{"vulnerability": "CVE-2024-36972", "sightings": [{"uuid": "8858e79c-6b65-4bc1-9cad-a1be50eeabc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-36972", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lhfsmwsioc2w", "content": "", "creation_timestamp": "2025-02-05T05:10:46.780123Z"}, {"uuid": "91e0b89b-1069-4326-a51c-fa85ebe49a1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "seen", "source": "https://bsky.app/profile/decrypt.lol/post/3lhkktmebmn2o", "content": "", "creation_timestamp": "2025-02-07T02:34:39.103846Z"}, {"uuid": "93f48a9e-21ee-4b77-904c-51e6c09dba11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lhflxf7g5222", "content": "", "creation_timestamp": "2025-02-05T03:11:24.981689Z"}, {"uuid": "9cacdf71-8fc0-4b5f-bd2d-a8cba3db99a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lirtupwl3b23", "content": "", "creation_timestamp": "2025-02-22T17:30:09.198803Z"}, {"uuid": "a345143e-a82a-4803-b52d-a96aa2d292c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lhhdsz7ft72x", "content": "", "creation_timestamp": "2025-02-05T19:51:03.273599Z"}, {"uuid": "7a38cbaf-0382-4622-a534-79822dcf440f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1546", "content": "Security-research/pocs/linux/kernelctf/CVE-2024-36972_lts_cos at master \u00b7 google/security-research \n\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-36972_lts_cos", "creation_timestamp": "2025-02-26T04:24:05.000000Z"}, {"uuid": "3b88454f-ac83-4a07-a05f-faa97a3d4654", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/472", "content": "CVE-2024-36972 \n* \n\u0414\u0432\u0430 \u0432 \u043e\u0434\u043d\u043e\u043c ! \nLinux  LPE and Container Escape\n*\nvulnerability affects Linux kernel versions:\n    v6.8 to v6.9\n    v5.15.147\n    v6.1.78\n    v6.6.17\n\nPOC exploit\n\n#Linux #lpe #container #escape", "creation_timestamp": "2025-02-10T09:00:46.000000Z"}, {"uuid": "562edb09-994b-427a-ad0f-da29cc44ed3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1520", "content": "Security-research/pocs/linux/kernelctf/CVE-2024-36972_lts_cos at master \u00b7 google/security-research.\n\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-36972_lts_cos", "creation_timestamp": "2025-02-09T04:55:49.000000Z"}, {"uuid": "1d416697-bbad-4d48-b446-e9f68710b228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2508", "content": "CVE-2024-36972 \n* \n\u0414\u0432\u0430 \u0432 \u043e\u0434\u043d\u043e\u043c ! \nLinux  LPE and Container Escape\n*\nvulnerability affects Linux kernel versions:\n    v6.8 to v6.9\n    v5.15.147\n    v6.1.78\n    v6.6.17\n\nPOC exploit\n\n#Linux #lpe #container #escape", "creation_timestamp": "2025-02-05T20:38:06.000000Z"}, {"uuid": "14f96a98-b251-40b2-9891-2d17463db857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11782", "content": "#exploit\n1. CVE-2024-38143:\nWindows WLAN AutoConfig Service EoP\nhttps://github.com/johnjhacking/CVE-2024-38143\n\n2. CVE-2024-36972:\nLinux kernel NULL Pointer Dereference\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-36972_lts_cos", "creation_timestamp": "2025-02-06T23:48:06.000000Z"}, {"uuid": "2e03875e-6f13-4acd-967a-9ffabea13cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "published-proof-of-concept", "source": "https://t.me/anti_malware/19573", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438 \u0434\u0435\u0442\u0430\u043b\u044f\u043c\u0438 \u043e\u043f\u0430\u0441\u043d\u043e\u0439 (7,5 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS) \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0434 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2024-36972, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0435\u0439 \u044f\u0434\u0440\u043e \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux. \u0414\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 (PoC) \u0442\u0430\u043a\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0432\u0441\u0435\u043c \u0436\u0435\u043b\u0430\u044e\u0449\u0438\u043c.", "creation_timestamp": "2025-02-05T07:54:31.000000Z"}, {"uuid": "2afc4027-01a0-4443-b0f6-bf821cea7dfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36972", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/782", "content": "https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-36972_lts_cos\n\nCVE-2024-36972 exploit\n\n#github #exploit", "creation_timestamp": "2025-02-07T16:19:11.000000Z"}]}