{"vulnerability": "CVE-2024-5005", "sightings": [{"uuid": "0ea14bc0-3497-4f34-aaf5-877c7454875c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50054", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-326-07", "content": "", "creation_timestamp": "2024-11-21T11:00:00.000000Z"}, {"uuid": "eb53aec8-3174-4816-932b-4677368afb4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50051", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113809896551439352", "content": "", "creation_timestamp": "2025-01-11T13:13:25.228780Z"}, {"uuid": "d0c28408-5343-41e6-b70b-124aceb62ba0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50051", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs4dwe7p2a", "content": "", "creation_timestamp": "2025-01-11T13:16:24.755506Z"}, {"uuid": "03ece495-4b4e-4f8c-a875-cd37e70bb601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/k265.bsky.social/post/3lgpjdxazvs24", "content": "", "creation_timestamp": "2025-01-27T08:26:07.681135Z"}, {"uuid": "8dda6411-4fe6-49ea-8f80-1cf05b494424", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lgfztkse6w2c", "content": "", "creation_timestamp": "2025-01-23T13:54:32.000617Z"}, {"uuid": "6d818901-31b7-49a2-986d-2ba34d0c41a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/113900476046011139", "content": "", "creation_timestamp": "2025-01-27T13:08:58.550309Z"}, {"uuid": "5bc9278d-ca86-43cb-8aa9-a6d389910f28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3lgpz5yloks2r", "content": "", "creation_timestamp": "2025-01-27T13:09:06.963123Z"}, {"uuid": "5950ccc9-e84d-49df-b035-886077c2358a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgs55hnkxn2x", "content": "", "creation_timestamp": "2025-01-28T09:25:43.137404Z"}, {"uuid": "031ec819-0ac5-4fcd-a742-9acad777f977", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/arrobas.bsky.social/post/3lgoinb76um2q", "content": "", "creation_timestamp": "2025-01-26T22:40:47.561482Z"}, {"uuid": "bef95fd9-3998-4720-9527-60418f3d6c52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://threatintel.cc/2025/01/26/metas-llama-framework-flaw-exposes.html", "content": "", "creation_timestamp": "2025-01-26T18:05:03.000000Z"}, {"uuid": "4ecc60fd-d885-40d2-b23a-3450c3f05e40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgmy6xxkjc2j", "content": "", "creation_timestamp": "2025-01-26T08:13:51.026816Z"}, {"uuid": "27ff63b5-089e-4ca3-9c51-372f920734c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3lgnaagx56c2u", "content": "", "creation_timestamp": "2025-01-26T10:37:46.223686Z"}, {"uuid": "18e0a2d7-e5f4-4613-92f3-680668c57f49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lguatmn4wu2i", "content": "", "creation_timestamp": "2025-01-29T05:37:06.672849Z"}, {"uuid": "8996c1aa-cb9b-4633-ad5c-6e8091acb6df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/nidouille.bsky.social/post/3lgnabned5s2l", "content": "", "creation_timestamp": "2025-01-26T10:38:26.388069Z"}, {"uuid": "321f16e9-9c57-40dc-a05b-19eedadc8ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113894344931755761", "content": "", "creation_timestamp": "2025-01-26T11:09:46.512366Z"}, {"uuid": "79b64146-7d08-479a-94a8-5ffabca3164b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgnehp422i2a", "content": "", "creation_timestamp": "2025-01-26T11:53:23.467321Z"}, {"uuid": "c7410caa-b85d-4b26-ad12-8323c67c7dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/insightsintothings.bsky.social/post/3lgqetr43yk25", "content": "", "creation_timestamp": "2025-01-27T16:37:18.031260Z"}, {"uuid": "50fbeef5-71cd-41e5-8fd6-a404b8031a92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lgqethcdkq2g", "content": "", "creation_timestamp": "2025-01-27T16:37:57.466803Z"}, {"uuid": "c7869ef0-1fe6-423f-b318-c8f16228361e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lggjkwueie2t", "content": "", "creation_timestamp": "2025-01-23T18:36:04.352117Z"}, {"uuid": "7837e89a-1da4-4475-aa0d-a0c5b013b03c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lgnitr2nvs2b", "content": "", "creation_timestamp