{"vulnerability": "cve-2025-4640", "sightings": [{"uuid": "d7a89768-6994-448d-9eeb-f57726b5def0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46400", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnjjstceyb24", "content": "", "creation_timestamp": "2025-04-24T01:14:51.788793Z"}, {"uuid": "cad87dd0-ddbf-4bd9-ace6-9ff52269896e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46406", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114828809599813642", "content": "", "creation_timestamp": "2025-07-10T11:56:24.855602Z"}, {"uuid": "4a933305-4562-4f68-84b6-6fe88c2b6f91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46404", "type": "seen", "source": "https://infosec.place/objects/ce82122a-fee0-45e8-9a02-f04313bf290c", "content": "", "creation_timestamp": "2025-11-05T15:30:05.093291Z"}, {"uuid": "3dbe35f2-f877-4808-bdf0-90707572c5ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46400", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13151", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46400\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via read_arcobject function.\n\ud83d\udccf Published: 2025-04-23T20:55:17.239Z\n\ud83d\udccf Modified: 2025-04-23T20:55:17.239Z\n\ud83d\udd17 References:\n1. https://sourceforge.net/p/mcj/tickets/187/", "creation_timestamp": "2025-04-23T21:04:59.000000Z"}, {"uuid": "69194187-1bec-4a2b-8004-febbcf26bd38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46404", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4vlfsv4iz2s", "content": "", "creation_timestamp": "2025-11-05T17:33:10.346628Z"}, {"uuid": "38e4017d-c060-4423-a26f-1ff1ff754b72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46408", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lz2qb27mqq2d", "content": "", "creation_timestamp": "2025-09-17T21:02:47.235288Z"}, {"uuid": "19b7e380-04bd-4327-8088-19e778ca49da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46404", "type": "seen", "source": "https://gist.github.com/Darkcrai86/a0ababdf7660441383b9cdfb018407f2", "content": "", "creation_timestamp": "2025-11-21T11:08:48.000000Z"}, {"uuid": "efc7cdf9-a00b-41bf-96a3-6e936384e7f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46407", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxbaf4e4hc2z", "content": "", "creation_timestamp": "2025-08-26T00:16:42.352251Z"}, {"uuid": "fa90c678-bb2c-4a88-8ecf-38f2f28cd6a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46407", "type": "seen", "source": "https://infosec.place/objects/d3347c61-8094-4ca8-9ae3-5b30d808cbc6", "content": "", "creation_timestamp": "2025-08-25T17:00:05.602665Z"}, {"uuid": "e120e479-07fa-4488-b7d1-92ce2b443a57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4640", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16370", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4640\n\ud83d\udd25 CVSS Score: 8.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:L/U:Amber)\n\ud83d\udd39 Description: Out-of-bounds Write vulnerability in PointCloudLibrary pcl allows Overflow Buffers. Since version 1.14.0, PCL by default uses a zlib installation from the system, unless the user sets WITH_SYSTEM_ZLIB=FALSE. So this potential vulnerability is only relevant if the PCL version is older than 1.14.0 or the user specifically requests to not use the system zlib.\n\ud83d\udccf Published: 2025-05-14T18:06:51.766Z\n\ud83d\udccf Modified: 2025-05-14T18:06:51.766Z\n\ud83d\udd17 References:\n1. https://github.com/PointCloudLibrary/pcl/pull/6246\n2. https://github.com/PointCloudLibrary/pcl/blob/master/surface/CMakeLists.txt#L70\n3. https://github.com/PointCloudLibrary/pcl/commit/502bd2b013ce635f21632d523aa8cf2e04f7b7ac", "creation_timestamp": "2025-05-14T18:32:08.000000Z"}, {"uuid": "bfee3836-2162-4261-b35a-838614464753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46400", "type": "seen", "source": "https://t.me/cvedetector/23618", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46400 - Fig2dev ArcObject Segmentation Fault Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46400 \nPublished : April 23, 2025, 9:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via read_arcobject function. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-24T00:31:12.000000Z"}, {"uuid": "efe54c7d-4753-465d-9b6a-667ffb92691c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46400", "type": "published-proof-of-concept", "source": "Telegram/nLLiU9XeUeMIp5jrXJDhah4Wv5btJb4tJwgKYZU-gIMEuU0", "content": "", "creation_timestamp": "2025-04-24T00:02:03.000000Z"}]}