{"vulnerability": "CVE-2023-4042", "sightings": [{"uuid": "570a8987-486f-4068-a8fb-1aeda084b459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4042", "type": "seen", "source": "https://t.me/cibsecurity/69052", "content": "\u203c CVE-2023-4042 \u203c\n\nA flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-23T16:13:48.000000Z"}, {"uuid": "5c4cad02-e39b-44c4-a24e-3d3e83433947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40425", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxwaw3luysf2", "content": "", "creation_timestamp": "2025-09-03T08:52:08.626107Z"}, {"uuid": "90be27a7-3a2d-44fa-98fc-976c90dac1f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4042", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/20026", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-4042\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.\n\ud83d\udccf Published: 2023-08-23T12:19:29.156Z\n\ud83d\udccf Modified: 2025-07-01T13:58:15.854Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2023:7053\n2. https://access.redhat.com/security/cve/CVE-2023-4042\n3. https://bugzilla.redhat.com/show_bug.cgi?id=1870257\n4. https://bugzilla.redhat.com/show_bug.cgi?id=2228151", "creation_timestamp": "2025-07-01T14:11:12.000000Z"}, {"uuid": "65399b81-fd9c-4d83-a294-87c6ad0426f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40420", "type": "seen", "source": "https://t.me/cibsecurity/71122", "content": "\u203c CVE-2023-40420 \u203c\n\nThe issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to a denial-of-service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-27T18:49:03.000000Z"}, {"uuid": "2fdee976-53e2-429c-8178-56321cc0943f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40427", "type": "seen", "source": "https://t.me/cibsecurity/71100", "content": "\u203c CVE-2023-40427 \u203c\n\nThe issue was addressed with improved handling of caches. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to read sensitive location information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-27T18:46:04.000000Z"}, {"uuid": "0ecd78bf-72c3-4b35-aefe-61731fc64de9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40423", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxwvsdqpvq52", "content": "", "creation_timestamp": "2025-09-03T15:06:41.639017Z"}, {"uuid": "8d4f9f12-75e6-474c-af70-952cabd1c2a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40424", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10571", "content": "#Malware_analysis\n1. How Malware Can Bypass Transparency Consent and Control (CVE-2023-40424)\nhttps://blog.kandji.io/malware-bypass-tcc\n2. Advanced CyberChef Techniques For Malware Analysis - Detailed Walkthrough and Examples\nhttps://www.embeeresearch.io/advanced-cyberchef-operations-netsupport", "creation_timestamp": "2024-05-29T22:19:20.000000Z"}]}