<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 16:03:19 +0000</lastBuildDate>
    <item>
      <title>ddebe323-6fd0-40c7-a566-e1c1028b1a06</title>
      <link>https://db.gcve.eu/sighting/ddebe323-6fd0-40c7-a566-e1c1028b1a06/export</link>
      <description>{"uuid": "ddebe323-6fd0-40c7-a566-e1c1028b1a06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://t.me/cvedetector/16963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47857 - PrivX SSH Impersonation Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-47857 \nPublished : Jan. 31, 2025, 5:15 p.m. | 46\u00a0minutes ago \nDescription : SSH Communication Security PrivX versions between 18.0-36.0 implement insufficient validation on public key signatures when using native SSH connections via a proxy port. This allows an existing PrivX \"account A\" to impersonate another existing PrivX \"account B\" and gain access to SSH target hosts to which the \"account B\" has access. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T19:34:22.000000Z"}</description>
      <content:encoded>{"uuid": "ddebe323-6fd0-40c7-a566-e1c1028b1a06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://t.me/cvedetector/16963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47857 - PrivX SSH Impersonation Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-47857 \nPublished : Jan. 31, 2025, 5:15 p.m. | 46\u00a0minutes ago \nDescription : SSH Communication Security PrivX versions between 18.0-36.0 implement insufficient validation on public key signatures when using native SSH connections via a proxy port. This allows an existing PrivX \"account A\" to impersonate another existing PrivX \"account B\" and gain access to SSH target hosts to which the \"account B\" has access. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T19:34:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ddebe323-6fd0-40c7-a566-e1c1028b1a06/export</guid>
      <pubDate>Fri, 31 Jan 2025 19:34:22 +0000</pubDate>
    </item>
    <item>
      <title>d5cb6429-c26c-4be1-be9d-87ad4548475f</title>
      <link>https://db.gcve.eu/sighting/d5cb6429-c26c-4be1-be9d-87ad4548475f/export</link>
      <description>{"uuid": "d5cb6429-c26c-4be1-be9d-87ad4548475f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh2xd6emyl2k", "content": "", "creation_timestamp": "2025-01-31T21:35:29.183164Z"}</description>
      <content:encoded>{"uuid": "d5cb6429-c26c-4be1-be9d-87ad4548475f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh2xd6emyl2k", "content": "", "creation_timestamp": "2025-01-31T21:35:29.183164Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d5cb6429-c26c-4be1-be9d-87ad4548475f/export</guid>
      <pubDate>Fri, 31 Jan 2025 21:35:29 +0000</pubDate>
    </item>
    <item>
      <title>9df7cbd4-bb2f-43fc-92ca-236277114757</title>
      <link>https://db.gcve.eu/sighting/9df7cbd4-bb2f-43fc-92ca-236277114757/export</link>
      <description>{"uuid": "9df7cbd4-bb2f-43fc-92ca-236277114757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113941446938271087", "content": "", "creation_timestamp": "2025-02-03T18:48:41.233896Z"}</description>
      <content:encoded>{"uuid": "9df7cbd4-bb2f-43fc-92ca-236277114757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113941446938271087", "content": "", "creation_timestamp": "2025-02-03T18:48:41.233896Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9df7cbd4-bb2f-43fc-92ca-236277114757/export</guid>
      <pubDate>Mon, 03 Feb 2025 18:48:41 +0000</pubDate>
    </item>
    <item>
      <title>cfb483de-016b-49a9-937d-01e8e13752b1</title>
      <link>https://db.gcve.eu/sighting/cfb483de-016b-49a9-937d-01e8e13752b1/export</link>
      <description>{"uuid": "cfb483de-016b-49a9-937d-01e8e13752b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lhd4f3u3v22r", "content": "", "creation_timestamp": "2025-02-04T03:27:21.620989Z"}</description>
      <content:encoded>{"uuid": "cfb483de-016b-49a9-937d-01e8e13752b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lhd4f3u3v22r", "content": "", "creation_timestamp": "2025-02-04T03:27:21.620989Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cfb483de-016b-49a9-937d-01e8e13752b1/export</guid>
      <pubDate>Tue, 04 Feb 2025 03:27:21 +0000</pubDate>
    </item>
    <item>
      <title>72c089f4-98ad-4dfc-9a03-b2f7f9e8c756</title>
      <link>https://db.gcve.eu/sighting/72c089f4-98ad-4dfc-9a03-b2f7f9e8c756/export</link>
      <description>{"uuid": "72c089f4-98ad-4dfc-9a03-b2f7f9e8c756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4785", "type": "seen", "source": "Telegram/ULIe8cVDaxdGK8IgXST8NiheyEPbLVwCV7xE6w6r-vpIRAG1", "content": "", "creation_timestamp": "2025-02-06T02:40:18.000000Z"}</description>
      <content:encoded>{"uuid": "72c089f4-98ad-4dfc-9a03-b2f7f9e8c756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4785", "type": "seen", "source": "Telegram/ULIe8cVDaxdGK8IgXST8NiheyEPbLVwCV7xE6w6r-vpIRAG1", "content": "", "creation_timestamp": "2025-02-06T02:40:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/72c089f4-98ad-4dfc-9a03-b2f7f9e8c756/export</guid>
      <pubDate>Thu, 06 Feb 2025 02:40:18 +0000</pubDate>
    </item>
    <item>
      <title>762af5b8-34ea-45de-af90-efd26601bc88</title>
      <link>https://db.gcve.eu/sighting/762af5b8-34ea-45de-af90-efd26601bc88/export</link>
