-07T21:08:17.685910Z"}, {"uuid": "9d855666-641d-4136-98b9-01ebb1379215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31177", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lomdisyggoa2", "content": "", "creation_timestamp": "2025-05-07T21:25:56.707097Z"}, {"uuid": "24648a13-7cfa-4123-a9bd-db94974d2fe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3117", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-03", "content": "", "creation_timestamp": "2025-06-24T10:00:00.000000Z"}, {"uuid": "8544c9c9-23d3-47a1-b78c-8072ea52e794", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31176", "type": "seen", "source": "https://gist.github.com/Darkcrai86/5b60135f809802b3c34ced9dfe47a58e", "content": "", "creation_timestamp": "2025-09-25T09:38:19.000000Z"}, {"uuid": "7cfd1771-ab5f-4eb5-9528-25584014e5e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31179", "type": "seen", "source": "https://gist.github.com/Darkcrai86/5b60135f809802b3c34ced9dfe47a58e", "content": "", "creation_timestamp": "2025-09-25T09:38:19.000000Z"}, {"uuid": "ff9ffcf2-656b-46e3-b212-198ec38d0df9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31178", "type": "seen", "source": "https://gist.github.com/Darkcrai86/5b60135f809802b3c34ced9dfe47a58e", "content": "", "creation_timestamp": "2025-09-25T09:38:19.000000Z"}, {"uuid": "7c29e791-578c-4c75-9c4b-42964aa78850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31177", "type": "seen", "source": "https://gist.github.com/Darkcrai86/5b60135f809802b3c34ced9dfe47a58e", "content": "", "creation_timestamp": "2025-09-25T09:38:19.000000Z"}, {"uuid": "511d4a4c-1ac1-4af5-9ac9-243e0d60977d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31176", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9166", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31176\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in gnuplot. The plot3d_points() function may lead to a segmentation fault and cause a system crash.\n\ud83d\udccf Published: 2025-03-27T15:06:20.163Z\n\ud83d\udccf Modified: 2025-03-27T18:10:14.213Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-31176\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2355343", "creation_timestamp": "2025-03-27T18:26:42.000000Z"}, {"uuid": "611d9b4d-cfe0-43a8-89c7-7a9964659a15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31179", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9104", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31179\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in gnuplot. The xstrftime() function may lead to a segmentation fault, causing a system crash.\n\ud83d\udccf Published: 2025-03-27T15:08:36.013Z\n\ud83d\udccf Modified: 2025-03-27T15:23:33.486Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-31179\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2355340", "creation_timestamp": "2025-03-27T15:26:31.000000Z"}, {"uuid": "4050bd7f-f77f-4bc8-b680-96e66c3af2d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31178", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9109", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31178\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in gnuplot. The GetAnnotateString() function may lead to a segmentation fault and cause a system crash.\n\ud83d\udccf Published: 2025-03-27T15:06:38.451Z\n\ud83d\udccf Modified: 2025-03-27T15:22:21.011Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-31178\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2355341", "creation_timestamp": "2025-03-27T15:26:38.000000Z"}, {"uuid": "ea1ffa4a-a401-4f4c-8223-e2c8ad7bdc86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31177", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15441", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31177\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: gnuplot is affected by a heap buffer overflow at function utf8_copy_one.