<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 04:52:20 +0000</lastBuildDate>
    <item>
      <title>5be22578-2eae-43dd-bf52-804b6921d3aa</title>
      <link>https://vulnerability.circl.lu/sighting/5be22578-2eae-43dd-bf52-804b6921d3aa/export</link>
      <description>{"uuid": "5be22578-2eae-43dd-bf52-804b6921d3aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53118", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14733", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53118\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix a procfs host directory removal regression\n\nscsi_proc_hostdir_rm() decreases a reference counter and hence must only be\ncalled once per host that is removed. This change does not require a\nscsi_add_host_with_dma() change since scsi_add_host_with_dma() will return\n0 (success) if scsi_proc_host_add() is called.\n\ud83d\udccf Published: 2025-05-02T15:55:56.177Z\n\ud83d\udccf Modified: 2025-05-04T07:50:13.085Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/88c3d3bb6469cea929ac68fd326bdcbefcdfdd83\n2. https://git.kernel.org/stable/c/68c665bb185037e7eb66fb792c61da9d7151e99c\n3. https://git.kernel.org/stable/c/2a764d55e938743efa7c2cba7305633bcf227f09\n4. https://git.kernel.org/stable/c/7e0ae8667fcdd99d1756922e1140cac75f5fa279\n5. https://git.kernel.org/stable/c/73f030d4ef6d1ad17f824a0a2eb637ef7a9c7d51\n6. https://git.kernel.org/stable/c/be03df3d4bfe7e8866d4aa43d62e648ffe884f5f", "creation_timestamp": "2025-05-04T08:17:56.000000Z"}</description>
      <content:encoded>{"uuid": "5be22578-2eae-43dd-bf52-804b6921d3aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53118", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14733", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53118\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix a procfs host directory removal regression\n\nscsi_proc_hostdir_rm() decreases a reference counter and hence must only be\ncalled once per host that is removed. This change does not require a\nscsi_add_host_with_dma() change since scsi_add_host_with_dma() will return\n0 (success) if scsi_proc_host_add() is called.\n\ud83d\udccf Published: 2025-05-02T15:55:56.177Z\n\ud83d\udccf Modified: 2025-05-04T07:50:13.085Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/88c3d3bb6469cea929ac68fd326bdcbefcdfdd83\n2. https://git.kernel.org/stable/c/68c665bb185037e7eb66fb792c61da9d7151e99c\n3. https://git.kernel.org/stable/c/2a764d55e938743efa7c2cba7305633bcf227f09\n4. https://git.kernel.org/stable/c/7e0ae8667fcdd99d1756922e1140cac75f5fa279\n5. https://git.kernel.org/stable/c/73f030d4ef6d1ad17f824a0a2eb637ef7a9c7d51\n6. https://git.kernel.org/stable/c/be03df3d4bfe7e8866d4aa43d62e648ffe884f5f", "creation_timestamp": "2025-05-04T08:17:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5be22578-2eae-43dd-bf52-804b6921d3aa/export</guid>
      <pubDate>Sun, 04 May 2025 08:17:56 +0000</pubDate>
    </item>
    <item>
      <title>6212aae7-110d-4820-9463-fbc948c75614</title>
      <link>https://vulnerability.circl.lu/sighting/6212aae7-110d-4820-9463-fbc948c75614/export</link>
      <description>{"uuid": "6212aae7-110d-4820-9463-fbc948c75614", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53117", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14734", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53117\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nfs: prevent out-of-bounds array speculation when closing a file descriptor\n\nGoogle-Bug-Id: 114199369\n\ud83d\udccf Published: 2025-05-02T15:55:55.512Z\n\ud83d\udccf Modified: 2025-05-04T07:50:11.802Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b\n2. https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69\n3. https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf\n4. https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830\n5. https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315\n6. https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06\n7. https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a\n8. https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4", "creation_timestamp": "2025-05-04T08:17:57.000000Z"}</description>
      <content:encoded>{"uuid": "6212aae7-110d-4820-9463-fbc948c75614", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53117", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14734", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53117\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nfs: prevent out-of-bounds array speculation when closing a file descriptor\n\nGoogle-Bug-Id: 114199369\n\ud83d\udccf Published: 2025-05-02T15:55:55.512Z\n\ud83d\udccf Modified: 2025-05-04T07:50:11.802Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b\n2. https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69\n3. https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf\n4. https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830\n5. https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315\n6. https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06\n7. https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a\n8. https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4", "creation_timestamp": "2025-05-04T08:17:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6212aae7-110d-4820-9463-fbc948c75614/export</guid>
      <pubDate>Sun, 04 May 2025 08:17:57 +0000</pubDate>
    </item>
    <item>
      <title>ca6078cc-ce34-4668-871f-97f7a128c36b</title>
      <link>https://vulnerability.circl.lu/sighting/ca6078cc-ce34-4668-871f-97f7a128c36b/export</link>
