<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T00:10:38.237714+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c59759ab-2615-4e85-ab0e-c1db4784441d/export</id>
    <title>c59759ab-2615-4e85-ab0e-c1db4784441d</title>
    <updated>2026-05-10T00:10:38.633163+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c59759ab-2615-4e85-ab0e-c1db4784441d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50012", "type": "seen", "source": "https://t.me/cvedetector/8535", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50012 - Linux Kernel cpufreq Unknown Hardware Node Reference Count Double Free\", \n  \"Content\": \"CVE ID : CVE-2024-50012 \nPublished : Oct. 21, 2024, 7:15 p.m. | 34\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ncpufreq: Avoid a bad reference count on CPU node  \n  \nIn the parse_perf_domain function, if the call to  \nof_parse_phandle_with_args returns an error, then the reference to the  \nCPU device node that was acquired at the start of the function would not  \nbe properly decremented.  \n  \nAddress this by declaring the variable with the __free(device_node)  \ncleanup attribute. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T21:52:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c59759ab-2615-4e85-ab0e-c1db4784441d/export"/>
    <published>2024-10-21T21:52:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a165c155-0264-4d7a-831f-c90a7f60e49a/export</id>
    <title>a165c155-0264-4d7a-831f-c90a7f60e49a</title>
    <updated>2026-05-10T00:10:38.630712+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "a165c155-0264-4d7a-831f-c90a7f60e49a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-50012", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a165c155-0264-4d7a-831f-c90a7f60e49a/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
</feed>
