{"vulnerability": "cve-2024-4793", "sightings": [{"uuid": "5a8d0237-2c97-4a9e-9599-b62fdbbbc4de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47934", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/633", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47934\n\ud83d\udd39 Description: Improper Input Validation vulnerability in Management Program in TXOne Networks Portable Inspector and Portable Inspector Pro Edition allows remote attacker to crash management service. The Denial of Service situation can be resolved by restarting the management service.\nThis issue affects Portable Inspector: through 1.0.0; Portable Inspector Pro Edition: through 1.0.0.\n\ud83d\udccf Published: 2025-01-08T03:00:31.170Z\n\ud83d\udccf Modified: 2025-01-08T03:00:31.170Z\n\ud83d\udd17 References:\n1. https://www.txone.com/psirt/advisories/cve-2024-47934/", "creation_timestamp": "2025-01-08T03:40:32.000000Z"}, {"uuid": "9010488f-4d3a-4a2a-a423-80d704878bcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47935", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lie3uj5vqd27", "content": "", "creation_timestamp": "2025-02-17T06:15:55.856001Z"}, {"uuid": "a5340b3d-d31d-41d5-be7c-bb92145184be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47935", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liefcteqfj26", "content": "", "creation_timestamp": "2025-02-17T09:04:59.518716Z"}, {"uuid": "5efd1c9f-f804-456a-8ceb-0c98d6336b13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47939", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8583", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47939\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L)\n\ud83d\udd39 Description: Stack-based buffer overflow vulnerability exists in multiple Ricoh laser printers and MFPs which implement Web Image Monitor. If this vulnerability is exploited, receiving a specially crafted request created and sent by an attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition. As for the details of affected product names and versions, refer to the information provided by the vendor under [References].\n\ud83d\udccf Published: 2024-11-01T04:29:04.040Z\n\ud83d\udccf Modified: 2025-03-25T01:29:15.307Z\n\ud83d\udd17 References:\n1. https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000011\n2. https://jp.ricoh.com/security/products/vulnerabilities/vul?id=ricoh-2024-000011\n3. https://jvn.jp/en/jp/JVN87770340/", "creation_timestamp": "2025-03-25T02:23:21.000000Z"}, {"uuid": "c0c7677d-8110-4084-b17c-6b1361f1ea87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47935", "type": "seen", "source": "https://t.me/cvedetector/18227", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47935 - TXOne Networks StellarProtect (Legacy Mode)/StellarEnforce/Safe Lock DLL Hijacking Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47935 \nPublished : Feb. 17, 2025, 6:15 a.m. | 25\u00a0minutes ago \nDescription : Improper Validation of Integrity Check Value vulnerability in TXOne Networks StellarProtect (Legacy Mode), StellarEnforce, and Safe Lock allows an attacker to escalate their privileges in the victim\u2019s device. The attacker needs to hijack the DLL file in advance.  \nThis issue affects StellarProtect (Legacy Mode): before 3.2; StellarEnforce: before 3.2; Safe Lock: from 3.0.0 before 3.1.1076.  \n*Note: StellarProtect (Legacy Mode) is the new name for StellarEnforce, they are the same product. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T08:10:53.000000Z"}, {"uuid": "a5938796-fe9a-4354-ac7e-98aa1bcb0989", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47939", "type": "seen", "source": "https://t.me/cvedetector/9566", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47939 - Ricoh Web Image Monitor Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47939 \nPublished : Nov. 1, 2024, 5:15 a.m. | 43\u00a0minutes ago \nDescription : Stack-based buffer overflow vulnerability exists in multiple Ricoh laser printers and MFPs which implement Web Image Monitor. If this vulnerability is exploited, receiving a specially crafted request created and sent by an attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition. As for the details of affected product names and versions, refer to the information provided by the vendor under [References]. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-01T07:09:20.000000Z"}, {"uuid": "dbca1eac-d2fd-4128-86d5-656f50598439", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-47934", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113790537383900815", "content": "", "creation_timestamp": "2025-01-08T03:10:07.879896Z"}, {"uuid": "11161577-6725-4de9-b714-a64025475733", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47934", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf77553t2n2i", "content": "", "creation_timestamp": "2025-01-08T03:15:32.333037Z"}, {"uuid": "09be79ac-97f6-408c-a504-5f8f5e971919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47934", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7baqn47l2w", "content": "", "creation_timestamp": "2025-01-08T03:53:25.346217Z"}, {"uuid": "172d61d3-d9f2-4b70-99e8-41f44288f08d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47934", "type": "seen", "source": "https://t.me/cvedetector/14635", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47934 - TXOne Networks Portable Inspector TXOne Networks Portable Inspector Pro Edition Input Validation Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-47934 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in Management Program in TXOne Networks Portable Inspector and Portable Inspector Pro Edition allows remote attacker to crash management service. The Denial of Service situation can be resolved by restarting the management service.  \nThis issue affects Portable Inspector: through 1.0.0; Portable Inspector Pro Edition: through 1.0.0. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:39.000000Z"}]}