      <description>{"uuid": "ca6078cc-ce34-4668-871f-97f7a128c36b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53116", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14735", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53116\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: avoid potential UAF in nvmet_req_complete()\n\nAn nvme target -&amp;gt;queue_response() operation implementation may free the\nrequest passed as argument. Such implementation potentially could result\nin a use after free of the request pointer when percpu_ref_put() is\ncalled in nvmet_req_complete().\n\nAvoid such problem by using a local variable to save the sq pointer\nbefore calling __nvmet_req_complete(), thus avoiding dereferencing the\nreq pointer after that function call.\n\ud83d\udccf Published: 2025-05-02T15:55:54.858Z\n\ud83d\udccf Modified: 2025-05-04T07:50:10.667Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e5d99b29012bbf0e86929403209723b2806500c1\n2. https://git.kernel.org/stable/c/fafcb4b26393870c45462f9af6a48e581dbbcf7e\n3. https://git.kernel.org/stable/c/04c394208831d5e0d5cfee46722eb0f033cd4083\n4. https://git.kernel.org/stable/c/a6317235da8aa7cb97529ebc8121cc2a4c4c437a\n5. https://git.kernel.org/stable/c/f1d5888a5efe345b63c430b256e95acb0a475642\n6. https://git.kernel.org/stable/c/bcd535f07c58342302a2cd2bdd8894fe0872c8a9\n7. https://git.kernel.org/stable/c/8ed9813871038b25a934b21ab76b5b7dbf44fc3a\n8. https://git.kernel.org/stable/c/6173a77b7e9d3e202bdb9897b23f2a8afe7bf286", "creation_timestamp": "2025-05-04T08:17:58.000000Z"}</description>
      <content:encoded>{"uuid": "ca6078cc-ce34-4668-871f-97f7a128c36b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53116", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14735", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53116\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: avoid potential UAF in nvmet_req_complete()\n\nAn nvme target -&amp;gt;queue_response() operation implementation may free the\nrequest passed as argument. Such implementation potentially could result\nin a use after free of the request pointer when percpu_ref_put() is\ncalled in nvmet_req_complete().\n\nAvoid such problem by using a local variable to save the sq pointer\nbefore calling __nvmet_req_complete(), thus avoiding dereferencing the\nreq pointer after that function call.\n\ud83d\udccf Published: 2025-05-02T15:55:54.858Z\n\ud83d\udccf Modified: 2025-05-04T07:50:10.667Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e5d99b29012bbf0e86929403209723b2806500c1\n2. https://git.kernel.org/stable/c/fafcb4b26393870c45462f9af6a48e581dbbcf7e\n3. https://git.kernel.org/stable/c/04c394208831d5e0d5cfee46722eb0f033cd4083\n4. https://git.kernel.org/stable/c/a6317235da8aa7cb97529ebc8121cc2a4c4c437a\n5. https://git.kernel.org/stable/c/f1d5888a5efe345b63c430b256e95acb0a475642\n6. https://git.kernel.org/stable/c/bcd535f07c58342302a2cd2bdd8894fe0872c8a9\n7. https://git.kernel.org/stable/c/8ed9813871038b25a934b21ab76b5b7dbf44fc3a\n8. https://git.kernel.org/stable/c/6173a77b7e9d3e202bdb9897b23f2a8afe7bf286", "creation_timestamp": "2025-05-04T08:17:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ca6078cc-ce34-4668-871f-97f7a128c36b/export</guid>
      <pubDate>Sun, 04 May 2025 08:17:58 +0000</pubDate>
    </item>
    <item>
      <title>ed3fca06-1299-45f9-b53e-484b234ff797</title>
      <link>https://vulnerability.circl.lu/sighting/ed3fca06-1299-45f9-b53e-484b234ff797/export</link>
      <description>{"uuid": "ed3fca06-1299-45f9-b53e-484b234ff797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53115", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14736", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53115\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Fix memory leaks in mpi3mr_init_ioc()\n\nDon't allocate memory again when IOC is being reinitialized.\n\ud83d\udccf Published: 2025-05-02T15:55:54.148Z\n\ud83d\udccf Modified: 2025-05-04T07:50:09.375Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/5aab9342f12f980b64617a034d121efbbf09100a\n2. https://git.kernel.org/stable/c/7277b4eec2f25a0653646ba95b1f25fa16be1d6c\n3. https://git.kernel.org/stable/c/c798304470cab88723d895726d17fcb96472e0e9", "creation_timestamp": "2025-05-04T08:17:59.000000Z"}</description>
      <content:encoded>{"uuid": "ed3fca06-1299-45f9-b53e-484b234ff797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53115", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14736", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53115\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Fix memory leaks in mpi3mr_init_ioc()\n\nDon't allocate memory again when IOC is being reinitialized.\n\ud83d\udccf Published: 2025-05-02T15:55:54.148Z\n\ud83d\udccf Modified: 2025-05-04T07:50:09.375Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/5aab9342f12f980b64617a034d121efbbf09100a\n2. https://git.kernel.org/stable/c/7277b4eec2f25a0653646ba95b1f25fa16be1d6c\n3. https://git.kernel.org/stable/c/c798304470cab88723d895726d17fcb96472e0e9", "creation_timestamp": "2025-05-04T08:17:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ed3fca06-1299-45f9-b53e-484b234ff797/export</guid>
      <pubDate>Sun, 04 May 2025 08:17:59 +0000</pubDate>
    </item>
    <item>
      <title>6962c1b7-3705-4ecc-bf8c-599a657e82d4</title>
      <link>https://vulnerability.circl.lu/sighting/6962c1b7-3705-4ecc-bf8c-599a657e82d4/export</link>
      <description>{"uuid": "6962c1b7-3705-4ecc-bf8c-599a657e82d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-53111", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "6962c1b7-3705-4ecc-bf8c-599a657e82d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-53111", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6962c1b7-3705-4ecc-bf8c-599a657e82d4/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>e4baf4ed-8fb7-47bf-8aee-64925b38739f</title>
      <link>https://vulnerability.circl.lu/sighting/e4baf4ed-8fb7-47bf-8aee-64925b38739f/export</link>
      <description>{"uuid": "e4baf4ed-8fb7-47bf-8aee-64925b38739f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-53115", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "e4baf4ed-8fb7-47bf-8aee-64925b38739f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-53115", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e4baf4ed-8fb7-47bf-8aee-64925b38739f/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
