<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T14:21:01.489934+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c2cda03f-d673-43ae-8c03-356cf6640976/export</id>
    <title>c2cda03f-d673-43ae-8c03-356cf6640976</title>
    <updated>2026-05-09T14:21:01.733168+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c2cda03f-d673-43ae-8c03-356cf6640976", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47756", "type": "seen", "source": "https://t.me/cvedetector/8491", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47756 - Linux PCI Keystone NULL Pointer Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47756 \nPublished : Oct. 21, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nPCI: keystone: Fix if-statement expression in ks_pcie_quirk()  \n  \nThis code accidentally uses &amp;amp;&amp;amp; where || was intended.  It potentially  \nresults in a NULL dereference.  \n  \nThus, fix the if-statement expression to use the correct condition.  \n  \n[kwilczynski: commit log] \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T16:01:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c2cda03f-d673-43ae-8c03-356cf6640976/export"/>
    <published>2024-10-21T16:01:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/014d749c-a384-49c1-a04f-55a15ac5743d/export</id>
    <title>014d749c-a384-49c1-a04f-55a15ac5743d</title>
    <updated>2026-05-09T14:21:01.733091+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "014d749c-a384-49c1-a04f-55a15ac5743d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47757", "type": "seen", "source": "https://t.me/cvedetector/8492", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47757 - Linux Kernel Nilfs2 Out of Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47757 \nPublished : Oct. 21, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnilfs2: fix potential oob read in nilfs_btree_check_delete()  \n  \nThe function nilfs_btree_check_delete(), which checks whether degeneration  \nto direct mapping occurs before deleting a b-tree entry, causes memory  \naccess outside the block buffer when retrieving the maximum key if the  \nroot node has no entries.  \n  \nThis does not usually happen because b-tree mappings with 0 child nodes  \nare never created by mkfs.nilfs2 or nilfs2 itself.  However, it can happen  \nif the b-tree root node read from a device is configured that way, so fix  \nthis potential issue by adding a check for that case. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T16:01:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/014d749c-a384-49c1-a04f-55a15ac5743d/export"/>
    <published>2024-10-21T16:01:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ff1d2cbe-2aed-45be-8bae-76d48e286322/export</id>
    <title>ff1d2cbe-2aed-45be-8bae-76d48e286322</title>
    <updated>2026-05-09T14:21:01.733023+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ff1d2cbe-2aed-45be-8bae-76d48e286322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47750", "type": "seen", "source": "https://t.me/cvedetector/8494", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47750 - Huawei RDMA Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47750 \nPublished : Oct. 21, 2024, 1:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nRDMA/hns: Fix Use-After-Free of rsv_qp on HIP08  \n  \nCurrently rsv_qp is freed before ib_unregister_device() is called  \non HIP08. During the time interval, users can still dereg MR and  \nrsv_qp will be used in this process, leading to a UAF. Move the  \nrelease of rsv_qp after calling ib_unregister_device() to fix it. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T16:01:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ff1d2cbe-2aed-45be-8bae-76d48e286322/export"/>
    <published>2024-10-21T16:01:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/21093063-23b3-4855-a289-77cecc941a12/export</id>
    <title>21093063-23b3-4855-a289-77cecc941a12</title>
    <updated>2026-05-09T14:21:01.732952+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "21093063-23b3-4855-a289-77cecc941a12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47752", "type": "seen", "source": "https://t.me/cvedetector/8495", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47752 - Mediatek Linux Kernel Cross-Site Request Forgery (CSRF)\", \n  \"Content\": \"CVE ID : CVE-2024-47752 \nPublished : Oct. 21, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nmedia: mediatek: vcodec: Fix H264 stateless decoder smatch warning  \n  \nFix a smatch static checker warning on vdec_h264_req_if.c.  \nWhich leads to a kernel crash when fb is NULL. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T16:01:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/21093063-23b3-4855-a289-77cecc941a12/export"/>
    <published>2024-10-21T16:01:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/abc61ce3-3c2c-4667-9733-22f54d02b044/export</id>