      <description>{"uuid": "762af5b8-34ea-45de-af90-efd26601bc88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4785", "type": "seen", "source": "Telegram/4UX6kyzbOTCwTMTvMlRcy1AiAF2V_abjJPs9jMTImj0gbjPB", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}</description>
      <content:encoded>{"uuid": "762af5b8-34ea-45de-af90-efd26601bc88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4785", "type": "seen", "source": "Telegram/4UX6kyzbOTCwTMTvMlRcy1AiAF2V_abjJPs9jMTImj0gbjPB", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/762af5b8-34ea-45de-af90-efd26601bc88/export</guid>
      <pubDate>Thu, 06 Feb 2025 02:40:19 +0000</pubDate>
    </item>
    <item>
      <title>1cd1db64-2b9e-47ee-b794-22543ec059a4</title>
      <link>https://db.gcve.eu/sighting/1cd1db64-2b9e-47ee-b794-22543ec059a4/export</link>
      <description>{"uuid": "1cd1db64-2b9e-47ee-b794-22543ec059a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7971", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47857\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SSH Communication Security PrivX versions between 18.0-36.0 implement insufficient validation on public key signatures when using native SSH connections via a proxy port. This allows an existing PrivX \"account A\" to impersonate another existing PrivX \"account B\" and gain access to SSH target hosts to which the \"account B\" has access.\n\ud83d\udccf Published: 2025-01-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T19:40:31.796Z\n\ud83d\udd17 References:\n1. https://ssh.com\n2. https://info.ssh.com/impersonation-vulnerability-privx", "creation_timestamp": "2025-03-18T19:48:41.000000Z"}</description>
      <content:encoded>{"uuid": "1cd1db64-2b9e-47ee-b794-22543ec059a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47857", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7971", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47857\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SSH Communication Security PrivX versions between 18.0-36.0 implement insufficient validation on public key signatures when using native SSH connections via a proxy port. This allows an existing PrivX \"account A\" to impersonate another existing PrivX \"account B\" and gain access to SSH target hosts to which the \"account B\" has access.\n\ud83d\udccf Published: 2025-01-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T19:40:31.796Z\n\ud83d\udd17 References:\n1. https://ssh.com\n2. https://info.ssh.com/impersonation-vulnerability-privx", "creation_timestamp": "2025-03-18T19:48:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1cd1db64-2b9e-47ee-b794-22543ec059a4/export</guid>
      <pubDate>Tue, 18 Mar 2025 19:48:41 +0000</pubDate>
    </item>
    <item>
      <title>18d6c69a-90b6-4d5a-9985-58183b40fc72</title>
      <link>https://db.gcve.eu/sighting/18d6c69a-90b6-4d5a-9985-58183b40fc72/export</link>
      <description>{"uuid": "18d6c69a-90b6-4d5a-9985-58183b40fc72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47856", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115606956710100159", "content": "", "creation_timestamp": "2025-11-24T22:09:27.120631Z"}</description>
      <content:encoded>{"uuid": "18d6c69a-90b6-4d5a-9985-58183b40fc72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47856", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115606956710100159", "content": "", "creation_timestamp": "2025-11-24T22:09:27.120631Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/18d6c69a-90b6-4d5a-9985-58183b40fc72/export</guid>
      <pubDate>Mon, 24 Nov 2025 22:09:27 +0000</pubDate>
    </item>
    <item>
      <title>b876bdba-4d6a-46ee-a438-e656821f07d6</title>
      <link>https://db.gcve.eu/sighting/b876bdba-4d6a-46ee-a438-e656821f07d6/export</link>
      <description>{"uuid": "b876bdba-4d6a-46ee-a438-e656821f07d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47856", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6gad4i6zk2u", "content": "", "creation_timestamp": "2025-11-25T01:55:15.689283Z"}</description>
      <content:encoded>{"uuid": "b876bdba-4d6a-46ee-a438-e656821f07d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47856", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6gad4i6zk2u", "content": "", "creation_timestamp": "2025-11-25T01:55:15.689283Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b876bdba-4d6a-46ee-a438-e656821f07d6/export</guid>
      <pubDate>Tue, 25 Nov 2025 01:55:15 +0000</pubDate>
    </item>
    <item>
      <title>230a71be-a894-4f5a-92a7-bf530f14df1f</title>
      <link>https://db.gcve.eu/sighting/230a71be-a894-4f5a-92a7-bf530f14df1f/export</link>
      <description>{"uuid": "230a71be-a894-4f5a-92a7-bf530f14df1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47850", "type": "seen", "source": "https://gist.github.com/svepodd/d1ac09f633c19ca7c9c6f6de12caf96b", "content": "", "creation_timestamp": "2025-12-16T07:58:46.000000Z"}</description>
      <content:encoded>{"uuid": "230a71be-a894-4f5a-92a7-bf530f14df1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47850", "type": "seen", "source": "https://gist.github.com/svepodd/d1ac09f633c19ca7c9c6f6de12caf96b", "content": "", "creation_timestamp": "2025-12-16T07:58:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/230a71be-a894-4f5a-92a7-bf530f14df1f/export</guid>
      <pubDate>Tue, 16 Dec 2025 07:58:46 +0000</pubDate>
    </item>
  </channel>
</rss>
