{"vulnerability": "CVE-2024-4215", "sightings": [{"uuid": "96ac093f-dea8-418b-b54b-1e600291a03c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4215", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4301", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-4215\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-05-02T18:15:07.593\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/pgadmin-org/pgadmin4/issues/7425\n2. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/\n3. https://github.com/pgadmin-org/pgadmin4/issues/7425\n4. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/", "creation_timestamp": "2025-02-13T19:10:41.000000Z"}, {"uuid": "14e1cae0-d9a0-4226-9097-49b63c9af8a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42152", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "a7acf245-727e-4f2f-ae82-e970fc13b2f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42153", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "d1b49860-0bc3-48cd-aabc-9ccaecb42c0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42154", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "a841f3ad-50b4-4465-b463-d01e4d13e71c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-42156", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "68a620e9-90a6-45ed-afe7-807dad99e765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42154", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-03", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "bfe41233-5c4d-4246-95d3-b52294deb9d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-42155", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "494fa2d1-47ee-4928-ac02-3988c5feb9bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-42158", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "fe69f5b6-454e-48b5-9f03-835784debb4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-42155", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "c6fe573e-2b1a-469f-895f-d429a0575379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42159", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1740", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42159\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Sanitise num_phys\n\nInformation is stored in mr_sas_port-&gt;phy_mask, values larger then size of\nthis field shouldn't be allowed.\n\ud83d\udccf Published: 2024-07-30T07:47:01.276Z\n\ud83d\udccf Modified: 2025-01-15T12:49:30.094Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/b869ec89d2ee923d46608b76e54c006680c9b4df\n2. https://git.kernel.org/stable/c/586b41060113ae43032ec6c4a16d518cef5da6e0\n3. https://git.kernel.org/stable/c/c8707901b53a48106d7501bdbd0350cefaefa4cf\n4. https://git.kernel.org/stable/c/3668651def2c1622904e58b0280ee93121f2b10b", "creation_timestamp": "2025-01-15T13:11:32.000000Z"}, {"uuid": "589557ed-0395-4835-bbe5-a1085a8b12f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42159", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16986", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42159\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Sanitise num_phys\n\nInformation is stored in mr_sas_port-&gt;phy_mask, values larger then size of\nthis field shouldn't be allowed.\n\ud83d\udccf Published: 2024-07-30T07:47:01.276Z\n\ud83d\udccf Modified: 2025-05-20T14:27:37.498Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/b869ec89d2ee923d46608b76e54c006680c9b4df\n2. https://git.kernel.org/stable/c/586b41060113ae43032ec6c4a16d518cef5da6e0\n3. https://git.kernel.org/stable/c/c8707901b53a48106d7501bdbd0350cefaefa4cf\n4. https://git.kernel.org/stable/c/3668651def2c1622904e58b0280ee93121f2b10b", "creation_timestamp": "2025-05-20T14:40:47.000000Z"}, {"uuid": "3d400dde-2931-4438-a46d-269351927a79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42156", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16987", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42156\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ns390/pkey: Wipe copies of clear-key structures on failure\n\nWipe all sensitive data from stack for all IOCTLs, which convert a\nclear-key into a protected- or secure-key.\n\ud83d\udccf Published: 2024-07-30T07:46:58.513Z\n\ud83d\udccf Modified: 2025-05-20T14:27:36.396Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/a891938947f4427f98cb1ce54f27223501efe750\n2. https://git.kernel.org/stable/c/7f6243edd901b75aaece326c90a1cc0dcb60cc3d\n3. https://git.kernel.org/stable/c/d65d76a44ffe74c73298ada25b0f578680576073", "creation_timestamp": "2025-05-20T14:40:48.000000Z"}, {"uuid": "061aeb64-cac9-4e84-90b4-b1993ed7d539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42151", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7343", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42151\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable\n\nTest case dummy_st_ops/dummy_init_ret_value passes NULL as the first\nparameter of the test_1() function. Mark this parameter as nullable to\nmake verifier aware of such possibility.\nOtherwise, NULL check in the test_1() code:\n\n      SEC(\"struct_ops/test_1\")\n      int BPF_PROG(test_1, struct bpf_dummy_ops_state *state)\n      {\n            if (!state)\n                    return ...;\n\n            ... access state ...