    <title>abc61ce3-3c2c-4667-9733-22f54d02b044</title>
    <updated>2026-05-09T14:21:01.732877+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "abc61ce3-3c2c-4667-9733-22f54d02b044", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47751", "type": "seen", "source": "https://t.me/cvedetector/8496", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47751 - Linux Kernel PCI Driver Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-47751 \nPublished : Oct. 21, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nPCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()  \n  \nWithin kirin_pcie_parse_port(), the pcie-&amp;gt;num_slots is compared to  \npcie-&amp;gt;gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead  \nto an overflow.  \n  \nThus, fix condition to pcie-&amp;gt;num_slots + 1 &amp;gt;= MAX_PCI_SLOTS and move  \npcie-&amp;gt;num_slots increment below the if-statement to avoid out-of-bounds  \narray access.  \n  \nFound by Linux Verification Center (linuxtesting.org) with SVACE.  \n  \n[kwilczynski: commit log] \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T16:01:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/abc61ce3-3c2c-4667-9733-22f54d02b044/export"/>
    <published>2024-10-21T16:01:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3938309f-8ebf-4f02-85b9-726f93d4ce5e/export</id>
    <title>3938309f-8ebf-4f02-85b9-726f93d4ce5e</title>
    <updated>2026-05-09T14:21:01.732798+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3938309f-8ebf-4f02-85b9-726f93d4ce5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47759", "type": "seen", "source": "https://t.me/cvedetector/11141", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47759 - GLPI SVG Malicious Script Execution\", \n  \"Content\": \"CVE ID : CVE-2024-47759 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : GLPI is a free Asset and IT management software package. An technician can upload a SVG containing a malicious script. The script will then be executed when any user will try to see the document contents. Upgrade to 10.0.17. \nSeverity: 0.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3938309f-8ebf-4f02-85b9-726f93d4ce5e/export"/>
    <published>2024-11-15T19:58:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5b569ce7-d829-4362-8b92-a59468947492/export</id>
    <title>5b569ce7-d829-4362-8b92-a59468947492</title>
    <updated>2026-05-09T14:21:01.732730+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5b569ce7-d829-4362-8b92-a59468947492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47758", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113635001277155546", "content": "", "creation_timestamp": "2024-12-11T15:55:15.418042Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5b569ce7-d829-4362-8b92-a59468947492/export"/>
    <published>2024-12-11T15:55:15.418042+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b657c095-1c5a-48db-9bce-4b474a4a8f80/export</id>
    <title>b657c095-1c5a-48db-9bce-4b474a4a8f80</title>
    <updated>2026-05-09T14:21:01.732649+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b657c095-1c5a-48db-9bce-4b474a4a8f80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47758", "type": "seen", "source": "https://t.me/cvedetector/12637", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47758 - GLPI Privilege Escalationliable\", \n  \"Content\": \"CVE ID : CVE-2024-47758 \nPublished : Dec. 11, 2024, 4:15 p.m. | 25\u00a0minutes ago \nDescription : GLPI is a free asset and IT management software package. Starting in version 9.3.0 and prior to version 10.0.17, an authenticated user can use the API to take control of any user that have the same or a lower level of privileges. Version 10.0.17 contains a patch. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-11T17:44:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b657c095-1c5a-48db-9bce-4b474a4a8f80/export"/>
    <published>2024-12-11T17:44:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/637820a2-7e60-40ea-bc11-fa2e331ecced/export</id>
    <title>637820a2-7e60-40ea-bc11-fa2e331ecced</title>
    <updated>2026-05-09T14:21:01.732545+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "637820a2-7e60-40ea-bc11-fa2e331ecced", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47757", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/637820a2-7e60-40ea-bc11-fa2e331ecced/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/393acc85-367f-488d-93ff-161f97be4174/export</id>
    <title>393acc85-367f-488d-93ff-161f97be4174</title>
    <updated>2026-05-09T14:21:01.729321+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "393acc85-367f-488d-93ff-161f97be4174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47756", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/393acc85-367f-488d-93ff-161f97be4174/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
</feed>
