{"vulnerability": "CVE-2024-4785", "sightings": [{"uuid": "247f0fdf-8780-442a-baf6-7aa5bdcf70d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47855", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113556384343564769", "content": "", "creation_timestamp": "2024-11-27T18:41:56.039054Z"}, {"uuid": "9df7cbd4-bb2f-43fc-92ca-236277114757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113941446938271087", "content": "", "creation_timestamp": "2025-02-03T18:48:41.233896Z"}, {"uuid": "18d6c69a-90b6-4d5a-9985-58183b40fc72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47856", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115606956710100159", "content": "", "creation_timestamp": "2025-11-24T22:09:27.120631Z"}, {"uuid": "d5cb6429-c26c-4be1-be9d-87ad4548475f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh2xd6emyl2k", "content": "", "creation_timestamp": "2025-01-31T21:35:29.183164Z"}, {"uuid": "cfb483de-016b-49a9-937d-01e8e13752b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lhd4f3u3v22r", "content": "", "creation_timestamp": "2025-02-04T03:27:21.620989Z"}, {"uuid": "c5a86aad-e981-445c-92d6-cf8ba2605112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2isfxgb22h", "content": "", "creation_timestamp": "2025-01-31T17:15:34.443642Z"}, {"uuid": "d3918746-b2f9-472a-a7b4-12003f5cc0d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47855", "type": "seen", "source": "Telegram/nvQbiI6jvgAeQ0STKKY3niAfrf5jfDMnyqUbjE3mAW196ZV_", "content": "", "creation_timestamp": "2025-01-01T20:29:49.000000Z"}, {"uuid": "b876bdba-4d6a-46ee-a438-e656821f07d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47856", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6gad4i6zk2u", "content": "", "creation_timestamp": "2025-11-25T01:55:15.689283Z"}, {"uuid": "230a71be-a894-4f5a-92a7-bf530f14df1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47850", "type": "seen", "source": "https://gist.github.com/svepodd/d1ac09f633c19ca7c9c6f6de12caf96b", "content": "", "creation_timestamp": "2025-12-16T07:58:46.000000Z"}, {"uuid": "72c089f4-98ad-4dfc-9a03-b2f7f9e8c756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4785", "type": "seen", "source": "Telegram/ULIe8cVDaxdGK8IgXST8NiheyEPbLVwCV7xE6w6r-vpIRAG1", "content": "", "creation_timestamp": "2025-02-06T02:40:18.000000Z"}, {"uuid": "762af5b8-34ea-45de-af90-efd26601bc88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4785", "type": "seen", "source": "Telegram/4UX6kyzbOTCwTMTvMlRcy1AiAF2V_abjJPs9jMTImj0gbjPB", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}, {"uuid": "9e95fed4-2459-4109-a0c0-a6a4f4bda119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-47850", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/19c15eba-7fb7-4f1e-8fdd-f5871d05e797", "content": "", "creation_timestamp": "2024-09-30T07:31:43.981846Z"}, {"uuid": "1cd1db64-2b9e-47ee-b794-22543ec059a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7971", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47857\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SSH Communication Security PrivX versions between 18.0-36.0 implement insufficient validation on public key signatures when using native SSH connections via a proxy port. This allows an existing PrivX \"account A\" to impersonate another existing PrivX \"account B\" and gain access to SSH target hosts to which the \"account B\" has access.\n\ud83d\udccf Published: 2025-01-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T19:40:31.796Z\n\ud83d\udd17 References:\n1. https://ssh.com\n2. https://info.ssh.com/impersonation-vulnerability-privx", "creation_timestamp": "2025-03-18T19:48:41.000000Z"}, {"uuid": "ddebe323-6fd0-40c7-a566-e1c1028b1a06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://t.me/cvedetector/16963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47857 - PrivX SSH Impersonation Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-47857 \nPublished : Jan. 31, 2025, 5:15 p.m. | 46\u00a0minutes ago \nDescription : SSH Communication Security PrivX versions between 18.0-36.0 implement insufficient validation on public key signatures when using native SSH connections via a proxy port. This allows an existing PrivX \"account A\" to impersonate another existing PrivX \"account B\" and gain access to SSH target hosts to which the \"account B\" has access. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T19:34:22.000000Z"}, {"uuid": "c72d737f-f6f1-4f7d-8dee-69e15d25cb70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47854", "type": "seen", "source": "https://t.me/cvedetector/6964", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47854 - Veritas Data Insight Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-47854 \nPublished : Oct. 4, 2024, 6:15 a.m. | 40\u00a0minutes ago \nDescription : A vulnerability was discovered in Veritas Data Insight before 7.1. It allows a remote attacker to inject an arbitrary web script into an HTTP request that could reflect back to an authenticated user without sanitization if executed by that user. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-04T09:20:49.000000Z"}, {"uuid": "93970d80-6a24-42b8-ad9e-9cf27dfa23fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47855", "type": "seen", "source": "https://t.me/cvedetector/6962", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47855 - JSON-lib Comment Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47855 \nPublished : Oct. 4, 2024, 6:15 a.m. | 40\u00a0minutes ago \nDescription : util/JSONTokener.java in JSON-lib before 3.1.0 mishandles an unbalanced comment string. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-04T09:20:45.000000Z"}, {"uuid": "5da96897-f7c2-4b5c-a4ee-f2c9a7dd3cd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4785", "type": "seen", "source": "https://t.me/cvedetector/3572", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4785 - Bluetooth Open Security Gap in LL_CONNECTION_UPDATE_IND Handler\", \n  \"Content\": \"CVE ID : CVE-2024-4785 \nPublished : Aug. 19, 2024, 10:15 p.m. | 36\u00a0minutes ago \nDescription : BT: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-20T01:14:09.000000Z"}]}