\n\ud83d\udccf Published: 2025-05-07T20:55:21.714Z\n\ud83d\udccf Modified: 2025-05-07T20:55:21.714Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-31177\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2355342", "creation_timestamp": "2025-05-07T21:22:58.000000Z"}, {"uuid": "af0bcfb8-d507-468c-92a0-4b0a9aed9672", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3117", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17851", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3117\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability\nexists impacting configuration file paths that could cause an unvalidated data injected by authenticated\nmalicious user leading to modify or read data in a victim\u2019s browser.\n\ud83d\udccf Published: 2025-06-10T08:43:15.540Z\n\ud83d\udccf Modified: 2025-06-10T08:43:15.540Z\n\ud83d\udd17 References:\n1. https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-161-02&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2025-161-02.pdf", "creation_timestamp": "2025-06-10T09:33:09.000000Z"}, {"uuid": "4452ecfb-269e-4475-88dd-44b4a2d56fa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3117", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/1198", "content": "\u0627\u0634\u0646\u0627\u06cc\u062f\u0631 \u0627\u0644\u06a9\u062a\u0631\u06cc\u06a9 \u06af\u0632\u0627\u0631\u0634 \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0647 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0632\u06cc\u0631 \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647\u200c\u0627\u0646\u062f:\n\n\u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc Modicon M241: \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u0628\u0644 \u0627\u0632 5.3.12.51\n\u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc Modicon M251: \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u0628\u0644 \u0627\u0632 5.3.12.51\n\u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc Modicon M262: \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u0628\u0644 \u0627\u0632 5.3.9.18 (CVE-2025-3898\u060c CVE-2025-3117)\n\u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc Modicon M258: \u0647\u0645\u0647 \u0646\u0633\u062e\u0647\u200c\u0647\u0627 (CVE-2025-3905\u060c CVE-2025-3116\u060c CVE-2025-3117)\n\u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc Modicon LMC058: \u0647\u0645\u0647 \u0646\u0633\u062e\u0647\u200c\u0647\u0627 (CVE-2025-3905\u060c CVE-2025-3116\u060c CVE-2025-3117)\n\n\u0627\u0639\u062a\u0628\u0627\u0631\u0633\u0646\u062c\u06cc \u0648\u0631\u0648\u062f\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 CWE-20\n\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0639\u062a\u0628\u0627\u0631\u0633\u0646\u062c\u06cc \u0648\u0631\u0648\u062f\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0627\u0639\u062b ...  \u0634\u0631\u0627\u06cc\u0637 \u0627\u0646\u06a9\u0627\u0631 \u0633\u0631\u0648\u06cc\u0633 \u0632\u0645\u0627\u0646\u06cc \u0631\u062e \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0647 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0645\u062e\u0631\u0628 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647\u060c \u06cc\u06a9 \u062f\u0631\u062e\u0648\u0627\u0633\u062a HTTPS \u062d\u0627\u0648\u06cc \u0646\u0648\u0639 \u062f\u0627\u062f\u0647 \u0646\u0627\u0645\u0639\u062a\u0628\u0631 \u0628\u0647 \u0648\u0628 \u0633\u0631\u0648\u0631 \u0627\u0631\u0633\u0627\u0644 \u06a9\u0646\u062f.\n\n\u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS \u0646\u0633\u062e\u0647 \u06f4 \u0628\u0631\u0627\u06cc CVE-2025-3898 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0627\u0645\u062a\u06cc\u0627\u0632 \u067e\u0627\u06cc\u0647 \u06f7.\u06f1 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a\u061b \u0631\u0634\u062a\u0647 \u0628\u0631\u062f\u0627\u0631 CVSS \u0639\u0628\u0627\u0631\u062a \u0627\u0633\u062a \u0627\u0632 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).