{"vulnerability": "CVE-2025-3134", "sightings": [{"uuid": "dfdc2216-d99f-4fec-9233-e6201b55bf6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmcikn3evk2g", "content": "", "creation_timestamp": "2025-04-08T12:38:29.713339Z"}, {"uuid": "e4304485-7963-4044-b58a-ddbdfcb54449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lma7nqcnma2q", "content": "", "creation_timestamp": "2025-04-07T14:53:50.483228Z"}, {"uuid": "ed893783-2066-4f49-a091-9d20de59f90f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmac6ambfu2j", "content": "", "creation_timestamp": "2025-04-07T15:38:52.001034Z"}, {"uuid": "f4095c62-4977-4000-8e9a-dfae1bc8f462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmaeftflk52j", "content": "", "creation_timestamp": "2025-04-07T16:18:53.941803Z"}, {"uuid": "4c35bf8a-6b24-417b-88c2-fa95d8118c18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmavxwwm772n", "content": "", "creation_timestamp": "2025-04-07T21:33:15.475365Z"}, {"uuid": "d352b444-5af0-48a1-a016-e61ba83b204f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3134", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lluwbctvzf2o", "content": "", "creation_timestamp": "2025-04-03T03:06:34.334568Z"}, {"uuid": "f1081513-d57f-4163-845b-2521c0a1d7bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "https://gist.github.com/EbonJaeger/deb2aa172e52343ebc67b84d4a0949f1", "content": "", "creation_timestamp": "2025-04-18T16:40:49.000000Z"}, {"uuid": "3596dc03-ba6a-4c40-917d-4526889ca07f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmg5q7xp6e2e", "content": "", "creation_timestamp": "2025-04-09T23:35:24.779370Z"}, {"uuid": "d4dedc0b-e613-4580-9ceb-a7c40216be58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmgbct3l4w2e", "content": "", "creation_timestamp": "2025-04-10T00:39:30.259680Z"}, {"uuid": "34d79979-8012-4e26-86ae-92773d7c61ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31343", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-391/", "content": "", "creation_timestamp": "2025-06-16T03:00:00.000000Z"}, {"uuid": "91a297ac-c331-4f0b-be87-3e22c5e2039c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31349", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-392/", "content": "", "creation_timestamp": "2025-06-16T03:00:00.000000Z"}, {"uuid": "976c2148-5ff8-4e1c-a862-d2a2438cb042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31343", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-112-01", "content": "", "creation_timestamp": "2025-04-22T10:00:00.000000Z"}, {"uuid": "5c73c4c9-056c-4d0a-ba93-4735fa7f407e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31349", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-112-01", "content": "", "creation_timestamp": "2025-04-22T10:00:00.000000Z"}, {"uuid": "07a45e61-4854-4257-88ca-07794778c865", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31340", "type": "seen", "source": "https://t.me/cvedetector/23211", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31340 - Wisdom Master Pro File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31340 \nPublished : April 17, 2025, 3:15 a.m. | 55\u00a0minutes ago \nDescription : A improper control of filename for include/require statement in PHP program vulnerability in the retrieve course Information function of Wisdom Master Pro versions 5.0 through 5.2 allows remote attackers to perform arbitrary system commands by running a malicious file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T06:17:24.000000Z"}, {"uuid": "eeed9e87-3c40-4c2c-868f-2bf45e8307b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-31342", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m3mhigbayt2w", "content": "", "creation_timestamp": "2025-10-20T09:03:53.940115Z"}, {"uuid": "7b79c7e5-f47e-4e9a-899c-2559767cb350", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11589", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31344\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)\n\ud83d\udd39 Description: Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux. This vulnerability is associated with program files gif2rgb.C.\n\nThis issue affects giflib: through 5.2.2.\n\ud83d\udccf Published: 2025-04-14T07:49:36.597Z\n\ud83d\udccf Modified: 2025-04-14T08:05:04.085Z\n\ud83d\udd17 References:\n1. https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292\n2. https://gitee.com/src-openeuler/giflib/pulls/54", "creation_timestamp": "2025-04-14T08:55:49.000000Z"}, {"uuid": "f1b5b84f-721b-4675-adaa-4dbeb7bdbb8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31342", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3mghdratw2o", "content": "", "creation_timestamp": "2025-10-20T08:45:23.809578Z"}, {"uuid": "a3b3959a-dd3a-4764-800a-f02ceafb0cd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3134", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10159", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3134\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in code-projects Payroll Management System 1.0. This affects an unknown part of the file /add_overtime.php. The manipulation of the argument rate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-03T01:31:04.817Z\n\ud83d\udccf Modified: 2025-04-03T01:31:04.817Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303039\n2. https://vuldb.com/?ctiid.303039\n3. https://vuldb.com/?submit.525102\n4. https://github.com/Brauchitsch-Wang/cve/blob/main/cve.md\n5. https://code-projects.org/", "creation_timestamp": "2025-04-03T02:35:08.000000Z"}, {"uuid": "2b431335-f0b5-473e-bc2b-16f1a3c26050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "https://t.me/cvedetector/22840", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31344 - openEuler giflib Heap-based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-31344 \nPublished : April 14, 2025, 8:15 a.m. | 2\u00a0hours, 6\u00a0minutes ago \nDescription : Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux. This vulnerability is associated with program files gif2rgb.C.  \n  \nThis issue affects giflib: through 5.2.2. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-14T13:00:06.000000Z"}, {"uuid": "71a4dd93-4eed-4240-b148-db6be55072a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3134", "type": "seen", "source": "https://t.me/cvedetector/21933", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3134 - Code-Projects Payroll Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-3134 \nPublished : April 3, 2025, 2:15 a.m. | 25\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in code-projects Payroll Management System 1.0. This affects an unknown part of the file /add_overtime.php. The manipulation of the argument rate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T05:12:00.000000Z"}, {"uuid": "5a788841-5890-4e55-bc69-385e4a676e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31340", "type": "seen", "source": "Telegram/K4SUIHTuLrzXNo_YZe-9I7i2BFdwldWu2-RSHzApAyjepqw", "content": "", "creation_timestamp": "2025-04-17T05:00:54.000000Z"}, {"uuid": "508125c5-e54d-419c-88fc-d5a07a80a0c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31344", "type": "seen", "source": "Telegram/QSd_W2sEquutRe-R0caK0ZbRUjEEXQKH7sZGhQJrd0BLNk0", "content": "", "creation_timestamp": "2025-04-14T10:30:49.000000Z"}]}