Skip to content

Commit

Permalink
Update Fri Apr 26 02:07:50 UTC 2024
Browse files Browse the repository at this point in the history
  • Loading branch information
trickest-workflows committed Apr 26, 2024
1 parent ac036f7 commit 6eb52a9
Show file tree
Hide file tree
Showing 101 changed files with 765 additions and 100 deletions.
17 changes: 17 additions & 0 deletions 2005/CVE-2005-1007.md
@@ -0,0 +1,17 @@
### [CVE-2005-1007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1007)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Unknown vulnerability in the LIST functionality in CommuniGate Pro before 4.3c3 allows remote attackers to cause a denial of service (server crash) via certain multipart messages.

### POC

#### Reference
- http://www.stalker.com/CommuniGatePro/History.html

#### Github
No PoCs found on GitHub currently.

17 changes: 17 additions & 0 deletions 2006/CVE-2006-0468.md
@@ -0,0 +1,17 @@
### [CVE-2006-0468](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0468)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

CommuniGate Pro Core Server before 5.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via LDAP messages with negative BER lengths, and possibly other vectors, as demonstrated by the ProtoVer LDAP test suite.

### POC

#### Reference
- http://www.stalker.com/CommuniGatePro/History.html

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2006/CVE-2006-0566.md
Expand Up @@ -11,6 +11,7 @@ The LDAP component in CommuniGate Pro Core Server 5.0.7 allows remote attackers

#### Reference
- http://securityreason.com/securityalert/416
- http://www.stalker.com/CommuniGatePro/History.html

#### Github
No PoCs found on GitHub currently.
Expand Down
1 change: 1 addition & 0 deletions 2006/CVE-2006-3083.md
Expand Up @@ -10,6 +10,7 @@ The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5,
### POC

#### Reference
- http://www.ubuntu.com/usn/usn-334-1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9515

#### Github
Expand Down
17 changes: 17 additions & 0 deletions 2006/CVE-2006-3084.md
@@ -0,0 +1,17 @@
### [CVE-2006-3084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.

### POC

#### Reference
- http://www.ubuntu.com/usn/usn-334-1

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2008/CVE-2008-2992.md
Expand Up @@ -20,4 +20,5 @@ Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/coyote8k/mscpracs

2 changes: 1 addition & 1 deletion 2016/CVE-2016-10735.md
Expand Up @@ -10,7 +10,7 @@ In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible
### POC

#### Reference
No PoCs from references.
- https://access.redhat.com/errata/RHSA-2020:0133

#### Github
- https://github.com/ARPSyndicate/cvemon
Expand Down
17 changes: 17 additions & 0 deletions 2016/CVE-2016-2561.md
@@ -0,0 +1,17 @@
### [CVE-2016-2561](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2561)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.4.x before 4.4.15.5 and 4.5.x before 4.5.5.1 allow remote authenticated users to inject arbitrary web script or HTML via (1) normalization.php or (2) js/normalization.js in the database normalization page, (3) templates/database/structure/sortable_header.phtml in the database structure page, or (4) the pos parameter to db_central_columns.php in the central columns page.

### POC

#### Reference
- https://github.com/phpmyadmin/phpmyadmin/commit/f33a42f1da9db943a67bda7d29f7dd91957a8e7e

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2017/CVE-2017-7529.md
Expand Up @@ -34,6 +34,7 @@ Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer
- https://github.com/RClueX/Hackerone-Reports
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Shehzadcyber/CVE-2017-7529
- https://github.com/SirEagIe/CVE-2017-7529
- https://github.com/TesterCC/exp_poc_library
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
Expand Down
1 change: 1 addition & 0 deletions 2017/CVE-2017-7921.md
Expand Up @@ -54,6 +54,7 @@ No PoCs from references.
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor
- https://github.com/sponkmonk/Ladon_english_update
- https://github.com/wafinfo/DecryptTools
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yousouf-Tasfin/cve-2017-7921-Mass-Exploit
- https://github.com/zhanwang110/Ingram
Expand Down
2 changes: 1 addition & 1 deletion 2018/CVE-2018-20676.md
Expand Up @@ -10,7 +10,7 @@ In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribut
### POC

#### Reference
No PoCs from references.
- https://access.redhat.com/errata/RHSA-2020:0133

#### Github
- https://github.com/ossf-cve-benchmark/CVE-2018-20676
Expand Down
2 changes: 1 addition & 1 deletion 2018/CVE-2018-20677.md
Expand Up @@ -10,7 +10,7 @@ In Bootstrap before 3.4.0, XSS is possible in the affix configuration target pro
### POC

#### Reference
No PoCs from references.
- https://access.redhat.com/errata/RHSA-2020:0133

#### Github
- https://github.com/andersoncontreira/http-tunnel-node
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-9670.md
Expand Up @@ -20,6 +20,7 @@ mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10
- https://github.com/3gstudent/Homework-of-Python
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Cappricio-Securities/CVE-2019-9670
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Mr-xn/Penetration_Testing_POC
Expand Down
17 changes: 17 additions & 0 deletions 2021/CVE-2021-26228.md
@@ -0,0 +1,17 @@
### [CVE-2021-26228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26228)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

SQL injection vulnerability in SourceCodester CASAP Automated Enrollment System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to edit_class1.php.