\n\n\u062e\u0646\u062b\u06cc\u200c\u0633\u0627\u0632\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0648\u0631\u0648\u062f\u06cc \u062f\u0631 \u0637\u0648\u0644 \u062a\u0648\u0644\u06cc\u062f \u0635\u0641\u062d\u0647 \u0648\u0628 ('\u0627\u0633\u06a9\u0631\u06cc\u067e\u062a\u200c\u0646\u0648\u06cc\u0633\u06cc \u0628\u06cc\u0646\u200c\u0633\u0627\u06cc\u062a\u06cc') CWE-79\n\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062e\u0646\u062b\u06cc\u200c\u0633\u0627\u0632\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0648\u0631\u0648\u062f\u06cc \u062f\u0631 \u0637\u0648\u0644 \u062a\u0648\u0644\u06cc\u062f \u0635\u0641\u062d\u0647 \u0648\u0628 ('\u0627\u0633\u06a9\u0631\u06cc\u067e\u062a\u200c\u0646\u0648\u06cc\u0633\u06cc \u0628\u06cc\u0646\u200c\u0633\u0627\u06cc\u062a\u06cc') \u062f\u0631 \u0635\u0641\u062d\u0647 \u06af\u0648\u0627\u0647\u06cc\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0648\u0628 \u0633\u0631\u0648\u0631 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0627\u0639\u062b \u062a\u0632\u0631\u06cc\u0642 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u0646\u0627\u0645\u0639\u062a\u0628\u0631 \u062a\u0648\u0633\u0637 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0645\u062e\u0631\u0628 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647 \u0648 \u062f\u0631 \u0646\u062a\u06cc\u062c\u0647 \u062a\u063a\u06cc\u06cc\u0631 \u06cc\u0627 \u062e\u0648\u0627\u0646\u062f\u0646 \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u062f\u0631 \u0645\u0631\u0648\u0631\u06af\u0631 \u0642\u0631\u0628\u0627\u0646\u06cc \u0634\u0648\u062f.  \u0647\u0645\u0686\u0646\u06cc\u0646 \u0628\u0631\u0627\u06cc CVE-2025-3899 \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS \u0646\u0633\u062e\u0647 \u06f4 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0627\u0645\u062a\u06cc\u0627\u0632 \u067e\u0627\u06cc\u0647 \u06f5.\u06f1 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a\u061b \u0631\u0634\u062a\u0647 \u0628\u0631\u062f\u0627\u0631 CVSS \u0628\u0647 \u0635\u0648\u0631\u062a (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N) \u0627\u0633\u062a.\n\n\u0645\u0635\u0631\u0641 \u0645\u0646\u0627\u0628\u0639 \u06a9\u0646\u062a\u0631\u0644 \u0646\u0634\u062f\u0647 CWE-400\n\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0635\u0631\u0641 \u0645\u0646\u0627\u0628\u0639 \u06a9\u0646\u062a\u0631\u0644 \u0646\u0634\u062f\u0647 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0627\u0639\u062b \u0627\u06cc\u062c\u0627\u062f \u0634\u0631\u0627\u06cc\u0637 \u0627\u0646\u06a9\u0627\u0631 \u0633\u0631\u0648\u06cc\u0633 \u0634\u0648\u062f\u060c \u0632\u0645\u0627\u0646\u06cc \u06a9\u0647 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0645\u062e\u0631\u0628 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647 \u06cc\u06a9 \u0647\u062f\u0631 HTTPS Content-Length \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u0634\u062f\u0647 \u0631\u0627 \u0628\u0647 \u0648\u0628 \u0633\u0631\u0648\u0631 \u0627\u0631\u0633\u0627\u0644 \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\n\u0647\u0645\u0686\u0646\u06cc\u0646 \u0628\u0631\u0627\u06cc CVE-2025-3112 \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS \u0646\u0633\u062e\u0647 \u06f4 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0627\u0645\u062a\u06cc\u0627\u0632 \u067e\u0627\u06cc\u0647 \u06f7.\u06f1 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a\u061b  \u0631\u0634\u062a\u0647 \u0628\u0631\u062f\u0627\u0631 CVSS \u0639\u0628\u0627\u0631\u062a \u0627\u0633\u062a \u0627\u0632 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).\n\n\u062e\u0646\u062b\u06cc\u200c\u0633\u0627\u0632\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0648\u0631\u0648\u062f\u06cc \u062f\u0631 \u0637\u0648\u0644 \u062a\u0648\u0644\u06cc\u062f \u0635\u0641\u062d\u0647 \u0648\u0628 ('\u0627\u0633\u06a9\u0631\u06cc\u067e\u062a\u200c\u0646\u0648\u06cc\u0633\u06cc \u0628\u06cc\u0646\u200c\u0633\u0627\u06cc\u062a\u06cc') CWE-79\n\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062e\u0646\u062b\u06cc\u200c\u0633\u0627\u0632\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0648\u0631\u0648\u062f\u06cc \u062f\u0631 \u0637\u0648\u0644 \u062a\u0648\u0644\u06cc\u062f \u0635\u0641\u062d\u0647 \u0648\u0628 ('\u0627\u0633\u06a9\u0631\u06cc\u067e\u062a\u200c\u0646\u0648\u06cc\u0633\u06cc \u0628\u06cc\u0646\u200c\u0633\u0627\u06cc\u062a\u06cc') \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f \u06a9\u0647 \u0628\u0631 \u0645\u062a\u063a\u06cc\u0631\u0647\u0627\u06cc \u0633\u06cc\u0633\u062a\u0645 PLC \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc\u200c\u06af\u0630\u0627\u0631\u062f \u0648 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0627\u0639\u062b \u062a\u0632\u0631\u06cc\u0642 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u0646\u0627\u0645\u0639\u062a\u0628\u0631 \u062a\u0648\u0633\u0637 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0645\u062e\u0631\u0628 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647 \u0634\u0648\u062f \u06a9\u0647 \u0645\u0646\u062c\u0631 \u0628\u0647 \u062a\u063a\u06cc\u06cc\u0631 \u06cc\u0627 \u062e\u0648\u0627\u0646\u062f\u0646 \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u062f\u0631 \u0645\u0631\u0648\u0631\u06af\u0631 \u0642\u0631\u0628\u0627\u0646\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f.\n\n\u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS \u0646\u0633\u062e\u0647 \u06f4 \u0628\u0631\u0627\u06cc CVE-2025-3905 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0627\u0645\u062a\u06cc\u0627\u0632 \u067e\u0627\u06cc\u0647 \u06f5.\u06f1 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a.  \u0631\u0634\u062a\u0647 \u0628\u0631\u062f\u0627\u0631 CVSS \u0628\u0647 \u0635\u0648\u0631\u062a (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N) \u0627\u0633\u062a.\n\n\u0627\u0639\u062a\u0628\u0627\u0631\u0633\u0646\u062c\u06cc \u0648\u0631\u0648\u062f\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 CWE-20\n\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0639\u062a\u0628\u0627\u0631\u0633\u0646\u062c\u06cc \u0648\u0631\u0648\u062f\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0627\u0639\u062b \u0627\u06cc\u062c\u0627\u062f \u0634\u0631\u0627\u06cc\u0637 \u0627\u0646\u06a9\u0627\u0631 \u0633\u0631\u0648\u06cc\u0633 \u0634\u0648\u062f\u060c \u0632\u0645\u0627\u0646\u06cc \u06a9\u0647 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0645\u062e\u0631\u0628 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647 \u06cc\u06a9 \u062f\u0631\u062e\u0648\u0627\u0633\u062a HTTPS \u062e\u0627\u0635 \u0646\u0627\u0642\u0635 \u062d\u0627\u0648\u06cc \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u0628\u062f\u0646\u0647 \u0628\u0627 \u0641\u0631\u0645\u062a \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0631\u0627 \u0628\u0647 \u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647 \u0627\u0631\u0633\u0627\u0644 \u0645\u06cc\u200c\u06a9\u0646\u062f. \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS \u0646\u0633\u062e\u0647 \u06f4 \u0646\u06cc\u0632 \u0628\u0631\u0627\u06cc CVE-2025-3116 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0627\u0645\u062a\u06cc\u0627\u0632 \u067e\u0627\u06cc\u0647 \u06f7.\u06f1 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0631\u0634\u062a\u0647 \u0628\u0631\u062f\u0627\u0631 CVSS \u0628\u0647 \u0635\u0648\u0631\u062a (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) \u0627\u0633\u062a.\n\n \u062e\u0646\u062b\u06cc\u200c\u0633\u0627\u0632\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0648\u0631\u0648\u062f\u06cc \u062f\u0631 \u0637\u0648\u0644 \u062a\u0648\u0644\u06cc\u062f \u0635\u0641\u062d\u0647 \u0648\u0628 ('\u0627\u0633\u06a9\u0631\u06cc\u067e\u062a\u200c\u0646\u0648\u06cc\u0633\u06cc \u0628\u06cc\u0646\u200c\u0633\u0627\u06cc\u062a\u06cc') CWE-79\n\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062e\u0646\u062b\u06cc\u200c\u0633\u0627\u0632\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0648\u0631\u0648\u062f\u06cc \u062f\u0631 \u0637\u0648\u0644 \u062a\u0648\u0644\u06cc\u062f \u0635\u0641\u062d\u0647 \u0648\u0628 ('\u0627\u0633\u06a9\u0631\u06cc\u067e\u062a\u200c\u0646\u0648\u06cc\u0633\u06cc \u0628\u06cc\u0646\u200c\u0633\u0627\u06cc\u062a\u06cc') \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f \u06a9\u0647 \u0645\u0633\u06cc\u0631\u0647\u0627\u06cc \u0641\u0627\u06cc\u0644 \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc \u0631\u0627 \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f \u0648 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0627\u0639\u062b \u062a\u0632\u0631\u06cc\u0642 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u0646\u0627\u0645\u0639\u062a\u0628\u0631 \u062a\u0648\u0633\u0637 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0645\u062e\u0631\u0628 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647 \u0634\u0648\u062f \u06a9\u0647 \u0645\u0646\u062c\u0631 \u0628\u0647 \u062a\u063a\u06cc\u06cc\u0631 \u06cc\u0627 \u062e\u0648\u0627\u0646\u062f\u0646 \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u062f\u0631 \u0645\u0631\u0648\u0631\u06af\u0631 \u0642\u0631\u0628\u0627\u0646\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f.