\n      }\n\nMight be removed by verifier, thus triggering NULL pointer dereference\nunder certain conditions.\n\ud83d\udccf Published: 2024-07-30T07:46:43.969Z\n\ud83d\udccf Modified: 2025-03-12T17:26:55.128Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/7f79097b0de97a486b137b750d7dd7b20b519d23\n2. https://git.kernel.org/stable/c/1479eaff1f16983d8fda7c5a08a586c21891087d", "creation_timestamp": "2025-03-12T17:41:31.000000Z"}, {"uuid": "0454389c-c609-4466-b4a3-19fc880789ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42158", "type": "seen", "source": "https://t.me/cvedetector/2013", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42158 - \"IBM s390 Linux Kernel uninitialized memory exposure\"\", \n  \"Content\": \"CVE ID : CVE-2024-42158 \nPublished : July 30, 2024, 8:15 a.m. | 20\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ns390/pkey: Use kfree_sensitive() to fix Coccinelle warnings  \n  \nReplace memzero_explicit() and kfree() with kfree_sensitive() to fix  \nwarnings reported by Coccinelle:  \n  \nWARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1506)  \nWARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1643)  \nWARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1770) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T10:43:33.000000Z"}, {"uuid": "738492ff-ec06-4a48-af86-2884bf595bdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42154", "type": "seen", "source": "https://t.me/cvedetector/2017", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42154 - Linux Kernel TCP Metrics Invalid Source Address Length Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42154 \nPublished : July 30, 2024, 8:15 a.m. | 20\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ntcp_metrics: validate source addr length  \n  \nI don't see anything checking that TCP_METRICS_ATTR_SADDR_IPV4  \nis at least 4 bytes long, and the policy doesn't have an entry  \nfor this attribute at all (neither does it for IPv6 but v6 is  \nmanually validated). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T10:43:36.000000Z"}, {"uuid": "dcc76081-5263-4d8e-9e1d-cc8d8b5940c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42156", "type": "seen", "source": "https://t.me/cvedetector/2015", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42156 - IBM s390 Key Information Handling Buffer Wipe Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42156 \nPublished : July 30, 2024, 8:15 a.m. | 20\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ns390/pkey: Wipe copies of clear-key structures on failure  \n  \nWipe all sensitive data from stack for all IOCTLs, which convert a  \nclear-key into a protected- or secure-key. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T10:43:34.000000Z"}, {"uuid": "c554c198-6287-47b2-b27d-6a6db49eb133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42159", "type": "seen", "source": "https://t.me/cvedetector/2006", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42159 - Linux SCSI MPI3MR Sanitisation Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-42159 \nPublished : July 30, 2024, 8:15 a.m. | 20\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nscsi: mpi3mr: Sanitise num_phys  \n  \nInformation is stored in mr_sas_port-&gt;phy_mask, values larger then size of  \nthis field shouldn't be allowed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T10:43:20.000000Z"}, {"uuid": "1342a0fb-1481-4142-8711-b961acfaafb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42157", "type": "seen", "source": "https://t.me/cvedetector/2005", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42157 - Linux Kernel s390 pkey Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42157 \nPublished : July 30, 2024, 8:15 a.m. | 20\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ns390/pkey: Wipe sensitive data on failure  \n  \nWipe sensitive data from stack also if the copy_to_user() fails. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T10:43:19.000000Z"}, {"uuid": "a8788bdf-4046-4a37-b468-67de98d320d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42155", "type": "seen", "source": "https://t.me/cvedetector/2003", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42155 - IBM S390 Linux Kernel Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42155 \nPublished : July 30, 2024, 8:15 a.m. | 20\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ns390/pkey: Wipe copies of protected- and secure-keys  \n  \nAlthough the clear-key of neither protected- nor secure-keys is  \naccessible, this key material should only be visible to the calling  \nprocess. So wipe all copies of protected- or secure-keys from stack,  \neven in case of an error. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T10:43:17.000000Z"}, {"uuid": "b4a5551e-2840-466e-8b55-3a47f7990c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4215", "type": "seen", "source": "https://t.me/HackingInsights/89", "content": "\u200aCVE-2024-4215 &amp; CVE-2024-4216: Security Flaws Patched in Popular PostgreSQL Tool pgAdmin\n\nhttps://securityonline.info/cve-2024-4215-cve-2024-4216-security-flaws-patched-in-popular-postgresql-tool-pgadmin/", "creation_timestamp": "2024-05-06T13:34:11.000000Z"}]}