{"vulnerability": "CVE-2024-2485", "sightings": [{"uuid": "eb8a6269-d9af-4f69-83a4-4ace789c050c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24852", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "25444a61-89fa-4d78-bc01-fb3ce216c48a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24855", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13265", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24855\n\ud83d\udd25 CVSS Score: 5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H)\n\ud83d\udd39 Description: A race condition was found in the Linux kernel's scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\n\n\n\n\n\n\ud83d\udccf Published: 2024-02-05T07:25:41.568Z\n\ud83d\udccf Modified: 2025-04-24T15:55:53.555Z\n\ud83d\udd17 References:\n1. https://bugzilla.openanolis.cn/show_bug.cgi?id=8149", "creation_timestamp": "2025-04-24T16:06:47.000000Z"}, {"uuid": "8ab2694a-81f2-4615-945e-367a269666bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24857", "type": "seen", "source": "https://t.me/ctinow/196325", "content": "https://ift.tt/7h41B36\nCVE-2024-24857 | Linux Kernel up to 6.8-rc1 Bluetooth conn_info_min_age_set/conn_info_max_age_set race condition", "creation_timestamp": "2024-02-29T08:16:43.000000Z"}, {"uuid": "13d7a4b4-a568-4bf5-8643-fb89e3b08967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24859", "type": "seen", "source": "https://t.me/ctinow/179069", "content": "https://ift.tt/nBLp4oY\nCVE-2024-24859", "creation_timestamp": "2024-02-05T09:31:37.000000Z"}, {"uuid": "b3be4e9d-8d3b-426b-8313-cd4ba1482f82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24858", "type": "seen", "source": "https://t.me/ctinow/179068", "content": "https://ift.tt/Xe7FURp\nCVE-2024-24858", "creation_timestamp": "2024-02-05T09:31:36.000000Z"}, {"uuid": "a7c5c852-1255-49cd-89ad-f989df3ad47d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24857", "type": "seen", "source": "https://t.me/ctinow/179067", "content": "https://ift.tt/N1nvtIG\nCVE-2024-24857", "creation_timestamp": "2024-02-05T09:31:35.000000Z"}, {"uuid": "9a2bd9a1-0ea8-42c7-aecb-e57854d9fd1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24855", "type": "seen", "source": "https://t.me/ctinow/179066", "content": "https://ift.tt/SEGd4pR\nCVE-2024-24855", "creation_timestamp": "2024-02-05T09:31:34.000000Z"}, {"uuid": "7ba3883c-e5e8-43e6-89fb-4a0b3f6a1b5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24850", "type": "seen", "source": "https://t.me/arpsyndicate/4621", "content": "#ExploitObserverAlert\n\nCVE-2024-24850\n\nDESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-24850. Missing Authorization vulnerability in Mark Stockton Quicksand Post Filter jQuery Plugin.This issue affects Quicksand Post Filter jQuery Plugin: from n/a through 3.1.1.\n\nFIRST-EPSS: 0.000430000\nARPS-EXPLOITABILITY: 0.5986263", "creation_timestamp": "2024-04-13T01:20:58.000000Z"}, {"uuid": "973f1ec5-3cca-43dd-a856-498a217044b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2485", "type": "seen", "source": "https://t.me/ctinow/208507", "content": "https://ift.tt/RsZM6VL\nCVE-2024-2485", "creation_timestamp": "2024-03-15T08:31:57.000000Z"}, {"uuid": "f6434e9d-97db-4f5b-a3d7-b6afa2684be3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2485", "type": "seen", "source": "https://t.me/ctinow/208499", "content": "https://ift.tt/RsZM6VL\nCVE-2024-2485", "creation_timestamp": "2024-03-15T08:26:11.000000Z"}, {"uuid": "f3c45895-af0a-46b2-9ff2-a7273dfa2c66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24859", "type": "seen", "source": "https://t.me/ctinow/196345", "content": "https://ift.tt/4AUGLnb\nCVE-2024-24859 | Linux Kernel up to 6.8-rc1 Bluetooth sniff_min_interval_set/sniff_max_interval_set race condition", "creation_timestamp": "2024-02-29T08:47:03.000000Z"}, {"uuid": "e7e1ba14-eeea-43e9-9210-318a03759e9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24855", "type": "seen", "source": "https://t.me/ctinow/196344", "content": "https://ift.tt/IWjHOqL\nCVE-2024-24855 | Linux Kernel up to 6.5-rc1 SCSI Device Driver lpfc_unregister_fcf_rescan race condition", "creation_timestamp": "2024-02-29T08:47:01.000000Z"}, {"uuid": "105c1158-b2c1-49f2-a26d-b1a5c98af768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24852", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993212798309683", "content": "", "creation_timestamp": "2025-02-12T22:13:09.513147Z"}, {"uuid": "cc6f855b-a35a-478c-b481-1d54f5978c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24852", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz77r6ipv2a", "content": "", "creation_timestamp": "2025-02-12T22:16:36.794454Z"}, {"uuid": "74be80ed-34a4-44b9-9824-4e60535f2ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24855", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "225c3dae-6b23-488f-996f-e163c1eeaa2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2485", "type": "seen", "source": "https://t.me/arpsyndicate/4250", "content": "#ExploitObserverAlert\n\nCVE-2024-2485\n\nDESCRIPTION: Exploit Observer has 51 entries in 6 file formats related to CVE-2024-2485. A vulnerability was found in Tenda AC18 15.03.05.05 and classified as critical. Affected by this issue is the function formSetSpeedWan of the file /goform/SetSpeedWan. The manipulation of the argument speed_dir leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256892. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-03-16T20:39:11.000000Z"}, {"uuid": "c28ef039-f9f1-4e81-9408-55205a12fca3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24858", "type": "seen", "source": "https://t.me/ctinow/196343", "content": "https://ift.tt/FI9durE\nCVE-2024-24858 | Linux Kernel up to 6.8-rc1 Bluetooth race condition", "creation_timestamp": "2024-02-29T08:47:00.000000Z"}]}