{"vulnerability": "CVE-2025-3118", "sightings": [{"uuid": "93f29109-a997-4fd7-813c-e3d2eca7b57b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31182", "type": "seen", "source": "https://bsky.app/profile/supernetworks.bsky.social/post/3llrnyf3gls2b", "content": "", "creation_timestamp": "2025-04-01T20:00:24.584348Z"}, {"uuid": "eab14712-6206-450b-9edd-7f2cbfb12539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31180", "type": "seen", "source": "https://gist.github.com/Darkcrai86/5b60135f809802b3c34ced9dfe47a58e", "content": "", "creation_timestamp": "2025-09-25T09:38:19.000000Z"}, {"uuid": "43b32a1a-2fff-4fbb-8527-807052c1597e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31181", "type": "seen", "source": "https://gist.github.com/Darkcrai86/5b60135f809802b3c34ced9dfe47a58e", "content": "", "creation_timestamp": "2025-09-25T09:38:19.000000Z"}, {"uuid": "92dd022e-a417-41ec-9ea6-af83569a3c97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31189", "type": "seen", "source": "Telegram/D2Q8ZJtbt01P_hfwyXC7lQ4EJlbjNcIuURdjGDUEt8LUtAQ", "content": "", "creation_timestamp": "2026-04-02T22:17:36.000000Z"}, {"uuid": "afe5b0ba-8a93-4c13-8b48-5584988bd826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31188", "type": "seen", "source": "Telegram/cecIoS46aM_lzFx0bKF1CERIzuoGO9AycvCYCjeLmGZFHs0", "content": "", "creation_timestamp": "2026-04-02T22:16:17.000000Z"}, {"uuid": "1eb42d98-22d6-4996-9e7d-27f5166d435f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31188", "type": "seen", "source": "Telegram/-Si_Hi-7t2ljbsWh0Emiw8XzTIBgcOzztbYY7biu1twV718", "content": "", "creation_timestamp": "2026-04-02T22:16:05.000000Z"}, {"uuid": "61b3cd15-095c-484b-b84c-35277cd1b3b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31182", "type": "seen", "source": "Telegram/-Si_Hi-7t2ljbsWh0Emiw8XzTIBgcOzztbYY7biu1twV718", "content": "", "creation_timestamp": "2026-04-02T22:16:05.000000Z"}, {"uuid": "4736b4a2-168e-4667-a62b-da5daa322e03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31184", "type": "seen", "source": "Telegram/-Si_Hi-7t2ljbsWh0Emiw8XzTIBgcOzztbYY7biu1twV718", "content": "", "creation_timestamp": "2026-04-02T22:16:05.000000Z"}, {"uuid": "7038404f-94f2-4f78-ab3a-683f23ddcb41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31183", "type": "seen", "source": "Telegram/-Si_Hi-7t2ljbsWh0Emiw8XzTIBgcOzztbYY7biu1twV718", "content": "", "creation_timestamp": "2026-04-02T22:16:05.000000Z"}, {"uuid": "0d118217-c975-4025-ada7-2fc634a71971", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31187", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9803", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31187\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system.\n\ud83d\udccf Published: 2025-03-31T22:24:14.853Z\n\ud83d\udccf Modified: 2025-03-31T22:24:14.853Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122373\n2. https://support.apple.com/en-us/122374\n3. https://support.apple.com/en-us/122375", "creation_timestamp": "2025-03-31T23:31:45.000000Z"}, {"uuid": "b4a74121-18b9-41a7-96e3-4d2ad791cf7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3118", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10236", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3118\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in SourceCodester Online Tutor Portal 1.0. It has been classified as critical. This affects an unknown part of the file /tutor/courses/view_course.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-02T21:00:12.775Z\n\ud83d\udccf Modified: 2025-04-03T14:02:54.778Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303009\n2. https://vuldb.com/?ctiid.303009\n3. https://vuldb.com/?submit.524985\n4. https://github.com/byxs0x0/SQL/blob/main/SQL3.md\n5. https://www.sourcecodester.com/", "creation_timestamp": "2025-04-03T14:35:25.000000Z"}, {"uuid": "83886cd9-9dbe-4d93-a595-933e674b3a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31180", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15457", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31180\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in gnuplot. The CANVAS_text() function may lead to a segmentation fault and cause a system crash.\n\ud83d\udccf Published: 2025-03-27T15:08:48.575Z\n\ud83d\udccf Modified: 2025-05-07T21:29:13.770Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-31180\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2355339", "creation_timestamp": "2025-05-07T22:23:20.000000Z"}, {"uuid": "3cda0040-9f80-4f4b-a467-554489c59c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31180", "type": "seen", "source": "https://t.me/cvedetector/21293", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31180 - Gnuplot Segmentation Fault Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31180 \nPublished : March 27, 2025, 3:16 p.m. | 20\u00a0minutes ago \nDescription : A flaw was found in gnuplot. The CANVAS_text() function may lead to a segmentation fault and cause a system crash. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T16:39:00.000000Z"}, {"uuid": "0f79dbd6-9731-4f12-a85f-7a8349064e2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31181", "type": "seen", "source": "https://t.me/cvedetector/21297", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31181 - Gnuplot X11 Graphics Segmentation Fault\", \n  \"Content\": \"CVE ID : CVE-2025-31181 \nPublished : March 27, 2025, 3:16 p.m. | 20\u00a0minutes ago \nDescription : A flaw was found in gnuplot. The X11_graphics() function may lead to a segmentation fault and cause a system crash. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T16:39:04.000000Z"}, {"uuid": "c7b71dc1-22e6-4978-a329-0de64643eaf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3118", "type": "seen", "source": "https://t.me/cvedetector/21924", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3118 - SourceCodester Online Tutor Portal SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-3118 \nPublished : April 2, 2025, 9:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : A vulnerability was found in SourceCodester Online Tutor Portal 1.0. It has been classified as critical. This affects an unknown part of the file /tutor/courses/view_course.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T01:01:32.000000Z"}, {"uuid": "681297ba-0fe3-4e50-a140-6ee8c67081e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31188", "type": "seen", "source": "https://t.me/cvedetector/21689", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31188 - Apple macOS App Privacy Bypass (Race Condition)\", \n  \"Content\": \"CVE ID : CVE-2025-31188 \nPublished : March 31, 2025, 11:15 p.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to bypass Privacy preferences. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T03:35:22.000000Z"}, {"uuid": "8519994f-71bb-4075-be58-860d39116b70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31187", "type": "seen", "source": "https://t.me/cvedetector/21696", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31187 - Apple macOS File System Protection Vulnerability (Code Execution)\", \n  \"Content\": \"CVE ID : CVE-2025-31187 \nPublished : March 31, 2025, 11:15 p.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T03:35:31.000000Z"}, {"uuid": "38031aca-518c-4b28-83ee-54992299084a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31184", "type": "seen", "source": "https://t.me/cvedetector/21695", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31184 - Apple Safari Local Network Access Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-31184 \nPublished : March 31, 2025, 11:15 p.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : This issue was addressed with improved permissions checking. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may gain unauthorized access to Local Network. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T03:35:30.000000Z"}, {"uuid": "0f096fd0-151e-48fe-9778-88418ba77d11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31182", "type": "seen", "source": "https://t.me/cvedetector/21693", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31182 - Apple VisionOS Symlink Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31182 \nPublished : March 31, 2025, 11:15 p.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : This issue was addressed with improved handling of symlinks. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to delete files for which it does not have permission. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T03:35:28.000000Z"}, {"uuid": "c486de6e-2ae2-4913-bd64-3efcd623ec9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31183", "type": "seen", "source": "https://t.me/cvedetector/21694", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31183 - Apple macOS Sonoma iOS iPadOS tvOS macOS Sequoia Data Container Access Weakness\", \n  \"Content\": \"CVE ID : CVE-2025-31183 \nPublished : March 31, 2025, 11:15 p.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T03:35:29.000000Z"}, {"uuid": "98e5ea4e-12c5-44f0-9998-8ef916838f15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31182", "type": "seen", "source": "https://t.me/true_secator/6902", "content": "Apple \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0434\u043b\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0445\u0441\u044f \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 0-day \u0434\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u0441\u0442\u0430\u0440\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u0434\u043a\u0430\u0442\u0438\u043b\u0438 \u0438 \u0434\u043b\u044f \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0441\u0442\u0430\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 iOS, iPadOS \u0438 macOS.\n\n\u041f\u0435\u0440\u0432\u044b\u0439 \u0431\u044d\u043a\u043f\u043e\u0440\u0442 \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f CVE-2025-24200, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 Citizen Lab, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u0434\u043b\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u043e\u0439 \u043a\u0440\u0438\u043c\u0438\u043d\u0430\u043b\u0438\u0441\u0442\u0438\u043a\u0438 \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u043b\u0430 \u043a \u0434\u0435\u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u0438 \u00ab\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0433\u043e \u0440\u0435\u0436\u0438\u043c\u0430 USB\u00bb \u043d\u0430 \u0437\u0430\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\nApple \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 iOS 18.3.1, iPadOS 18.3.1 \u0438 17.7.5, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0445 10 \u0444\u0435\u0432\u0440\u0430\u043b\u044f 2025 \u0433\u043e\u0434\u0430.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u0440\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u043d\u0430 \u0431\u043e\u043b\u0435\u0435 \u0441\u0442\u0430\u0440\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u041e\u0421, -\u00a0CVE-2025-24201, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u0445\u0430\u043a\u0435\u0440\u0430\u043c \u0432\u044b\u0445\u043e\u0434\u0438\u0442\u044c \u0437\u0430 \u0440\u0430\u043c\u043a\u0438 \u00ab\u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b\u00bb \u043d\u0430 \u0434\u0432\u0438\u0436\u043a\u0435 WebKit \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u043a\u043e\u043d\u0442\u0435\u043d\u0442\u0430.