### POC

#### Reference
- https://github.com/BigTiger2020/CASAP-Automated-Enrollment-System/blob/main/README.md

#### Github
No PoCs found on GitHub currently.

17 changes: 17 additions & 0 deletions 2022/CVE-2022-36028.md
@@ -0,0 +1,17 @@
### [CVE-2022-36028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36028)
![](https://img.shields.io/static/v1?label=Product&message=greenlight&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.13.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')&color=brighgreen)

### Description

Greenlight is an end-user interface for BigBlueButton servers. Versions prior to 2.13.0 have an open redirect vulnerability in the Login page due to unchecked the value of the `return_to` cookie. Versions 2.13.0 contains a patch for the issue.

### POC

#### Reference
No PoCs from references.

#### Github
- https://github.com/khanhchauminh/khanhchauminh

17 changes: 17 additions & 0 deletions 2022/CVE-2022-36029.md
@@ -0,0 +1,17 @@
### [CVE-2022-36029](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36029)
![](https://img.shields.io/static/v1?label=Product&message=greenlight&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.13.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')&color=brighgreen)

### Description

Greenlight is an end-user interface for BigBlueButton servers. Versions prior to 2.13.0 have an open redirect vulnerability in the Login page due to unchecked the value of the `return_to` cookie. Versions 2.13.0 contains a patch for the issue.

### POC

#### Reference
No PoCs from references.

#### Github
- https://github.com/khanhchauminh/khanhchauminh

2 changes: 0 additions & 2 deletions 2024/CVE-2024-0193.md
@@ -1,11 +1,9 @@
### [CVE-2024-0193](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0193)
![](https://img.shields.io/static/v1?label=Product&message=Fedora&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209.2%20Extended%20Update%20Support&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Use%20After%20Free&color=brighgreen)

Expand Down
3 changes: 0 additions & 3 deletions 2024/CVE-2024-0229.md
@@ -1,5 +1,4 @@
### [CVE-2024-0229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229)
![](https://img.shields.io/static/v1?label=Product&message=Fedora&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue)
Expand All @@ -14,8 +13,6 @@
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209.0%20Extended%20Update%20Support&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209.2%20Extended%20Update%20Support&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=xorg-server&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=xwayland&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Access%20of%20Memory%20Location%20After%20End%20of%20Buffer&color=brighgreen)

Expand Down
3 changes: 0 additions & 3 deletions 2024/CVE-2024-0232.md
@@ -1,11 +1,8 @@
### [CVE-2024-0232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0232)
![](https://img.shields.io/static/v1?label=Product&message=Extra%20Packages%20for%20Enterprise%20Linux&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Fedora&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=sqlite&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Use%20After%20Free&color=brighgreen)

Expand Down
1 change: 0 additions & 1 deletion 2024/CVE-2024-0406.md
Expand Up @@ -2,7 +2,6 @@
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Advanced%20Cluster%20Security%203&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Advanced%20Cluster%20Security%204&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20OpenShift%20Container%20Platform%204&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=mholt&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)

Expand Down
3 changes: 0 additions & 3 deletions 2024/CVE-2024-0408.md
@@ -1,11 +1,8 @@
### [CVE-2024-0408](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408)
![](https://img.shields.io/static/v1?label=Product&message=Fedora&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=xorg-server&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=xwayland&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character&color=brighgreen)

Expand Down
3 changes: 0 additions & 3 deletions 2024/CVE-2024-0409.md
@@ -1,11 +1,8 @@
### [CVE-2024-0409](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409)
![](https://img.shields.io/static/v1?label=Product&message=Fedora&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=xorg-server&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=xwayland&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Out-of-bounds%20Write&color=brighgreen)

Expand Down
2 changes: 0 additions & 2 deletions 2024/CVE-2024-0553.md
@@ -1,13 +1,11 @@
### [CVE-2024-0553](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553)
![](https://img.shields.io/static/v1?label=Product&message=Fedora&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208.6%20Extended%20Update%20Support&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208.8%20Extended%20Update%20Support&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209.2%20Extended%20Update%20Support&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=gnutls&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Observable%20Discrepancy&color=brighgreen)

Expand Down
1 change: 0 additions & 1 deletion 2024/CVE-2024-0560.md
@@ -1,6 +1,5 @@
### [CVE-2024-0560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0560)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%203scale%20API%20Management%20Platform%202&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=upstream&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20&color=brighgreen)

Expand Down
2 changes: 0 additions & 2 deletions 2024/CVE-2024-0564.md
@@ -1,10 +1,8 @@
### [CVE-2024-0564](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0564)
![](https://img.shields.io/static/v1?label=Product&message=Fedora&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

Expand Down
3 changes: 0 additions & 3 deletions 2024/CVE-2024-0565.md
@@ -1,6 +1,4 @@
### [CVE-2024-0565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565)
![](https://img.shields.io/static/v1?label=Product&message=Fedora&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Kernel&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue)
Expand All @@ -9,7 +7,6 @@
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209.2%20Extended%20Update%20Support&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Virtualization%204%20for%20Red%20Hat%20Enterprise%20Linux%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Integer%20Underflow%20(Wrap%20or%20Wraparound)&color=brighgreen)

Expand Down
2 changes: 0 additions & 2 deletions 2024/CVE-2024-0567.md
@@ -1,6 +1,4 @@
### [CVE-2024-0567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567)
![](https://img.shields.io/static/v1?label=Product&message=Fedora&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GnuTLS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue)
Expand Down
2 changes: 0 additions & 2 deletions 2024/CVE-2024-0582.md
@@ -1,10 +1,8 @@
### [CVE-2024-0582](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0582)
![](https://img.shields.io/static/v1?label=Product&message=Fedora&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Use%20After%20Free&color=brighgreen)

Expand Down

0 comments on commit 6eb52a9

Please sign in to comment.