{"vulnerability": "CVE-2025-3124", "sightings": [{"uuid": "20a28281-c5bd-4db1-9e3e-b2eff9d050c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3124", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln2mk65orc2l", "content": "", "creation_timestamp": "2025-04-18T02:53:42.590573Z"}, {"uuid": "09670d7f-3e1a-4f0c-b370-2a703506a46e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31241", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpimn42o5k2k", "content": "", "creation_timestamp": "2025-05-19T03:23:01.605165Z"}, {"uuid": "7dfeabbc-9380-4af8-a1d4-df4a717e905e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3124", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-c904c3bb-6eed188d8acb3d31", "content": "", "creation_timestamp": "2025-04-22T10:51:26.595343Z"}, {"uuid": "f160229f-0c9b-481a-8ab1-b38e655a1e77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31242", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loz2fzkcc42l", "content": "", "creation_timestamp": "2025-05-12T22:46:59.795216Z"}, {"uuid": "f8903981-c8aa-45b2-a4da-17d358f69ac8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31240", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loz2fzvi3f2j", "content": "", "creation_timestamp": "2025-05-12T22:47:00.571501Z"}, {"uuid": "73ca8830-acb4-4535-90de-7d2826154ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31241", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loz2g26k4o2j", "content": "", "creation_timestamp": "2025-05-12T22:47:01.819620Z"}, {"uuid": "cf3f475c-a168-4cc7-9332-be5f907b3528", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31244", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loz2g2flkh2h", "content": "", "creation_timestamp": "2025-05-12T22:47:03.044614Z"}, {"uuid": "b71fef48-f5a3-439e-9a0a-e69569fd5548", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31246", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loz2g2jdpj2e", "content": "", "creation_timestamp": "2025-05-12T22:47:03.635126Z"}, {"uuid": "5ef0b739-22f0-4034-a42a-829585ed1247", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31249", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loz2g2vtti2h", "content": "", "creation_timestamp": "2025-05-12T22:47:05.610113Z"}, {"uuid": "8dd751ed-8cae-4ba3-9237-a27ae7acbe93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31247", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loz2g35uwr2e", "content": "", "creation_timestamp": "2025-05-12T22:47:06.728961Z"}, {"uuid": "de7b0f1e-34f2-4239-95f1-5a380555a1b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31245", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loz2g3nkn42l", "content": "", "creation_timestamp": "2025-05-12T22:47:09.129648Z"}, {"uuid": "49dd4409-5587-49ca-9ac5-1b146f5f5368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31240", "type": "seen", "source": "Telegram/uS-LGh_eIl2lI_O3kT7MFmdoi3VL-1CYgYB6CRF5I8i3PT0", "content": "", "creation_timestamp": "2026-04-02T22:17:20.000000Z"}, {"uuid": "02a809b9-cc6a-4a2d-a54b-663934c66b60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31241", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpb2yg6yps2m", "content": "", "creation_timestamp": "2025-05-16T03:18:35.364427Z"}, {"uuid": "e6395efc-9b54-4826-99d2-310ee1535f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31248", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m66g6kdl7t2b", "content": "", "creation_timestamp": "2025-11-21T23:18:46.953183Z"}, {"uuid": "8c83db6c-6efe-4e98-a8bb-0faccd100dcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31240", "type": "seen", "source": "Telegram/D2Q8ZJtbt01P_hfwyXC7lQ4EJlbjNcIuURdjGDUEt8LUtAQ", "content": "", "creation_timestamp": "2026-04-02T22:17:36.000000Z"}, {"uuid": "30c410ec-b5c6-4f8e-b684-1cbd85427740", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31247", "type": "seen", "source": "Telegram/D2Q8ZJtbt01P_hfwyXC7lQ4EJlbjNcIuURdjGDUEt8LUtAQ", "content": "", "creation_timestamp": "2026-04-02T22:17:36.000000Z"}, {"uuid": "33ce7055-3f9f-46dd-a2b8-279929b8853c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31243", "type": "seen", "source": "Telegram/KPFmBxUL_TPwA3hDhoR9h9PMgAu8sVTpVxH6h4m-_4yW_jc", "content": "", "creation_timestamp": "2026-04-02T22:17:44.000000Z"}, {"uuid": "124fb739-04d3-4d20-ba60-18df59abf62c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3124", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12375", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3124\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A missing authorization vulnerability was identified in GitHub Enterprise Server that allowed a user to see the names of private repositories that they wouldn't otherwise have access to in the Security Overview in GitHub Advanced Security. The Security Overview was required to be filtered only using the `archived:` filter and all other access controls were functioning normally. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.17 and was fixed in versions 3.13.14, 3.14.11, 3.15.6, and 3.16.2.\n\ud83d\udccf Published: 2025-04-17T22:50:14.017Z\n\ud83d\udccf Modified: 2025-04-17T22:50:14.017Z\n\ud83d\udd17 References:\n1. https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.14\n2. https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.11\n3. https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.6\n4. https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.2", "creation_timestamp": "2025-04-17T22:58:31.000000Z"}, {"uuid": "eaeadcc4-2555-4bc3-ae60-4268b7d7b2c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31240", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16235", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31240\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. Mounting a maliciously crafted AFP network share may lead to system termination.\n\ud83d\udccf Published: 2025-05-12T21:42:57.249Z\n\ud83d\udccf Modified: 2025-05-13T20:13:37.227Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122716\n2. https://support.apple.com/en-us/122717\n3. https://support.apple.com/en-us/122718", "creation_timestamp": "2025-05-13T20:31:18.000000Z"}, {"uuid": "06dc2c61-e60f-4218-89dc-e6ee6801cbea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31244", "type": "seen", "source": "https://t.me/cvedetector/25136", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31244 - A file quarantine bypass was addressed with additi\", \n  \"Content\": \"CVE ID : CVE-2025-31244 \nPublished : May 12, 2025, 10:15 p.m. | 15\u00a0minutes ago \nDescription : A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.5. An app may be able to break out of its sandbox. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T01:19:35.000000Z"}, {"uuid": "4c911327-e246-400a-9b22-dfb43e25d183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31244", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16132", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31244\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.5. An app may be able to break out of its sandbox.\n\ud83d\udccf Published: 2025-05-12T21:42:30.676Z\n\ud83d\udccf Modified: 2025-05-13T14:07:39.800Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122716", "creation_timestamp": "2025-05-13T14:30:55.000000Z"}, {"uuid": "93bb3ed5-0cb4-487d-b232-982353028299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3124", "type": "seen", "source": "https://t.me/cvedetector/23292", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3124 - GitHub Enterprise Server Private Repository Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-3124 \nPublished : April 17, 2025, 11:15 p.m. | 1\u00a0hour, 10\u00a0minutes ago \nDescription : A missing authorization vulnerability was identified in GitHub Enterprise Server that allowed a user to see the names of private repositories that they wouldn't otherwise have access to in the Security Overview in GitHub Advanced Security. The Security Overview was required to be filtered only using the `archived:` filter and all other access controls were functioning normally. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.17 and was fixed in versions 3.13.14, 3.14.11, 3.15.6, and 3.16.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T03:12:06.000000Z"}, {"uuid": "a865bd0e-3e34-4111-91e7-5fe4b72ba925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31246", "type": "seen", "source": "https://t.me/cvedetector/25128", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31246 - The issue was addressed with improved memory handl\", \n  \"Content\": \"CVE ID : CVE-2025-31246 \nPublished : May 12, 2025, 10:15 p.m. | 15\u00a0minutes ago \nDescription : The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.6. Connecting to a malicious AFP server may corrupt kernel memory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T01:19:27.000000Z"}, {"uuid": "a2707a49-a332-4093-9833-e6eaa34111ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31245", "type": "seen", "source": "https://t.me/cvedetector/25127", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31245 - The issue was addressed with improved checks. This\", \n  \"Content\": \"CVE ID : CVE-2025-31245 \nPublished : May 12, 2025, 10:15 p.m. | 15\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. An app may be able to cause unexpected system termination. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T01:19:26.000000Z"}, {"uuid": "52a3d3f4-375a-45e1-b5c4-d98b67d96272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31242", "type": "seen", "source": "https://t.me/cvedetector/25126", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31242 - A privacy issue was addressed with improved privat\", \n  \"Content\": \"CVE ID : CVE-2025-31242 \nPublished : May 12, 2025, 10:15 p.m. | 15\u00a0minutes ago \nDescription : A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iPadOS 17.7.7, macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An app may be able to access sensitive user data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T01:19:22.000000Z"}, {"uuid": "ac4d4015-9712-4199-b363-5c27221a302c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31247", "type": "seen", "source": "https://t.me/cvedetector/25135", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31247 - A logic issue was addressed with improved state ma\", \n  \"Content\": \"CVE ID : CVE-2025-31247 \nPublished : May 12, 2025, 10:15 p.m. | 15\u00a0minutes ago \nDescription : A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An attacker may gain access to protected parts of the file system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T01:19:35.000000Z"}, {"uuid": "c34174f2-5929-47ac-9a2f-b4931547d9a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31240", "type": "seen", "source": "https://t.me/cvedetector/25131", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31240 - This issue was addressed with improved checks. Thi\", \n  \"Content\": \"CVE ID : CVE-2025-31240 \nPublished : May 12, 2025, 10:15 p.m. | 15\u00a0minutes ago \nDescription : This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. Mounting a maliciously crafted AFP network share may lead to system termination. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T01:19:29.000000Z"}, {"uuid": "c48e15a6-c978-4590-b1df-6d0314c4d3df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31249", "type": "seen", "source": "https://t.me/cvedetector/25133", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31249 - A logic issue was addressed with improved checks.\", \n  \"Content\": \"CVE ID : CVE-2025-31249 \nPublished : May 12, 2025, 10:15 p.m. | 15\u00a0minutes ago \nDescription : A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.5. An app may be able to access sensitive user data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T01:19:33.000000Z"}, {"uuid": "1d49c97f-8600-4544-a825-6dfc9dabc023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31241", "type": "seen", "source": "https://t.me/cvedetector/25125", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31241 - A double free issue was addressed with improved me\", \n  \"Content\": \"CVE ID : CVE-2025-31241 \nPublished : May 12, 2025, 10:15 p.m. | 15\u00a0minutes ago \nDescription : A double free issue was addressed with improved memory management. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. A remote attacker may cause an unexpected app termination. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T01:19:22.000000Z"}]}