{"vulnerability": "CVE-2024-4172", "sightings": [{"uuid": "1d056fd9-44b5-4ace-b16e-be6af543f4eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41724", "type": "seen", "source": "https://t.me/cvedetector/19937", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41724 - Gallagher Command Centre SSL/TLS Certificate Validation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41724 \nPublished : March 10, 2025, 3:15 a.m. | 1\u00a0hour, 34\u00a0minutes ago \nDescription : Improper Certificate Validation (CWE-295) in the Gallagher Command Centre SALTO integration allowed an attacker to spoof the SALTO server.   \n  \n  \n  \n  \nThis issue affects all versions of Gallagher Command Centre prior to 9.20.1043. \nSeverity: 8.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T06:29:35.000000Z"}, {"uuid": "8085fdc6-7dfb-41cf-8bed-21047e59be90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41724", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljyuigrtgf2m", "content": "", "creation_timestamp": "2025-03-10T05:55:00.114396Z"}, {"uuid": "e9e6e01f-02df-4a36-93c9-103b7fd1d0da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41724", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "d9617b76-96d6-45cc-bf9e-e65aee7ee72d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41724", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:32.000000Z"}, {"uuid": "40ad02ca-db28-4f64-89a8-f4ffdb5bfd90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41724", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114136089058387718", "content": "", "creation_timestamp": "2025-03-10T03:48:27.977553Z"}, {"uuid": "e49d0638-af6b-42b6-b0a8-1479e05ebcf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41721", "type": "seen", "source": "https://t.me/cvedetector/6099", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41721 - Citrix USB Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41721 \nPublished : Sept. 20, 2024, 8:15 a.m. | 17\u00a0minutes ago \nDescription : An insufficient boundary validation in the USB code could lead to an out-of-bounds read on the heap, which could potentially lead to an arbitrary write and remote code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T10:33:28.000000Z"}, {"uuid": "bd36935d-14b9-40bb-904b-a359ab39d026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41724", "type": "seen", "source": "Telegram/YgBML6BDKSjW1gwBjU2VxUJH0bVcY_ZpkvRLvlNqF4n67W7e", "content": "", "creation_timestamp": "2025-03-10T14:45:04.000000Z"}, {"uuid": "9ab3c91a-ce39-4b93-aaeb-209a68e27e07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41724", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6977", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41724\n\ud83d\udd25 CVSS Score: 8.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: Improper Certificate Validation (CWE-295) in the Gallagher Command Centre SALTO integration allowed an attacker to spoof the SALTO server. \n\n\n\n\nThis issue affects all versions of Gallagher Command Centre prior to 9.20.1043.\n\ud83d\udccf Published: 2025-03-10T02:44:36.469Z\n\ud83d\udccf Modified: 2025-03-10T02:44:36.469Z\n\ud83d\udd17 References:\n1. https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2024-41724", "creation_timestamp": "2025-03-10T03:39:00.000000Z"}, {"uuid": "99c80df5-e9f1-4a70-8f7e-8f83241bf133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41728", "type": "seen", "source": "https://t.me/cvedetector/5160", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41728 - SAP NetWeaver Application Server for ABAP and ABAP Platform Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-41728 \nPublished : Sept. 10, 2024, 4:15 a.m. | 22\u00a0minutes ago \nDescription : Due to missing authorization check, SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker logged in as a developer to read objects contained in a package. This causes an impact on confidentiality, as this attacker would otherwise not have access to view these objects. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T06:42:08.000000Z"}, {"uuid": "ee18ed01-cd32-46e4-89bf-aa72200d13b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41729", "type": "seen", "source": "https://t.me/cvedetector/5155", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41729 - SAP BEx Analyzer Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41729 \nPublished : Sept. 10, 2024, 3:15 a.m. | 35\u00a0minutes ago \nDescription : Due to missing authorization checks, SAP BEx Analyzer allows an authenticated attacker to access information over the network which is otherwise restricted. On successful exploitation the attacker can enumerate information causing a limited impact on confidentiality of the application. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T05:51:59.000000Z"}, {"uuid": "85492620-73cf-40d4-a468-f5573b9e2d4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41721", "type": "seen", "source": "https://t.me/CyberBulletin/844", "content": "\u26a1\ufe0fFreeBSD Issues Critical Security Advisory for CVE-2024-41721 (CVSS 9.8).