{"vulnerability": "CVE-2025-3161", "sightings": [{"uuid": "7fd1d481-400f-406e-a4b5-728cc40e19f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31619", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114265379557389873", "content": "", "creation_timestamp": "2025-04-01T23:48:44.482849Z"}, {"uuid": "cd0844c6-dd9f-4681-9bd3-d244f9f9c9c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31612", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lls3yev7xs2q", "content": "", "creation_timestamp": "2025-04-02T00:10:56.431392Z"}, {"uuid": "22ddde26-9f0a-423c-8f17-61d077513e98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31619", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llrxug4tzb2l", "content": "", "creation_timestamp": "2025-04-01T22:57:18.129259Z"}, {"uuid": "dd183679-580f-4411-aab0-74adfe488b9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31612", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llrxuevpmv2o", "content": "", "creation_timestamp": "2025-04-01T22:57:10.334601Z"}, {"uuid": "09a5036f-1b89-46fe-9ff4-bd5279ecc273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31612", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llrtllgx5n2e", "content": "", "creation_timestamp": "2025-04-01T21:40:37.320636Z"}, {"uuid": "ff119f5d-c41b-4679-bf3c-b49284bb09cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31612", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114265379523570505", "content": "", "creation_timestamp": "2025-04-01T23:48:44.108853Z"}, {"uuid": "ec0b4b80-279a-4cc6-97f8-292eef3b1fb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31612", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114265379523570505", "content": "", "creation_timestamp": "2025-04-01T23:48:44.107400Z"}, {"uuid": "c87ab887-6851-498d-961e-e88cdbf6f2f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31619", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114265379557389873", "content": "", "creation_timestamp": "2025-04-01T23:48:44.484437Z"}, {"uuid": "6ec458ac-56ec-4aee-bf38-9946593502fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3161", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114274824494198093", "content": "", "creation_timestamp": "2025-04-03T15:50:43.076465Z"}, {"uuid": "9ba135a4-9984-49cd-94a3-e1d1ffd9c1c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3161", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114274824494198093", "content": "", "creation_timestamp": "2025-04-03T15:50:43.077996Z"}, {"uuid": "eeeffde4-3be2-45c4-adb3-e959ae7bde6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3161", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114275287395369758", "content": "", "creation_timestamp": "2025-04-03T17:48:26.232156Z"}, {"uuid": "33fbbe66-ee07-4fb6-ad6c-3b31e73dc230", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3161", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114275287395369758", "content": "", "creation_timestamp": "2025-04-03T17:48:26.227807Z"}, {"uuid": "850dbb95-0906-4183-8056-cd9059a0a782", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3161", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3llwuqjx6tf2e", "content": "", "creation_timestamp": "2025-04-03T21:44:35.670643Z"}, {"uuid": "46e918ba-01a1-46e7-88c6-66be017a525b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3161", "type": "seen", "source": "https://t.me/cvedetector/21997", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3161 - Tenda AC10 Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3161 \nPublished : April 3, 2025, 3:15 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : A vulnerability was found in Tenda AC10 16.03.10.13 and classified as critical. This issue affects the function ShutdownSetAdd of the file /goform/ShutdownSetAdd. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T19:25:07.000000Z"}, {"uuid": "1987a14a-2012-424f-a7ec-4c05f35a8c4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31619", "type": "seen", "source": "https://t.me/cvedetector/21812", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31619 - Actionwear SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-31619 \nPublished : April 1, 2025, 9:15 p.m. | 27\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in marcoingraiti Actionwear products sync allows SQL Injection. This issue affects Actionwear products sync: from n/a through 2.3.3. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T23:56:09.000000Z"}, {"uuid": "e89941a3-032d-4cb7-924b-954d4bf23396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31612", "type": "seen", "source": "https://t.me/cvedetector/21811", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31612 - Sabuj Kundu CBX Poll Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31612 \nPublished : April 1, 2025, 9:15 p.m. | 27\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Sabuj Kundu CBX Poll allows Object Injection. This issue affects CBX Poll: from n/a through 1.2.7. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T23:56:08.000000Z"}, {"uuid": "9dd63666-3dcd-4ea5-8a57-ad84bdafcefb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31616", "type": "seen", "source": "https://t.me/cvedetector/21607", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31616 - Varnish WordPress CSRF\", \n  \"Content\": \"CVE ID : CVE-2025-31616 \nPublished : March 31, 2025, 1:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in AdminGeekZ Varnish WordPress allows Cross Site Request Forgery. This issue affects Varnish WordPress: from n/a through 1.7. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T17:31:56.000000Z"}, {"uuid": "c5573065-54d3-4183-946c-890624beb4d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31617", "type": "seen", "source": "https://t.me/cvedetector/21609", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31617 - PostmarkApp Email Integrator CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31617 \nPublished : March 31, 2025, 1:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Gagan Deep Singh PostmarkApp Email Integrator allows Cross Site Request Forgery. This issue affects PostmarkApp Email Integrator: from n/a through 2.4. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T17:31:57.000000Z"}, {"uuid": "a09fed8f-c617-406b-8e76-b8d617449a24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31610", "type": "seen", "source": "https://t.me/cvedetector/21608", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31610 - Gingerplugins Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31610 \nPublished : March 31, 2025, 1:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gingerplugins Notification Bar, Sticky Notification Bar, Sticky Welcome Bar for any theme allows Stored XSS. This issue affects Notification Bar, Sticky Notification Bar, Sticky Welcome Bar for any theme: from n/a through 1.1. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T17:31:57.000000Z"}, {"uuid": "6cd05b21-131e-4875-8af3-74d4b1f81f64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31615", "type": "seen", "source": "https://t.me/cvedetector/21606", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31615 - Owenr88 Simple Contact Forms Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-31615 \nPublished : March 31, 2025, 1:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in owenr88 Simple Contact Forms allows Stored XSS. This issue affects Simple Contact Forms: from n/a through 1.6.4. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T17:31:54.000000Z"}, {"uuid": "debc8ac7-7517-4307-a421-a004460db528", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31614", "type": "seen", "source": "https://t.me/cvedetector/21605", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31614 - Hiroprot Web Page Generation Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-31614 \nPublished : March 31, 2025, 1:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hiroprot Terms Before Download allows Stored XSS. This issue affects Terms Before Download: from n/a through 1.0.4. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T17:31:51.000000Z"}, {"uuid": "86a3f2e3-35a4-42b8-999f-0f8c8e2185e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31613", "type": "seen", "source": "https://t.me/cvedetector/21604", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31613 - AB Google Map Travel CSRF\", \n  \"Content\": \"CVE ID : CVE-2025-31613 \nPublished : March 31, 2025, 1:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Aboobacker. AB Google Map Travel  allows Cross Site Request Forgery. This issue affects AB Google Map Travel : from n/a through 4.6. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T17:31:50.000000Z"}, {"uuid": "cefd97cd-edc0-4446-bf5d-0de35b605c59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31611", "type": "seen", "source": "https://t.me/cvedetector/21603", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31611 - Shaharia Azam Auto Post After Image Upload Missing Authorization\", \n  \"Content\": \"CVE ID : CVE-2025-31611 \nPublished : March 31, 2025, 1:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Shaharia Azam Auto Post After Image Upload allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Auto Post After Image Upload: from n/a through 1.6. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T17:31:49.000000Z"}, {"uuid": "f14a90a8-ed02-4b41-8d47-92d010d856dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31618", "type": "seen", "source": "https://t.me/cvedetector/21601", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31618 - Jaap Jansma Connector to CiviCRM Unauthenticated Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-31618 \nPublished : March 31, 2025, 1:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Jaap Jansma Connector to CiviCRM with CiviMcRestFace allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Connector to CiviCRM with CiviMcRestFace: from n/a through 1.0.9. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T17:31:47.000000Z"}]}