{"vulnerability": "cve-2024-4695", "sightings": [{"uuid": "e8010ec6-8ee4-4946-be60-fe412daa2fea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46954", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13579", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46646\n\ud83d\udd25 CVSS Score: 4.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: In Artifex Ghostscript before 10.05.0, decode_utf8 in base/gp_utf8.c mishandles overlong UTF-8 encoding. NOTE: this issue exists because of an incomplete fix for CVE-2024-46954.\n\ud83d\udccf Published: 2025-04-26T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-26T14:33:54.235Z\n\ud83d\udd17 References:\n1. https://bugs.ghostscript.com/show_bug.cgi?id=708311\n2. https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f", "creation_timestamp": "2025-04-26T15:08:05.000000Z"}, {"uuid": "e0901d93-fb66-453a-9b60-8467514c2229", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46951", "type": "seen", "source": "https://t.me/cvedetector/10431", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46951 - Ghostscript Unchecked Implementation Pointer Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46951 \nPublished : Nov. 10, 2024, 9:15 p.m. | 40\u00a0minutes ago \nDescription : An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. An unchecked Implementation pointer in Pattern color space could lead to arbitrary code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-10T23:22:15.000000Z"}, {"uuid": "5b855677-22cb-4665-9a69-e10670a5122f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46954", "type": "seen", "source": "https://t.me/cvedetector/10435", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46954 - Ghostscript UTF-8 Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46954 \nPublished : Nov. 10, 2024, 10:15 p.m. | 44\u00a0minutes ago \nDescription : An issue was discovered in decode_utf8 in base/gp_utf8.c in Artifex Ghostscript before 10.04.0. Overlong UTF-8 encoding leads to possible ../ directory traversal. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T00:12:27.000000Z"}, {"uuid": "c8edd082-a74f-4880-be73-b9b7f1262f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46953", "type": "seen", "source": "https://t.me/cvedetector/10434", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46953 - Ghostscript Filename Format String Integer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46953 \nPublished : Nov. 10, 2024, 10:15 p.m. | 44\u00a0minutes ago \nDescription : An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T00:12:26.000000Z"}, {"uuid": "0b0a8708-19a8-4225-8707-5d4e78292d64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46952", "type": "seen", "source": "https://t.me/cvedetector/10433", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46952 - Ghostscript PDF XRef Stream Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46952 \nPublished : Nov. 10, 2024, 10:15 p.m. | 44\u00a0minutes ago \nDescription : An issue was discovered in pdf/pdf_xref.c in Artifex Ghostscript before 10.04.0. There is a buffer overflow during handling of a PDF XRef stream (related to W array values). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T00:12:26.000000Z"}, {"uuid": "03d2f553-b21a-4188-a109-efe8b1f72dc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46959", "type": "seen", "source": "https://t.me/cvedetector/6011", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46959 - Runofast Indoor Security Camera Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-46959 \nPublished : Sept. 18, 2024, 6:15 p.m. | 31\u00a0minutes ago \nDescription : runofast Indoor Security Camera for Baby Monitor has a default password of password for the root account. This allows access to the /stream1 URI via the rtsp:// protocol to receive the video and audio stream. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T20:56:03.000000Z"}, {"uuid": "6b03a4c9-661a-44ef-bdcd-6764ef29a63a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46954", "type": "seen", "source": "https://t.me/cvedetector/23805", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46646 - Ghostscript UTF-8 Encoding Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46646 \nPublished : April 26, 2025, 3:15 p.m. | 30\u00a0minutes ago \nDescription : In Artifex Ghostscript before 10.05.0, decode_utf8 in base/gp_utf8.c mishandles overlong UTF-8 encoding. NOTE: this issue exists because of an incomplete fix for CVE-2024-46954. \nSeverity: 4.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-26T18:35:28.000000Z"}, {"uuid": "d6500547-8ee6-4e2b-a4d9-6d09fce359d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46956", "type": "seen", "source": "https://t.me/cvedetector/10437", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46956 - Ghostscript Arbitary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-46956 \nPublished : Nov. 10, 2024, 10:15 p.m. | 44\u00a0minutes ago \nDescription : An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T00:12:28.000000Z"}, {"uuid": "65a14239-c93e-4bb6-8b94-158a6c7e1a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46955", "type": "seen", "source": "https://t.me/cvedetector/10436", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46955 - Ghostscript Indexed Color Space Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46955 \nPublished : Nov. 10, 2024, 10:15 p.m. | 44\u00a0minutes ago \nDescription : An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. There is an out-of-bounds read when reading color in Indexed color space. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T00:12:28.000000Z"}, {"uuid": "d45507aa-271e-4a23-a3f1-bd8a3e77fbd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46958", "type": "seen", "source": "https://t.me/cvedetector/5704", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46958 - Nextcloud Desktop Client File Permission Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46958 \nPublished : Sept. 16, 2024, 2:15 a.m. | 38\u00a0minutes ago \nDescription : In Nextcloud Desktop Client 3.13.1 through 3.13.3 on Linux, synchronized files (between the server and client) may become world writable or world readable. This is fixed in 3.13.4. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T05:19:18.000000Z"}, {"uuid": "975d172d-cb6b-49f7-a300-d247dfcf34ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46951", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113460711323018662", "content": "", "creation_timestamp": "2024-11-10T21:11:01.557459Z"}, {"uuid": "846f90a2-6a84-4ef9-96dd-bdc15229b958", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46952", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113460754246123416", "content": "", "creation_timestamp": "2024-11-10T21:21:56.356398Z"}, {"uuid": "ae096bf0-013e-47ea-aa7b-79f11ef31ec5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46953", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113460754260746941", "content": "", "creation_timestamp": "2024-11-10T21:21:56.683506Z"}, {"uuid": "142842fc-66bb-4318-b7fe-17d20c1eb60b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46955", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113460754288858514", "content": "", "creation_timestamp": "2024-11-10T21:21:57.016193Z"}, {"uuid": "906ce807-07db-45a4-a1a4-904c1320edc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46954", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113460754274675685", "content": "", "creation_timestamp": "2024-11-10T21:21:57.475793Z"}]}