<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T16:03:20.065420+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ddebe323-6fd0-40c7-a566-e1c1028b1a06/export</id>
    <title>ddebe323-6fd0-40c7-a566-e1c1028b1a06</title>
    <updated>2026-05-05T16:03:20.314421+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ddebe323-6fd0-40c7-a566-e1c1028b1a06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://t.me/cvedetector/16963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47857 - PrivX SSH Impersonation Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-47857 \nPublished : Jan. 31, 2025, 5:15 p.m. | 46\u00a0minutes ago \nDescription : SSH Communication Security PrivX versions between 18.0-36.0 implement insufficient validation on public key signatures when using native SSH connections via a proxy port. This allows an existing PrivX \"account A\" to impersonate another existing PrivX \"account B\" and gain access to SSH target hosts to which the \"account B\" has access. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T19:34:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ddebe323-6fd0-40c7-a566-e1c1028b1a06/export"/>
    <published>2025-01-31T19:34:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d5cb6429-c26c-4be1-be9d-87ad4548475f/export</id>
    <title>d5cb6429-c26c-4be1-be9d-87ad4548475f</title>
    <updated>2026-05-05T16:03:20.314322+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d5cb6429-c26c-4be1-be9d-87ad4548475f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh2xd6emyl2k", "content": "", "creation_timestamp": "2025-01-31T21:35:29.183164Z"}</content>
    <link href="https://db.gcve.eu/sighting/d5cb6429-c26c-4be1-be9d-87ad4548475f/export"/>
    <published>2025-01-31T21:35:29.183164+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9df7cbd4-bb2f-43fc-92ca-236277114757/export</id>
    <title>9df7cbd4-bb2f-43fc-92ca-236277114757</title>
    <updated>2026-05-05T16:03:20.314223+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9df7cbd4-bb2f-43fc-92ca-236277114757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113941446938271087", "content": "", "creation_timestamp": "2025-02-03T18:48:41.233896Z"}</content>
    <link href="https://db.gcve.eu/sighting/9df7cbd4-bb2f-43fc-92ca-236277114757/export"/>
    <published>2025-02-03T18:48:41.233896+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cfb483de-016b-49a9-937d-01e8e13752b1/export</id>
    <title>cfb483de-016b-49a9-937d-01e8e13752b1</title>
    <updated>2026-05-05T16:03:20.314122+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cfb483de-016b-49a9-937d-01e8e13752b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lhd4f3u3v22r", "content": "", "creation_timestamp": "2025-02-04T03:27:21.620989Z"}</content>
    <link href="https://db.gcve.eu/sighting/cfb483de-016b-49a9-937d-01e8e13752b1/export"/>
    <published>2025-02-04T03:27:21.620989+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/72c089f4-98ad-4dfc-9a03-b2f7f9e8c756/export</id>
    <title>72c089f4-98ad-4dfc-9a03-b2f7f9e8c756</title>
    <updated>2026-05-05T16:03:20.314022+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "72c089f4-98ad-4dfc-9a03-b2f7f9e8c756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4785", "type": "seen", "source": "Telegram/ULIe8cVDaxdGK8IgXST8NiheyEPbLVwCV7xE6w6r-vpIRAG1", "content": "", "creation_timestamp": "2025-02-06T02:40:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/72c089f4-98ad-4dfc-9a03-b2f7f9e8c756/export"/>
    <published>2025-02-06T02:40:18+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/762af5b8-34ea-45de-af90-efd26601bc88/export</id>
    <title>762af5b8-34ea-45de-af90-efd26601bc88</title>
    <updated>2026-05-05T16:03:20.313919+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "762af5b8-34ea-45de-af90-efd26601bc88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4785", "type": "seen", "source": "Telegram/4UX6kyzbOTCwTMTvMlRcy1AiAF2V_abjJPs9jMTImj0gbjPB", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/762af5b8-34ea-45de-af90-efd26601bc88/export"/>
    <published>2025-02-06T02:40:19+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1cd1db64-2b9e-47ee-b794-22543ec059a4/export</id>
    <title>1cd1db64-2b9e-47ee-b794-22543ec059a4</title>
    <updated>2026-05-05T16:03:20.313801+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1cd1db64-2b9e-47ee-b794-22543ec059a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7971", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47857\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SSH Communication Security PrivX versions between 18.0-36.0 implement insufficient validation on public key signatures when using native SSH connections via a proxy port. This allows an existing PrivX \"account A\" to impersonate another existing PrivX \"account B\" and gain access to SSH target hosts to which the \"account B\" has access.\n\ud83d\udccf Published: 2025-01-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T19:40:31.796Z\n\ud83d\udd17 References:\n1. https://ssh.com\n2. https://info.ssh.com/impersonation-vulnerability-privx", "creation_timestamp": "2025-03-18T19:48:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1cd1db64-2b9e-47ee-b794-22543ec059a4/export"/>
    <published>2025-03-18T19:48:41+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/18d6c69a-90b6-4d5a-9985-58183b40fc72/export</id>
    <title>18d6c69a-90b6-4d5a-9985-58183b40fc72</title>
    <updated>2026-05-05T16:03:20.313696+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "18d6c69a-90b6-4d5a-9985-58183b40fc72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47856", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115606956710100159", "content": "", "creation_timestamp": "2025-11-24T22:09:27.120631Z"}</content>
    <link href="https://db.gcve.eu/sighting/18d6c69a-90b6-4d5a-9985-58183b40fc72/export"/>
    <published>2025-11-24T22:09:27.120631+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b876bdba-4d6a-46ee-a438-e656821f07d6/export</id>
    <title>b876bdba-4d6a-46ee-a438-e656821f07d6</title>
    <updated>2026-05-05T16:03:20.313555+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b876bdba-4d6a-46ee-a438-e656821f07d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47856", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6gad4i6zk2u", "content": "", "creation_timestamp": "2025-11-25T01:55:15.689283Z"}</content>
    <link href="https://db.gcve.eu/sighting/b876bdba-4d6a-46ee-a438-e656821f07d6/export"/>
    <published>2025-11-25T01:55:15.689283+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/230a71be-a894-4f5a-92a7-bf530f14df1f/export</id>
    <title>230a71be-a894-4f5a-92a7-bf530f14df1f</title>
    <updated>2026-05-05T16:03:20.311886+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "230a71be-a894-4f5a-92a7-bf530f14df1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47850", "type": "seen", "source": "https://gist.github.com/svepodd/d1ac09f633c19ca7c9c6f6de12caf96b", "content": "", "creation_timestamp": "2025-12-16T07:58:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/230a71be-a894-4f5a-92a7-bf530f14df1f/export"/>
    <published>2025-12-16T07:58:46+00:00</published>
  </entry>
</feed>