\n\n#CyberBulletin", "creation_timestamp": "2024-09-23T09:50:53.000000Z"}, {"uuid": "dbfcc395-751f-441e-ad36-5d284ddc80b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41720", "type": "seen", "source": "https://t.me/cvedetector/2427", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41720 - ZWX-2000CSW2-HN Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41720 \nPublished : Aug. 5, 2024, 5:15 a.m. | 45\u00a0minutes ago \nDescription : Incorrect permission assignment for critical resource issue exists in ZWX-2000CSW2-HN firmware versions prior to Ver.0.3.15, which may allow a network-adjacent authenticated attacker to alter the configuration of the device. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T08:03:06.000000Z"}, {"uuid": "3fb63679-97dd-4408-8362-dddda0d7f603", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41723", "type": "seen", "source": "https://t.me/cvedetector/3171", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41723 - F5 BIG-IP Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41723 \nPublished : Aug. 14, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Undisclosed requests to BIG-IP iControl REST can lead to information leak of user account names.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T18:13:51.000000Z"}, {"uuid": "63f49630-1404-43ce-9316-bd00f6c18d74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41727", "type": "seen", "source": "https://t.me/cvedetector/3170", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41727 - BIG-IP DoS Memory Consumption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41727 \nPublished : Aug. 14, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : In BIG-IP tenants running on r2000 and r4000 series hardware, or BIG-IP Virtual Edition (VEs) using Intel E810 SR-IOV NIC, undisclosed traffic can cause an increase in memory resource utilization.\u00a0\u00a0  \n  \nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T18:13:50.000000Z"}, {"uuid": "b246f8ff-c7b3-4bc8-a3f5-46477b733282", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41721", "type": "seen", "source": "https://t.me/ViralCyber/5991", "content": "\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062d\u06cc\u0627\u062a\u06cc RCE \u062f\u0631 FreeBSD \u062f\u0633\u062a\u0631\u0633\u06cc \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0631\u0627 \u0628\u0627\u0632 \u0645\u06cc \u06a9\u0646\u062f\n\n\ud83d\udd13 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2024-41721 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0634\u0628\u06cc\u0647 \u0633\u0627\u0632\u06cc XHCI \u062f\u0631 \u0647\u0627\u06cc\u067e\u0631\u0648\u0627\u06cc\u0632\u0631 bhyve \u062f\u0631 FreeBSD \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a. \u0645\u0634\u06a9\u0644 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0628\u0631\u0631\u0633\u06cc \u0646\u0627\u06a9\u0627\u0641\u06cc \u0645\u0631\u0632 \u062f\u0627\u062f\u0647 \u062f\u0631 \u06a9\u062f USB \u0628\u0648\u062f. \n\n\ud83d\udcbb \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0645\u0647\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u0631\u0627 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0645\u06cc\u0632\u0628\u0627\u0646 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f. \u0627\u06cc\u0646 \u062e\u0637\u0631\u0627\u062a \u062c\u062f\u06cc \u0627\u06cc\u062c\u0627\u062f \u0645\u06cc \u06a9\u0646\u062f \u0632\u06cc\u0631\u0627 \u0641\u0631\u0622\u06cc\u0646\u062f bhyve \u0645\u0639\u0645\u0648\u0644\u0627\u064b \u0628\u0647 \u0635\u0648\u0631\u062a root \u0627\u062c\u0631\u0627 \u0645\u06cc \u0634\u0648\u062f. \n\n\ud83d\udee1 \u0628\u0647 \u0645\u062f\u06cc\u0631\u0627\u0646 FreeBSD \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u06a9\u0647 \u0641\u0648\u0631\u0627\u064b \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc \u0645\u0646\u062a\u0634\u0631 \u0634\u062f\u0647 \u062f\u0631 19 \u0633\u067e\u062a\u0627\u0645\u0628\u0631 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0645\u062d\u0627\u0641\u0638\u062a \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u062e\u0648\u062f \u0646\u0635\u0628 \u06a9\u0646\u0646\u062f. \u062a\u0648\u062c\u0647 \u0648\u06cc\u0698\u0647 \u0628\u0627\u06cc\u062f \u0628\u0647 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc\u06cc \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06cc\u0647 \u0633\u0627\u0632\u06cc XHCI \u0634\u0648\u062f.\n\n#\u0627\u0645\u0646\u06cc\u062a #\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc #\u062a\u0647\u062f\u06cc\u062f \u0633\u0627\u06cc\u0628\u0631\u06cc #\u062e\u0637\u0631 \u062f\u0627\u062f\u0647\n\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83e\udd81\u00ab\u06a9\u062a\u0627\u0633\u00bb\n\u200fhttp://t.me/ict_security", "creation_timestamp": "2024-09-24T20:12:39.000000Z"}, {"uuid": "a6f13a8a-e732-41a9-a906-9c3ca4833fbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41721", "type": "seen", "source": "https://t.me/HackingInsights/14087", "content": "\u200aFreeBSD Issues Critical Security Advisory for CVE-2024-41721 (CVSS 9.8)\n\nhttps://securityonline.info/freebsd-issues-critical-security-advisory-for-cve-2024-41721-cvss-9-8/", "creation_timestamp": "2024-09-23T10:55:30.000000Z"}, {"uuid": "065dd283-da9f-4a16-874e-40ae2c529bcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41726", "type": "seen", "source": "https://t.me/cvedetector/1830", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41726 - SKYSEA Client Path Traversal Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41726 \nPublished : July 29, 2024, 9:15 a.m. | 35\u00a0minutes ago \nDescription : Path traversal vulnerability exists in SKYSEA Client View Ver.3.013.00 to Ver.19.210.04e. If this vulnerability is exploited, an arbitrary executable file may be executed by a user who can log in to the PC where the product's Windows client is installed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-29T12:06:46.000000Z"}, {"uuid": "2f5d0bd0-df3d-4a3c-a524-2e64f410db76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41721", "type": "seen", "source": "https://t.me/CyberBulletin/25719", "content": "\u26a1\ufe0fFreeBSD Issues Critical Security Advisory for CVE-2024-41721 (CVSS 9.8).