<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 10:54:21 +0000</lastBuildDate>
    <item>
      <title>c59759ab-2615-4e85-ab0e-c1db4784441d</title>
      <link>https://vulnerability.circl.lu/sighting/c59759ab-2615-4e85-ab0e-c1db4784441d/export</link>
      <description>{"uuid": "c59759ab-2615-4e85-ab0e-c1db4784441d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50012", "type": "seen", "source": "https://t.me/cvedetector/8535", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50012 - Linux Kernel cpufreq Unknown Hardware Node Reference Count Double Free\", \n  \"Content\": \"CVE ID : CVE-2024-50012 \nPublished : Oct. 21, 2024, 7:15 p.m. | 34\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ncpufreq: Avoid a bad reference count on CPU node  \n  \nIn the parse_perf_domain function, if the call to  \nof_parse_phandle_with_args returns an error, then the reference to the  \nCPU device node that was acquired at the start of the function would not  \nbe properly decremented.  \n  \nAddress this by declaring the variable with the __free(device_node)  \ncleanup attribute. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T21:52:38.000000Z"}</description>
      <content:encoded>{"uuid": "c59759ab-2615-4e85-ab0e-c1db4784441d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50012", "type": "seen", "source": "https://t.me/cvedetector/8535", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50012 - Linux Kernel cpufreq Unknown Hardware Node Reference Count Double Free\", \n  \"Content\": \"CVE ID : CVE-2024-50012 \nPublished : Oct. 21, 2024, 7:15 p.m. | 34\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ncpufreq: Avoid a bad reference count on CPU node  \n  \nIn the parse_perf_domain function, if the call to  \nof_parse_phandle_with_args returns an error, then the reference to the  \nCPU device node that was acquired at the start of the function would not  \nbe properly decremented.  \n  \nAddress this by declaring the variable with the __free(device_node)  \ncleanup attribute. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T21:52:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c59759ab-2615-4e85-ab0e-c1db4784441d/export</guid>
      <pubDate>Mon, 21 Oct 2024 21:52:38 +0000</pubDate>
    </item>
    <item>
      <title>a165c155-0264-4d7a-831f-c90a7f60e49a</title>
      <link>https://vulnerability.circl.lu/sighting/a165c155-0264-4d7a-831f-c90a7f60e49a/export</link>
      <description>{"uuid": "a165c155-0264-4d7a-831f-c90a7f60e49a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-50012", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "a165c155-0264-4d7a-831f-c90a7f60e49a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-50012", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a165c155-0264-4d7a-831f-c90a7f60e49a/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