\n\nApple \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0447\u0440\u0435\u0437\u0432\u044b\u0447\u0430\u0439\u043d\u043e \u0441\u043b\u043e\u0436\u043d\u044b\u0445\u00bb \u0430\u0442\u0430\u043a\u0430\u0445, \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0435\u0435 11 \u043c\u0430\u0440\u0442\u0430 2025 \u0433\u043e\u0434\u0430 \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c iOS 18.3.2, iPadOS 18.3.2, macOS Sequoia 15.3.2, visionOS 2.3.2 \u0438 Safari 18.3.1.\n\n\u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0443\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0438\u043b \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f CVE-2025-24200 \u0438 CVE-2025-24201 \u0432\u00a0iOS 16.7.11 \u0438 15.8.4, \u0430 \u0442\u0430\u043a\u0436\u0435 iPadOS \u0432\u0435\u0440\u0441\u0438\u0439 16.7.11 \u0438 15.8.4.\n\n\u0422\u0440\u0435\u0442\u044c\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u043d\u0430 \u0441\u0442\u0430\u0440\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445, -\u00a0CVE-2025-24085, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0435 Core Media \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Apple.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432 \u043a\u043e\u043d\u0446\u0435 \u044f\u043d\u0432\u0430\u0440\u044f 2025 \u0433\u043e\u0434\u0430, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u0432 iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, visionOS 2.3 \u0438 tvOS 18.3.\n\n\u0422\u0435\u043f\u0435\u0440\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f CVE-2025-24085 \u0441\u0442\u0430\u043b\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0432 iPadOS 17.7.6 \u0438 macOS \u0432\u0435\u0440\u0441\u0438\u0439 14.7.5 (Sonoma) \u0438 13.7.5 (Ventura).\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0431\u044d\u043a\u043f\u043e\u0440\u0442\u043e\u0432, Apple \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0441\u0442\u0430\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u0441\u0432\u043e\u0438\u0445 \u041e\u0421 \u0438 \u041f\u041e, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Safari \u0438 Xcode.\n\n\u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f\u00a0iOS 18.4 \u0438 iPadOS 18.4 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 77 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 CVE-2025-30456 (\u043e\u0431\u0445\u043e\u0434 \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u044b \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0439 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e root), CVE-2025-24097 (\u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043c\u0435\u0442\u0430\u0434\u0430\u043d\u043d\u044b\u043c \u0444\u0430\u0439\u043b\u0430) \u0438 CVE-2025-31182 (\u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u0444\u0430\u0439\u043b\u0430).\n\n\u0412 macOS Sequoia 15.4 Apple \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 123 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f CVE-2025-24228 (\u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u044f\u0434\u0440\u0430), CVE-2025-24267 (\u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e root) \u0438 CVE-2025-24178 (\u0432\u044b\u0445\u043e\u0434 \u0438\u0437 \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b).\n\n\u0412 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 Safari 18.4 Apple \u0437\u0430\u043a\u0440\u044b\u043b\u0430 13 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f CVE-2025-24213 (\u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 WebKit), CVE-2025-30427 (\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 WebKit \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438) \u0438 CVE-2025-24180 (\u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0441 \u0443\u0447\u0435\u0442\u043d\u044b\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u043c\u0438 WebAuthn).\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0432 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f\u0445 \u043d\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a.", "creation_timestamp": "2025-04-02T14:18:11.000000Z"}, {"uuid": "dd1d42a5-a26f-4377-8adb-26a62b48d60b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31185", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16883", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31185\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A logic issue was addressed with improved checks. This issue is fixed in iOS 18.3 and iPadOS 18.3. Photos in the Hidden Photos Album may be viewed without authentication.\n\ud83d\udccf Published: 2025-05-19T16:00:17.595Z\n\ud83d\udccf Modified: 2025-05-19T16:00:17.595Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122066", "creation_timestamp": "2025-05-19T16:39:21.000000Z"}, {"uuid": "80d2a681-d18f-4fe2-8069-e02796a7fc74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31182", "type": "seen", "source": "https://bsky.app/profile/supernetworks.bsky.social/post/3llrnxiexxs2b", "content": "", "creation_timestamp": "2025-04-01T19:59:54.234083Z"}, {"uuid": "b2d00413-b469-4dff-9b9b-8a998bde67d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31182", "type": "seen", "source": "https://bsky.app/profile/supernetworks.bsky.social/post/3llrnubwmqk2b", "content": "", "creation_timestamp": "2025-04-01T19:58:07.276220Z"}, {"uuid": "8be3765c-827a-44ac-8642-c92cf5314809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31185", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpk2zbibc62l", "content": "", "creation_timestamp": "2025-05-19T17:13:07.396565Z"}]}