{"vulnerability": "CVE-2025-46397", "sightings": [{"uuid": "6db67d9f-ed62-4c6e-81fa-6ee2d5d367ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46397", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnjjsrt7ek2b", "content": "", "creation_timestamp": "2025-04-24T01:14:46.513842Z"}, {"uuid": "244d1611-e78c-42d4-8741-a7063cf60431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46397", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lumv5scmjc23", "content": "", "creation_timestamp": "2025-07-23T11:12:10.482527Z"}, {"uuid": "b57f3919-493b-4819-9118-3e1fb52c0e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46397", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3mcm5uxypsg2d", "content": "", "creation_timestamp": "2026-01-17T08:08:18.670983Z"}, {"uuid": "2652fca3-63aa-4a7f-b838-c4bc12677547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46397", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3mcwtrai2dx2d", "content": "", "creation_timestamp": "2026-01-21T14:06:33.412615Z"}, {"uuid": "89a87c67-44c1-4c8b-b1c9-a47591943907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46397", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13154", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46397\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Stack-overflow\u00a0in fig2dev in version 3.2.9a allows an attacker possible code execution via local input manipulation via bezier_spline function.\n\ud83d\udccf Published: 2025-04-23T20:55:09.795Z\n\ud83d\udccf Modified: 2025-04-23T20:55:09.795Z\n\ud83d\udd17 References:\n1. https://sourceforge.net/p/mcj/tickets/192/", "creation_timestamp": "2025-04-23T21:05:02.000000Z"}, {"uuid": "f38407ff-99f6-4902-8a4c-1c3b486fe216", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46397", "type": "seen", "source": "https://t.me/cvedetector/23620", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46397 - \"Fig2Dev Bezier Spline Code Execution Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-46397 \nPublished : April 23, 2025, 9:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Stack-overflow\u00a0in fig2dev in version 3.2.9a allows an attacker possible code execution via local input manipulation via bezier_spline function. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-24T00:31:13.000000Z"}, {"uuid": "73fb10a8-3b48-4224-90d0-d9fc1b0e9659", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46397", "type": "published-proof-of-concept", "source": "Telegram/nLLiU9XeUeMIp5jrXJDhah4Wv5btJb4tJwgKYZU-gIMEuU0", "content": "", "creation_timestamp": "2025-04-24T00:02:03.000000Z"}]}