<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T18:06:38.076099+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5be22578-2eae-43dd-bf52-804b6921d3aa/export</id>
    <title>5be22578-2eae-43dd-bf52-804b6921d3aa</title>
    <updated>2026-05-06T18:06:38.431043+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5be22578-2eae-43dd-bf52-804b6921d3aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53118", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14733", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53118\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix a procfs host directory removal regression\n\nscsi_proc_hostdir_rm() decreases a reference counter and hence must only be\ncalled once per host that is removed. This change does not require a\nscsi_add_host_with_dma() change since scsi_add_host_with_dma() will return\n0 (success) if scsi_proc_host_add() is called.\n\ud83d\udccf Published: 2025-05-02T15:55:56.177Z\n\ud83d\udccf Modified: 2025-05-04T07:50:13.085Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/88c3d3bb6469cea929ac68fd326bdcbefcdfdd83\n2. https://git.kernel.org/stable/c/68c665bb185037e7eb66fb792c61da9d7151e99c\n3. https://git.kernel.org/stable/c/2a764d55e938743efa7c2cba7305633bcf227f09\n4. https://git.kernel.org/stable/c/7e0ae8667fcdd99d1756922e1140cac75f5fa279\n5. https://git.kernel.org/stable/c/73f030d4ef6d1ad17f824a0a2eb637ef7a9c7d51\n6. https://git.kernel.org/stable/c/be03df3d4bfe7e8866d4aa43d62e648ffe884f5f", "creation_timestamp": "2025-05-04T08:17:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5be22578-2eae-43dd-bf52-804b6921d3aa/export"/>
    <published>2025-05-04T08:17:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6212aae7-110d-4820-9463-fbc948c75614/export</id>
    <title>6212aae7-110d-4820-9463-fbc948c75614</title>
    <updated>2026-05-06T18:06:38.430955+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6212aae7-110d-4820-9463-fbc948c75614", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53117", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14734", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53117\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nfs: prevent out-of-bounds array speculation when closing a file descriptor\n\nGoogle-Bug-Id: 114199369\n\ud83d\udccf Published: 2025-05-02T15:55:55.512Z\n\ud83d\udccf Modified: 2025-05-04T07:50:11.802Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b\n2. https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69\n3. https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf\n4. https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830\n5. https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315\n6. https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06\n7. https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a\n8. https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4", "creation_timestamp": "2025-05-04T08:17:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6212aae7-110d-4820-9463-fbc948c75614/export"/>
    <published>2025-05-04T08:17:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ca6078cc-ce34-4668-871f-97f7a128c36b/export</id>
    <title>ca6078cc-ce34-4668-871f-97f7a128c36b</title>
    <updated>2026-05-06T18:06:38.430844+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ca6078cc-ce34-4668-871f-97f7a128c36b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53116", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14735", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53116\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: avoid potential UAF in nvmet_req_complete()\n\nAn nvme target -&amp;gt;queue_response() operation implementation may free the\nrequest passed as argument. Such implementation potentially could result\nin a use after free of the request pointer when percpu_ref_put() is\ncalled in nvmet_req_complete().\n\nAvoid such problem by using a local variable to save the sq pointer\nbefore calling __nvmet_req_complete(), thus avoiding dereferencing the\nreq pointer after that function call.\n\ud83d\udccf Published: 2025-05-02T15:55:54.858Z\n\ud83d\udccf Modified: 2025-05-04T07:50:10.667Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e5d99b29012bbf0e86929403209723b2806500c1\n2. https://git.kernel.org/stable/c/fafcb4b26393870c45462f9af6a48e581dbbcf7e\n3. https://git.kernel.org/stable/c/04c394208831d5e0d5cfee46722eb0f033cd4083\n4. https://git.kernel.org/stable/c/a6317235da8aa7cb97529ebc8121cc2a4c4c437a\n5. https://git.kernel.org/stable/c/f1d5888a5efe345b63c430b256e95acb0a475642\n6. https://git.kernel.org/stable/c/bcd535f07c58342302a2cd2bdd8894fe0872c8a9\n7. https://git.kernel.org/stable/c/8ed9813871038b25a934b21ab76b5b7dbf44fc3a\n8. https://git.kernel.org/stable/c/6173a77b7e9d3e202bdb9897b23f2a8afe7bf286", "creation_timestamp": "2025-05-04T08:17:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ca6078cc-ce34-4668-871f-97f7a128c36b/export"/>
    <published>2025-05-04T08:17:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ed3fca06-1299-45f9-b53e-484b234ff797/export</id>
    <title>ed3fca06-1299-45f9-b53e-484b234ff797</title>
    <updated>2026-05-06T18:06:38.430020+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ed3fca06-1299-45f9-b53e-484b234ff797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53115", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14736", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53115\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Fix memory leaks in mpi3mr_init_ioc()\n\nDon't allocate memory again when IOC is being reinitialized.\n\ud83d\udccf Published: 2025-05-02T15:55:54.148Z\n\ud83d\udccf Modified: 2025-05-04T07:50:09.375Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/5aab9342f12f980b64617a034d121efbbf09100a\n2. https://git.kernel.org/stable/c/7277b4eec2f25a0653646ba95b1f25fa16be1d6c\n3. https://git.kernel.org/stable/c/c798304470cab88723d895726d17fcb96472e0e9", "creation_timestamp": "2025-05-04T08:17:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ed3fca06-1299-45f9-b53e-484b234ff797/export"/>
    <published>2025-05-04T08:17:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6962c1b7-3705-4ecc-bf8c-599a657e82d4/export</id>
    <title>6962c1b7-3705-4ecc-bf8c-599a657e82d4</title>
    <updated>2026-05-06T18:06:38.429028+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://vulnerability.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "6962c1b7-3705-4ecc-bf8c-599a657e82d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-53111", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6962c1b7-3705-4ecc-bf8c-599a657e82d4/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e4baf4ed-8fb7-47bf-8aee-64925b38739f/export</id>
    <title>e4baf4ed-8fb7-47bf-8aee-64925b38739f</title>
    <updated>2026-05-06T18:06:38.426469+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "e4baf4ed-8fb7-47bf-8aee-64925b38739f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-53115", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e4baf4ed-8fb7-47bf-8aee-64925b38739f/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
</feed>
