{"vulnerability": "CVE-2025-3160", "sightings": [{"uuid": "02bd36b7-75c1-4e70-bace-6ecd0968f09f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31601", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9692", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31601\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in appointy Appointy Appointment Scheduler allows Cross Site Request Forgery. This issue affects Appointy Appointment Scheduler: from n/a through 4.2.1.\n\ud83d\udccf Published: 2025-03-31T12:55:34.198Z\n\ud83d\udccf Modified: 2025-03-31T16:21:49.652Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/appointy-appointment-scheduler/vulnerability/wordpress-appointy-appointment-scheduler-plugin-4-2-1-csrf-to-settings-change-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T16:33:12.000000Z"}, {"uuid": "7c7eb2f3-cce8-4c92-b84f-5cd558d01e10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3160", "type": "seen", "source": "https://t.me/cvedetector/22000", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3160 - Open Asset Import Library Assimp Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3160 \nPublished : April 3, 2025, 3:15 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::SceneCombiner::AddNodeHashes of the file code/Common/SceneCombiner.cpp of the component File Handler. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as a0993658f40d8e13ff5823990c30b43c82a5daf0. It is recommended to apply a patch to fix this issue. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T19:25:09.000000Z"}, {"uuid": "b4cd545a-9b7c-44ac-ab65-dcb8e52ffe6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31604", "type": "seen", "source": "https://t.me/cvedetector/21610", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31604 - Cal.com Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-31604 \nPublished : March 31, 2025, 1:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Cal.com Cal.com allows Stored XSS. This issue affects Cal.com: from n/a through 1.0.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T17:31:58.000000Z"}]}