<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 22:44:45 +0000</lastBuildDate>
    <item>
      <title>ae47833b-090e-42a9-8a57-be65fdb117a9</title>
      <link>https://vulnerability.circl.lu/sighting/ae47833b-090e-42a9-8a57-be65fdb117a9/export</link>
      <description>{"uuid": "ae47833b-090e-42a9-8a57-be65fdb117a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-49919", "type": "seen", "source": "https://t.me/cvedetector/24244", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-49919 - Netfilter NF Tables Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-49919 \nPublished : May 1, 2025, 3:16 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnetfilter: nf_tables: release flow rule object from commit path  \n  \nNo need to postpone this to the commit release path, since no packets  \nare walking over this object, this is accessed from control plane only.  \nThis helped uncovered UAF triggered by races with the netlink notifier. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T19:01:35.000000Z"}</description>
      <content:encoded>{"uuid": "ae47833b-090e-42a9-8a57-be65fdb117a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-49919", "type": "seen", "source": "https://t.me/cvedetector/24244", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-49919 - Netfilter NF Tables Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-49919 \nPublished : May 1, 2025, 3:16 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnetfilter: nf_tables: release flow rule object from commit path  \n  \nNo need to postpone this to the commit release path, since no packets  \nare walking over this object, this is accessed from control plane only.  \nThis helped uncovered UAF triggered by races with the netlink notifier. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T19:01:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ae47833b-090e-42a9-8a57-be65fdb117a9/export</guid>
      <pubDate>Thu, 01 May 2025 19:01:35 +0000</pubDate>
    </item>
  </channel>
</rss>