\n\n#CyberBulletin", "creation_timestamp": "2024-09-23T09:50:53.000000Z"}, {"uuid": "d08bba30-fe25-4681-8fbd-cede1cc1f2d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41721", "type": "seen", "source": "https://t.me/true_secator/6240", "content": "FreeBSD \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 (RCE), \u0432\u043b\u0438\u044f\u044e\u0449\u0443\u044e \u043d\u0430 \u0435\u0435 \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440 bhyve.\n\nCVE-2024-41721 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 Synacktiv \u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a\u00a0\u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443\u00a0\u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0438\u043b\u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u043d\u0430\u0434 \u0445\u043e\u0441\u0442\u043e\u043c, \u0447\u0442\u043e \u0441\u043e\u0437\u0434\u0430\u0441\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u0443\u0433\u0440\u043e\u0437\u0443 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e\u00a0\u043e\u0442\u0447\u0435\u0442\u0443\u00a0FreeBSD, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u0440\u043e\u0435\u0442\u0441\u044f \u0432 \u044d\u043c\u0443\u043b\u044f\u0446\u0438\u0438 XHCI \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u0430 bhyve, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0433\u043e\u0441\u0442\u0435\u0432\u044b\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u043d\u0443\u0442\u0440\u0438 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d.\n\n\u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0433\u0440\u0430\u043d\u0438\u0446 \u0432 \u043a\u043e\u0434\u0435 USB, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0447\u0442\u0435\u043d\u0438\u044e \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043a\u0443\u0447\u0435.\n\n\u0420\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u043e\u0448\u0438\u0431\u043a\u0443 \u043c\u043e\u0436\u0435\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0435\u0435 \u043d\u0430 \u0433\u043e\u0441\u0442\u0435\u0432\u043e\u0439 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u0435, \u0434\u043b\u044f \u0441\u0431\u043e\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u0430 \u0438\u043b\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u043d\u0430 \u0445\u043e\u0441\u0442-\u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n\u041f\u0440\u043e\u0446\u0435\u0441\u0441 bhyve \u043e\u0431\u044b\u0447\u043d\u043e \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442\u0441\u044f \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f root, \u0447\u0442\u043e \u0443\u0432\u0435\u043b\u0438\u0447\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0435 \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e bhyve \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0432 \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u0435 Capsicum, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430\u043c, \u0440\u0438\u0441\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432\u0441\u0435 \u0436\u0435 \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 FreeBSD. \u0421\u0438\u0441\u0442\u0435\u043c\u044b, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 \u044d\u043c\u0443\u043b\u044f\u0446\u0438\u044e XHCI, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0434\u043b\u044f \u0442\u0430\u043a\u0438\u0445 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439 \u043d\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u043e\u0431\u0445\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0443\u0442\u0438.\n\n\u0414\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b FreeBSD \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0449\u0435\u0439 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0435 19 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044f 2024 \u0433\u043e\u0434\u0430.\n\n\u041f\u043e\u0441\u043b\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u043a\u0440\u0430\u0439\u043d\u0435 \u0432\u0430\u0436\u043d\u043e \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0432\u0441\u0435 \u0433\u043e\u0441\u0442\u0435\u0432\u044b\u0435 \u041e\u0421, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435\u00a0USB-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0441 \u044d\u043c\u0443\u043b\u044f\u0446\u0438\u0435\u0439 XHCI, \u0447\u0442\u043e\u0431\u044b \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c, \u0447\u0442\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u0441\u0442\u0443\u043f\u044f\u0442 \u0432 \u0441\u0438\u043b\u0443.", "creation_timestamp": "2024-09-24T14:05:05.000000Z"}]}