<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T15:54:42.327476+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e79cb41d-c2ad-411b-872e-8f15bc6be288/export</id>
    <title>e79cb41d-c2ad-411b-872e-8f15bc6be288</title>
    <updated>2026-05-04T15:54:42.553208+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e79cb41d-c2ad-411b-872e-8f15bc6be288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56659", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113725888571599763", "content": "", "creation_timestamp": "2024-12-27T17:09:05.520992Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e79cb41d-c2ad-411b-872e-8f15bc6be288/export"/>
    <published>2024-12-27T17:09:05.520992+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9422f6a5-8cd2-4686-b4ee-a0dd35d43f7a/export</id>
    <title>9422f6a5-8cd2-4686-b4ee-a0dd35d43f7a</title>
    <updated>2026-05-04T15:54:42.553138+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9422f6a5-8cd2-4686-b4ee-a0dd35d43f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56652", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113725941584643019", "content": "", "creation_timestamp": "2024-12-27T17:22:33.961040Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9422f6a5-8cd2-4686-b4ee-a0dd35d43f7a/export"/>
    <published>2024-12-27T17:22:33.961040+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2c02feef-3870-48e4-a823-de8aec57f62b/export</id>
    <title>2c02feef-3870-48e4-a823-de8aec57f62b</title>
    <updated>2026-05-04T15:54:42.553054+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2c02feef-3870-48e4-a823-de8aec57f62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5665", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/168", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-ppp3-73jm-5rm6\n\ud83d\udd17 Aliases: CVE-2024-56675\n\ud83d\udd39 Details: In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors\n\nUprobes always use bpf_prog_run_array_uprobe() under tasks-trace-RCU\nprotection. But it is possible to attach a non-sleepable BPF program to a\nuprobe, and non-sleepable BPF programs are freed via normal RCU (see\n__bpf_prog_put_noref()). This leads to UAF of the bpf_prog because a normal\nRCU grace period does not imply a tasks-trace-RCU grace period.\n\nFix it by explicitly waiting for a tasks-trace-RCU grace period after\nremoving the attachment of a bpf_prog to a perf_event.\n\ud83d\udd22 Severity: CVSS_V3: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T15:30:59Z\n\ud83d\uddd3\ufe0f Published: 2024-12-27T15:31:56Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-416\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-5665\n2. https://git.kernel.org/stable/c/9245459a992d22fe0e92e988f49db1fec82c184a\n3. https://git.kernel.org/stable/c/9b53d2c2a38a1effc341d99be3f99faef104d\n4. https://git.kernel.org/stable/c/ef1b808e3bc98612feceedf985c2fbbeb28f956\n5. https://git.kernel.org/stable/c/f9f85df30118f3f411261e6682fc60ebcce23e5", "creation_timestamp": "2025-01-06T15:37:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2c02feef-3870-48e4-a823-de8aec57f62b/export"/>
    <published>2025-01-06T15:37:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ee621cf4-73e5-4fa6-90ca-371fcc0d8828/export</id>
    <title>ee621cf4-73e5-4fa6-90ca-371fcc0d8828</title>
    <updated>2026-05-04T15:54:42.552978+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ee621cf4-73e5-4fa6-90ca-371fcc0d8828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56658", "type": "seen", "source": "https://gist.github.com/webmutation/894dd1a9a17615b7469198bb18bc3a16", "content": "", "creation_timestamp": "2025-04-12T00:10:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ee621cf4-73e5-4fa6-90ca-371fcc0d8828/export"/>
    <published>2025-04-12T00:10:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/396d91d3-51a7-43de-b3d9-5b0e79e29e69/export</id>
    <title>396d91d3-51a7-43de-b3d9-5b0e79e29e69</title>
    <updated>2026-05-04T15:54:42.552904+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "396d91d3-51a7-43de-b3d9-5b0e79e29e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56650", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/396d91d3-51a7-43de-b3d9-5b0e79e29e69/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/08ad3d1e-9dfa-412d-9e92-bd01d6047440/export</id>
    <title>08ad3d1e-9dfa-412d-9e92-bd01d6047440</title>
    <updated>2026-05-04T15:54:42.552811+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "08ad3d1e-9dfa-412d-9e92-bd01d6047440", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56659", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/08ad3d1e-9dfa-412d-9e92-bd01d6047440/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4d285dbd-d881-481a-afef-362486be3e9f/export</id>
    <title>4d285dbd-d881-481a-afef-362486be3e9f</title>
    <updated>2026-05-04T15:54:42.552119+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4d285dbd-d881-481a-afef-362486be3e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56658", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lwhluqui2w2q", "content": "", "creation_timestamp": "2025-08-15T19:33:05.565807Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4d285dbd-d881-481a-afef-362486be3e9f/export"/>
    <published>2025-08-15T19:33:05.565807+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c2068762-3793-4f3c-a15c-7f2832024cb7/export</id>
    <title>c2068762-3793-4f3c-a15c-7f2832024cb7</title>
    <updated>2026-05-04T15:54:42.552026+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://vulnerability.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "c2068762-3793-4f3c-a15c-7f2832024cb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-56651", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c2068762-3793-4f3c-a15c-7f2832024cb7/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2d0dae7f-4b97-48e7-b863-dcbc5c5c7810/export</id>
    <title>2d0dae7f-4b97-48e7-b863-dcbc5c5c7810</title>
    <updated>2026-05-04T15:54:42.550485+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://vulnerability.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "2d0dae7f-4b97-48e7-b863-dcbc5c5c7810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-56658", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2d0dae7f-4b97-48e7-b863-dcbc5c5c7810/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/589b531a-2263-4ac6-9032-3c2f5919c2cc/export</id>
    <title>589b531a-2263-4ac6-9032-3c2f5919c2cc</title>
    <updated>2026-05-04T15:54:42.548011+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "589b531a-2263-4ac6-9032-3c2f5919c2cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-56657", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/589b531a-2263-4ac6-9032-3c2f5919c2cc/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
</feed>