": "2025-01-26T13:11:43.859623Z"}, {"uuid": "2e6c6498-0784-4a9e-bedf-d3c404555387", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://thehackernews.com/2025/01/metas-llama-framework-flaw-exposes-ai.html", "content": "", "creation_timestamp": "2025-01-26T09:15:00.000000Z"}, {"uuid": "c7b2bf50-44c1-4dae-a550-64296fc1081b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/nekogang.bsky.social/post/3lgnstybfhk23", "content": "", "creation_timestamp": "2025-01-26T16:10:50.878665Z"}, {"uuid": "a8d74aea-5f20-48d9-be26-2306cf9f5228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgqg6ng4pr24", "content": "", "creation_timestamp": "2025-01-27T17:02:07.080054Z"}, {"uuid": "03b144ec-baca-4e94-845d-16eb865d2b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50053", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkuuyp4y4b2k", "content": "", "creation_timestamp": "2025-03-21T09:18:40.705209Z"}, {"uuid": "ec570609-f5be-4ec8-a5b2-6cfc439421ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "MISP/24306fae-b16b-4478-9297-d2973cdb583c", "content": "", "creation_timestamp": "2025-08-22T14:52:23.000000Z"}, {"uuid": "ac462209-657f-490b-881a-e4bbfdcf8533", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://gist.github.com/Darkcrai86/c973de31165904f2a643ea221893d388", "content": "", "creation_timestamp": "2025-11-14T13:14:13.000000Z"}, {"uuid": "b3feb686-97c4-4ffd-bf2c-4bd139e8a346", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3li2sbewftj2m", "content": "", "creation_timestamp": "2025-02-13T13:30:12.482764Z"}, {"uuid": "35edc100-4321-48d8-884a-3d87ea385bb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50051", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "ed164160-e9f1-49b7-9cab-4fc05b744f86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50059", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "f533bcaa-12af-4ef4-ae37-c256126c1fa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-5005", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/db9dd42d-746e-40cf-bae6-61042f0c1d48", "content": "", "creation_timestamp": "2024-10-11T12:24:01.570554Z"}, {"uuid": "d3e3c7b7-bd64-4aa7-ad60-777f408fd4ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mfxoxwyp2j2p", "content": "", "creation_timestamp": "2026-03-01T02:29:07.827772Z"}, {"uuid": "43823552-c6ac-4481-95e5-6f95daf302d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50051", "type": "seen", "source": "https://gist.github.com/Darkcrai86/9146c6003145a6dd1c7230cf7d607ea3", "content": "", "creation_timestamp": "2025-08-29T11:28:19.000000Z"}, {"uuid": "db2f54a7-cd41-4896-8cc6-1f5d5fd6f2d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-50056", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "b89a3ca4-d907-4d89-8e1a-bbd57462ed8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-50058", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "d22709bb-82a1-4427-8d59-af6c9e236162", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-50056", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "694ff6f6-0217-4526-9c52-4e3d22c803fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-50057", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "26172f59-7511-4bcc-9203-3a7e9c45c79c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-50057", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "d9f8e9ed-0ec1-4211-81fd-7c40817c6a82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://t.me/itsec_news/5233", "content": "\u200b\u26a1\ufe0f\u0414\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445: \u0441\u043a\u0440\u044b\u0442\u0430\u044f \u0443\u0433\u0440\u043e\u0437\u0430 \u0434\u043b\u044f \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u0418\u0418-\u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u043e\u0432\n\n\ud83d\udcac \u0412 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0435 LLM-\u043c\u043e\u0434\u0435\u043b\u0438 Llama \u043e\u0442 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Meta * \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c , \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 llama-stack inference. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-50050 \u0438 \u043e\u0446\u0435\u043d\u043a\u0443 6.3 \u0438\u0437 10 \u0431\u0430\u043b\u043b\u043e\u0432 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Snyk \u043f\u0440\u0438\u0441\u0432\u043e\u0438\u043b\u0430 \u0435\u0439 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u043e\u0446\u0435\u043d\u043a\u0443 \u0432 9.3 \u0431\u0430\u043b\u043b\u0430.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 Llama Stack, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u0435\u0442 API-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u044b \u0434\u043b\u044f \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u0438\u0441\u043a\u0443\u0441\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0438\u043d\u0442\u0435\u043b\u043b\u0435\u043a\u0442\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043c\u043e\u0434\u0435\u043b\u0435\u0439 Llama \u043e\u0442 Meta. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f Python-\u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u00abpickle\u00bb, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442\u044c \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043f\u0440\u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 Oligo Security \u0410\u0432\u0438 \u041b\u0443\u043c\u0435\u043b\u044c\u0441\u043a\u0438, \u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0441\u043e\u043a\u0435\u0442\u0443 ZeroMQ \u0447\u0435\u0440\u0435\u0437 \u0441\u0435\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 \u043e\u0431\u044a\u0435\u043a\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0431\u0443\u0434\u0435\u0442 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u00abrecv_pyobj\u00bb, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c \u0445\u043e\u0441\u0442\u0435.\n\nMeta \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 10 \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2024 \u0433\u043e\u0434\u0430 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 0.0.41, \u0437\u0430\u043c\u0435\u043d\u0438\u0432 \u0444\u043e\u0440\u043c\u0430\u0442 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u00abpickle\u00bb \u043d\u0430 \u0431\u043e\u043b\u0435\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0439 JSON. \u0422\u0430\u043a\u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 \u00abpyzmq\u00bb, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a ZeroMQ. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 24 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044f 2024 \u0433\u043e\u0434\u0430.\n\n\u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0447\u0442\u043e \u044d\u0442\u043e \u043d\u0435 \u043f\u0435\u0440\u0432\u044b\u0439 \u0441\u043b\u0443\u0447\u0430\u0439 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0418\u0418-\u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430\u0445. \u0412 \u0430\u0432\u0433\u0443\u0441\u0442\u0435 2024 \u0433\u043e\u0434\u0430 Oligo Security \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 TensorFlow Keras, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u043e\u0431\u043e\u0439\u0442\u0438 \u0437\u0430\u0449\u0438\u0442\u0443 CVE-2024-3660 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043c\u043e\u0434\u0443\u043b\u044f \u00abmarshal\u00bb.\n\n\u0418\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0441 Llama \u043f\u043e\u0434\u0447\u0451\u0440\u043a\u0438\u0432\u0430\u0435\u0442 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f \u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u043e\u0432 \u0438\u0441\u043a\u0443\u0441\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0438\u043d\u0442\u0435\u043b\u043b\u0435\u043a\u0442\u0430, \u0442\u0430\u043a \u043a\u0430\u043a \u0441 \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435\u043c \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439 \u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u0432\u0441\u0451 \u0431\u043e\u043b\u0435\u0435 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u043c\u0438.