\n\n\u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS \u0646\u0633\u062e\u0647 \u06f4 \u0628\u0631\u0627\u06cc CVE-2025-3117 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0627\u0645\u062a\u06cc\u0627\u0632 \u067e\u0627\u06cc\u0647 \u06f5.\u06f1 \u0645\u062d\u0627\u0633\u0628\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a\u061b \u0631\u0634\u062a\u0647 \u0628\u0631\u062f\u0627\u0631 CVSS \u0639\u0628\u0627\u0631\u062a \u0627\u0633\u062a \u0627\u0632 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N).\n\nhttps://www.cisa.gov/news-events/ics-advisories/icsa-25-175-03\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ICSCERT_IR\n\u06af\u0631\u0648\u0647 \u0627\u06cc\u062a\u0627:\nhttps://eitaa.com/joinchat/1866007784Cfd023f90b2", "creation_timestamp": "2025-06-25T10:49:24.000000Z"}, {"uuid": "9c33bf1d-1326-422f-a994-144bbf4a8e39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31171", "type": "seen", "source": "https://t.me/cvedetector/22260", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31171 - \"Apache Kernel File System Module Permission Bypass Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-31171 \nPublished : April 7, 2025, 4:15 a.m. | 2\u00a0hours, 10\u00a0minutes ago \nDescription : File read permission bypass vulnerability in the kernel file system module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T08:42:03.000000Z"}, {"uuid": "cf757a13-6769-4a14-8c91-4e0b919eb176", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31172", "type": "seen", "source": "https://t.me/cvedetector/22261", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31172 - VMware Kernel Futex Module Memory Write Permission Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31172 \nPublished : April 7, 2025, 4:15 a.m. | 2\u00a0hours, 10\u00a0minutes ago \nDescription : Memory write permission bypass vulnerability in the kernel futex module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T08:42:04.000000Z"}, {"uuid": "8db30eda-3290-449b-9311-496153068991", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31175", "type": "seen", "source": "https://t.me/cvedetector/22254", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31175 - DSoftBus Deserialization Mismatch Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31175 \nPublished : April 7, 2025, 4:15 a.m. | 2\u00a0hours, 10\u00a0minutes ago \nDescription : Deserialization mismatch vulnerability in the DSoftBus module  \nImpact: Successful exploitation of this vulnerability may affect service integrity. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T08:41:51.000000Z"}, {"uuid": "ad54a25b-6237-450f-9083-1957307e591a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31170", "type": "seen", "source": "https://t.me/cvedetector/22259", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31170 - Apache Security Verification Module Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-31170 \nPublished : April 7, 2025, 4:15 a.m. | 2\u00a0hours, 10\u00a0minutes ago \nDescription : Access control vulnerability in the security verification module  \nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T08:41:59.000000Z"}, {"uuid": "13e4c287-619b-4aaa-83aa-f01d58bcd08d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31173", "type": "seen", "source": "https://t.me/cvedetector/22256", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31173 - \"Oracle Solaris Futex Kernel Memory Write Permission Bypass Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-31173 \nPublished : April 