{"vulnerability": "CVE-2025-31251", "sightings": [{"uuid": "47819c2b-5e60-4e19-a19f-b1021cae8d0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31251", "type": "seen", "source": "https://infosec.exchange/users/mttaggart/statuses/114496120063138419", "content": "", "creation_timestamp": "2025-05-12T17:49:05.521135Z"}, {"uuid": "300043e1-3fcf-4bdf-87a8-d47b34486be4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31251", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loz2g3w6zo2h", "content": "", "creation_timestamp": "2025-05-12T22:47:11.603216Z"}, {"uuid": "a9afeef0-4e00-419c-84e6-579147cb769c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31251", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-304/", "content": "", "creation_timestamp": "2025-05-21T03:00:00.000000Z"}, {"uuid": "5ab9dfcb-e588-4e69-a8ca-0f9e2e637902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31251", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16317", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31251\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved input sanitization. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.\n\ud83d\udccf Published: 2025-05-12T21:42:50.091Z\n\ud83d\udccf Modified: 2025-05-14T14:18:46.477Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122720\n2. https://support.apple.com/en-us/122716\n3. https://support.apple.com/en-us/122405\n4. https://support.apple.com/en-us/122404\n5. https://support.apple.com/en-us/122717\n6. https://support.apple.com/en-us/122721\n7. https://support.apple.com/en-us/122722\n8. https://support.apple.com/en-us/122718", "creation_timestamp": "2025-05-14T14:32:03.000000Z"}, {"uuid": "d5b424b6-bcba-4a65-91e3-f406394a4e59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31251", "type": "seen", "source": "https://t.me/cvedetector/25120", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31251 - The issue was addressed with improved input saniti\", \n  \"Content\": \"CVE ID : CVE-2025-31251 \nPublished : May 12, 2025, 10:15 p.m. | 15\u00a0minutes ago \nDescription : The issue was addressed with improved input sanitization. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T01:19:15.000000Z"}]}