<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 11:22:03 +0000</lastBuildDate>
    <item>
      <title>c0b98874-bdcd-4d86-905a-a2f7d2218bf2</title>
      <link>https://vulnerability.circl.lu/sighting/c0b98874-bdcd-4d86-905a-a2f7d2218bf2/export</link>
      <description>{"uuid": "c0b98874-bdcd-4d86-905a-a2f7d2218bf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50131", "type": "seen", "source": "https://t.me/cvedetector/9929", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50131 - \"Linux Kernel Tracing Buffer Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-50131 \nPublished : Nov. 5, 2024, 6:15 p.m. | 22\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ntracing: Consider the NULL character when validating the event length  \n  \nstrlen() returns a string length excluding the null byte. If the string  \nlength equals to the maximum buffer length, the buffer will have no  \nspace for the NULL terminating character.  \n  \nThis commit checks this condition and returns failure for it. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T19:44:35.000000Z"}</description>
      <content:encoded>{"uuid": "c0b98874-bdcd-4d86-905a-a2f7d2218bf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50131", "type": "seen", "source": "https://t.me/cvedetector/9929", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50131 - \"Linux Kernel Tracing Buffer Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-50131 \nPublished : Nov. 5, 2024, 6:15 p.m. | 22\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ntracing: Consider the NULL character when validating the event length  \n  \nstrlen() returns a string length excluding the null byte. If the string  \nlength equals to the maximum buffer length, the buffer will have no  \nspace for the NULL terminating character.  \n  \nThis commit checks this condition and returns failure for it. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T19:44:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c0b98874-bdcd-4d86-905a-a2f7d2218bf2/export</guid>
      <pubDate>Tue, 05 Nov 2024 19:44:35 +0000</pubDate>
    </item>
  </channel>
</rss>