\n\n* \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Meta \u0438 \u0435\u0451 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b \u043f\u0440\u0438\u0437\u043d\u0430\u043d\u044b \u044d\u043a\u0441\u0442\u0440\u0435\u043c\u0438\u0441\u0442\u0441\u043a\u0438\u043c\u0438, \u0438\u0445 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u043f\u0440\u0435\u0449\u0435\u043d\u0430 \u043d\u0430 \u0442\u0435\u0440\u0440\u0438\u0442\u043e\u0440\u0438\u0438 \u0420\u0424.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-01-27T19:23:25.000000Z"}, {"uuid": "bb3cf92a-e13c-4b90-b0fa-045dd153008c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50053", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8316", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50053\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N)\n\ud83d\udd39 Description: Zohocorp ManageEngine ServiceDesk Plus versions\u00a0below\u00a014920\u00a0, ServiceDesk Plus MSP and SupportCentre Plus versions below\u00a014910 are vulnerable to Stored XSS in the task feature.\n\ud83d\udccf Published: 2025-03-21T06:01:39.945Z\n\ud83d\udccf Modified: 2025-03-21T06:01:39.945Z\n\ud83d\udd17 References:\n1. https://www.manageengine.com/products/service-desk/CVE-2024-50053.html", "creation_timestamp": "2025-03-21T06:21:42.000000Z"}, {"uuid": "ccdd3e87-5b9e-4fb0-b167-1154d9ebd2eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50052", "type": "seen", "source": "https://t.me/cvedetector/9251", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50052 - Mattermost Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-50052 \nPublished : Oct. 29, 2024, 8:15 a.m. | 20\u00a0minutes ago \nDescription : Mattermost versions 9.10.x &lt;=&lt;=&lt;=\nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T09:44:54.000000Z"}, {"uuid": "72f917b4-0505-41b2-b1aa-98485ad775e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50056", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10684", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50056\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c\n\nFix potential dereferencing of ERR_PTR() in find_format_by_pix()\nand uvc_v4l2_enum_format().\n\nFix the following smatch errors:\n\ndrivers/usb/gadget/function/uvc_v4l2.c:124 find_format_by_pix()\nerror: 'fmtdesc' dereferencing possible ERR_PTR()\n\ndrivers/usb/gadget/function/uvc_v4l2.c:392 uvc_v4l2_enum_format()\nerror: 'fmtdesc' dereferencing possible ERR_PTR()\n\nAlso, fix similar issue in uvc_v4l2_try_format() for potential\ndereferencing of ERR_PTR().\n\ud83d\udccf Published: 2024-10-21T19:39:47.131Z\n\ud83d\udccf Modified: 2025-04-07T08:36:53.929Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/03fa71e97e9bb116993ec1d51b8a6fe776db0984\n2. https://git.kernel.org/stable/c/72a68d2bede3284b95ee93a5ab3a81758bba95b0\n3. https://git.kernel.org/stable/c/cedeb36c3ff4acd0f3d09918dfd8ed1df05efdd6\n4. https://git.kernel.org/stable/c/a7bb96b18864225a694e3887ac2733159489e4b0", "creation_timestamp": "2025-04-07T08:44:51.000000Z"}, {"uuid": "be6b4902-d8a4-437b-955c-c056bf0682c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50053", "type": "seen", "source": "https://t.me/cvedetector/20791", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50053 - Zohocorp ManageEngine ServiceDesk Plus Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-50053 \nPublished : March 21, 2025, 6:15 a.m. | 21\u00a0minutes ago \nDescription : Zohocorp ManageEngine ServiceDesk Plus versions\u00a0below\u00a014920\u00a0, ServiceDesk Plus MSP and SupportCentre Plus versions below\u00a014910 are vulnerable to Stored XSS in the task feature. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T07:37:08.000000Z"}, {"uuid": "ba710794-6774-4349-a14d-7fef74087d6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50058", "type": "seen", "source": "https://t.me/cvedetector/8562", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50058 - \"Linux kernel Derefence in UART shutdown\"\", \n  \"Content\": \"CVE ID : CVE-2024-50058 \nPublished : Oct. 21, 2024, 8:15 p.m. | 16\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nserial: protect uart_port_dtr_rts() in uart_shutdown() too  \n  \nCommit af224ca2df29 (serial: core: Prevent unsafe uart port access, part  \n3) added few uport == NULL checks. It added one to uart_shutdown(), so  \nthe commit assumes, uport can be NULL in there. But right after that  \nprotection, there is an unprotected \"uart_port_dtr_rts(uport, false);\"  \ncall. That is invoked only if HUPCL is set, so I assume that is the  \nreason why we do not see lots of these reports.  \n  \nOr it cannot be NULL at this point at all for some reason :P.  \n  \nUntil the above is investigated, stay on the safe side and move this  \ndereference to the if too.  \n  \nI got this inconsistency from Coverity under CID 1585130. Thanks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T22:43:16.000000Z"}, {"uuid": "b20107e7-ab11-4eac-a5d2-62be530f7b76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://t.me/cvedetector/8690", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50050 - Llama Stack Pickle Deserialization Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-50050 \nPublished : Oct. 23, 2024, 2:15 p.m. | 51\u00a0minutes ago \nDescription : Llama Stack prior to revision 7a8aa775e5a267cf8660d83140011a0b7f91e005 used pickle as a serialization format for socket communication, potentially allowing for remote code execution. Socket communication has been changed to use JSON instead. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-23T17:23:17.000000Z"}, {"uuid": "8387d50c-68c4-47bf-9174-c24c9b9906dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "https://t.me/CyberBulletin/2168", "content": "\u26a1CVE-2024-50050: Critical Security Flaw in Meta\u2019s Llama-Stack Framework.\n\n#CyberBulletin", "creation_timestamp": "2025-01-26T09:35:25.000000Z"}, {"uuid": "ff868c7f-1d30-440a-aa75-8f0fbf546fb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50055", "type": "seen", "source": "https://t.me/cvedetector/8567", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50055 - Linux Kernel Double Free in Driver Core Bus Register\", \n  \"Content\": \"CVE ID : CVE-2024-50055 \nPublished : Oct. 21, 2024, 8:15 p.m. | 16\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndriver core: bus: Fix double free in driver API bus_register()  \n  \nFor bus_register(), any error which happens after kset_register() will  \ncause that @priv are freed twice, fixed by setting @priv with NULL after  \nthe first free. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T22:43:56.000000Z"}, {"uuid": "cbd82a66-d831-4997-a746-0835f36d0ac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50056", "type": "seen", "source": "https://t.me/cvedetector/8565", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50056 - Linux USB UVC Device err_ptr Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50056 \nPublished : Oct. 21, 2024, 8:15 p.m. | 16\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nusb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c  \n  \nFix potential dereferencing of ERR_PTR() in find_format_by_pix()  \nand uvc_v4l2_enum_format().  \n  \nFix the following smatch errors:  \n  \ndrivers/usb/gadget/function/uvc_v4l2.c:124 find_format_by_pix()  \nerror: 'fmtdesc' dereferencing possible ERR_PTR()  \n  \ndrivers/usb/gadget/function/uvc_v4l2.c:392 uvc_v4l2_enum_format()  \nerror: 'fmtdesc' dereferencing possible ERR_PTR()  \n  \nAlso, fix similar issue in uvc_v4l2_try_format() for potential  \ndereferencing of ERR_PTR(). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T22:43:18.000000Z"}, {"uuid": "7a7f34ba-6753-48c9-8a35-3bfe60f44575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50057", "type": "seen", "source": "https://t.me/cvedetector/8561", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50057 - Linux Kernel USB Type-C Tipd IRQ Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50057 \nPublished : Oct. 21, 2024, 8:15 p.m. | 16\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nusb: typec: tipd: Free IRQ only if it was requested before  \n  \nIn polling mode, if no IRQ was requested there is no need to free it.  \nCall devm_free_irq() only if client-&gt;irq is set. This fixes the warning  \ncaused by the tps6598x module removal:  \n  \nWARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devm_free_irq+0x80/0x8c  \n...  \n...  \nCall trace:  \n  devm_free_irq+0x80/0x8c  \n  tps6598x_remove+0x28/0x88 [tps6598x]  \n  i2c_device_remove+0x2c/0x9c  \n  device_remove+0x4c/0x80  \n  device_release_driver_internal+0x1cc/0x228  \n  driver_detach+0x50/0x98  \n  bus_remove_driver+0x6c/0xbc  \n  driver_unregister+0x30/0x60  \n  i2c_del_driver+0x54/0x64  \n  tps6598x_i2c_driver_exit+0x18/0xc3c [tps6598x]  \n  __arm64_sys_delete_module+0x184/0x264  \n  invoke_syscall+0x48/0x110  \n  el0_svc_common.constprop.0+0xc8/0xe8  \n  do_el0_svc+0x20/0x2c  \n  el0_svc+0x28/0x98  \n  el0t_64_sync_handler+0x13c/0x158  \n  el0t_64_sync+0x190/0x194 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T22:43:16.000000Z"}, {"uuid": "cd0111d6-7d7a-4614-9e98-f23fecedf429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50059", "type": "seen", "source": "https://t.me/cvedetector/8548", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50059 - Linux Kernel ntb: Switchtec NTB Use After Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50059 \nPublished : Oct. 21, 2024, 8:15 p.m. | 16\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition  \n  \nIn the switchtec_ntb_add function, it can call switchtec_ntb_init_sndev  \nfunction, then &amp;sndev-&gt;check_link_status_work is bound with  \ncheck_link_status_work. switchtec_ntb_link_notification may be called  \nto start the work.  \n  \nIf we remove the module which will call switchtec_ntb_remove to make  \ncleanup, it will free sndev through kfree(sndev), while the work  \nmentioned above will be used. The sequence of operations that may lead  \nto a UAF bug is as follows:  \n  \nCPU0                                 CPU1  \n  \n                        | check_link_status_work  \nswitchtec_ntb_remove    |  \nkfree(sndev);           |  \n                        | if (sndev-&gt;link_force_down)  \n                        | // use sndev  \n  \nFix it by ensuring that the work is canceled before proceeding with  \nthe cleanup in switchtec_ntb_remove. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T22:42:56.000000Z"}, {"uuid": "19536428-28a0-4424-be7c-a131e0fa1d34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/789", "content": "#exploit\n1. CVE-2024-43451:\nWindows NTLMv2 0-day\nhttps://github.com/RonF98/CVE-2024-43451-POC\n\n2. CVE-2024-50050:\nVulnerability in meta-llama/llama-stack\nhttps://www.oligo.security/blog/cve-2024-50050-critical-vulnerability-in-meta-llama-llama-stack", "creation_timestamp": "2025-01-25T01:48:26.000000Z"}, {"uuid": "ac89c589-92fd-47ce-b2dc-df27d8ae06f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9561", "content": "CVE-2024-50050: Critical Vulnerability in meta-llama/llama-stack | Oligo Security\n\nhttps://www.oligo.security/blog/cve-2024-50050-critical-vulnerability-in-meta-llama-llama-stack", "creation_timestamp": "2025-01-23T15:45:06.000000Z"}, {"uuid": "1d59ea4e-000b-4eb1-898d-30570fa366a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "seen", "source": "Telegram/swGprnkkgaSSG18L5dyxxaSHlLaRSipDlGEfBJLR5IVZEA", "content": "", "creation_timestamp": "2025-01-26T13:55:14.000000Z"}, {"uuid": "2a79f0b7-6f40-4e6e-b6f6-8fe1597786f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50050", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11726", "content": "#exploit\n1. CVE-2024-43451:\nWindows NTLMv2 0-day\nhttps://github.com/RonF98/CVE-2024-43451-POC\n\n2. CVE-2024-50050:\nVulnerability in meta-llama/llama-stack\nhttps://www.oligo.security/blog/cve-2024-50050-critical-vulnerability-in-meta-llama-llama-stack", "creation_timestamp": "2025-01-24T11:52:07.000000Z"}]}