7, 2025, 4:15 a.m. | 2\u00a0hours, 10\u00a0minutes ago \nDescription : Memory write permission bypass vulnerability in the kernel futex module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T08:41:56.000000Z"}, {"uuid": "963eb838-5f9b-4cc0-a607-3fd27b36ba27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31174", "type": "seen", "source": "https://t.me/cvedetector/22255", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31174 - Cisco DFS Module Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31174 \nPublished : April 7, 2025, 4:15 a.m. | 2\u00a0hours, 10\u00a0minutes ago \nDescription : Path traversal vulnerability in the DFS module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T08:41:55.000000Z"}, {"uuid": "6d9305c4-a85c-452b-9aac-f479c4b8f179", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31176", "type": "seen", "source": "https://t.me/cvedetector/21294", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31176 - Gnuplot Segmentation Fault Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31176 \nPublished : March 27, 2025, 3:16 p.m. | 20\u00a0minutes ago \nDescription : A flaw was found in gnuplot. The plot3d_points() function may lead to a segmentation fault and cause a system crash. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T16:39:01.000000Z"}, {"uuid": "d4d2c93f-0ad8-46bf-9da1-e7da5b1e069b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31179", "type": "seen", "source": "https://t.me/cvedetector/21296", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31179 - Gnuplot Date Format Crash\", \n  \"Content\": \"CVE ID : CVE-2025-31179 \nPublished : March 27, 2025, 3:16 p.m. | 20\u00a0minutes ago \nDescription : A flaw was found in gnuplot. The xstrftime() function may lead to a segmentation fault, causing a system crash. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T16:39:03.000000Z"}, {"uuid": "46d60b7c-0092-4c0c-b7a8-76c4dd4d7af2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31178", "type": "seen", "source": "https://t.me/cvedetector/21295", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31178 - Gnuplot Stack-Based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-31178 \nPublished : March 27, 2025, 3:16 p.m. | 20\u00a0minutes ago \nDescription : A flaw was found in gnuplot. The GetAnnotateString() function may lead to a segmentation fault and cause a system crash. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T16:39:02.000000Z"}, {"uuid": "4afdb4e4-585f-4d9c-8496-34667f10e8fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31175", "type": "published-proof-of-concept", "source": "Telegram/EsnBsJ3Ssj-UYUC8Y7f1d_DSxyldCCaK6EjJlv4mvyH2MMw", "content": "", "creation_timestamp": "2025-04-07T06:32:02.000000Z"}, {"uuid": "14bad15b-daa6-491e-beec-663008261452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31172", "type": "published-proof-of-concept", "source": "Telegram/EsnBsJ3Ssj-UYUC8Y7f1d_DSxyldCCaK6EjJlv4mvyH2MMw", "content": "", "creation_timestamp": "2025-04-07T06:32:02.000000Z"}, {"uuid": "a405c955-e50b-4d7b-8b68-2bb406586230", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31173", "type": "published-proof-of-concept", "source": "Telegram/EsnBsJ3Ssj-UYUC8Y7f1d_DSxyldCCaK6EjJlv4mvyH2MMw", "content": "", "creation_timestamp": "2025-04-07T06:32:02.000000Z"}, {"uuid": "ae3ae4de-2c13-40a3-9ee5-d867bf545ece", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31170", "type": "published-proof-of-concept", "source": "Telegram/EsnBsJ3Ssj-UYUC8Y7f1d_DSxyldCCaK6EjJlv4mvyH2MMw", "content": "", "creation_timestamp": "2025-04-07T06:32:02.000000Z"}, {"uuid": "0bbeb6a6-e31d-40ee-ac9d-03976b911251", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31177", "type": "seen", "source": "https://t.me/cvedetector/24780", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31177 - Gnuplot Heap Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31177 \nPublished : May 7, 2025, 9:16 p.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : gnuplot is affected by a heap buffer overflow at function utf8_copy_one. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T00:52:57.000000Z"}]}