{"uuid": "5ab9dfcb-e588-4e69-a8ca-0f9e2e637902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31251", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16317", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31251\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved input sanitization. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.\n\ud83d\udccf Published: 2025-05-12T21:42:50.091Z\n\ud83d\udccf Modified: 2025-05-14T14:18:46.477Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122720\n2. https://support.apple.com/en-us/122716\n3. https://support.apple.com/en-us/122405\n4. https://support.apple.com/en-us/122404\n5. https://support.apple.com/en-us/122717\n6. https://support.apple.com/en-us/122721\n7. https://support.apple.com/en-us/122722\n8. https://support.apple.com/en-us/122718", "creation_timestamp": "2025-05-14T14:32:03.000000Z"}