Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability.
CVSS
No CVSS.
References
No reference.
Configurations
No configuration.
History
27 May 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability. | |
References |
|
01 May 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
17 Apr 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) OS command injection vulnerability in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2, including External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. |
09 Apr 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-09 08:15
Updated : 2024-05-27 01:15
NVD link : CVE-2024-30696
Mitre link : CVE-2024-30696
CVE.ORG link : CVE-2024-30696
JSON object : View
Products Affected
No product.
CWE
No CWE.