<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T10:27:30.409534+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/065b1a55-d1dd-4c2e-a4ed-0cb9008cf6ec/export</id>
    <title>065b1a55-d1dd-4c2e-a4ed-0cb9008cf6ec</title>
    <updated>2026-05-09T10:27:30.835908+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "065b1a55-d1dd-4c2e-a4ed-0cb9008cf6ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43872", "type": "seen", "source": "https://t.me/cvedetector/3713", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43872 - Linux kernel - RDMA/HNS Soft Lockup Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43872 \nPublished : Aug. 21, 2024, 1:15 a.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nRDMA/hns: Fix soft lockup under heavy CEQE load  \n  \nCEQEs are handled in interrupt handler currently. This may cause the  \nCPU core staying in interrupt context too long and lead to soft lockup  \nunder heavy load.  \n  \nHandle CEQEs in BH workqueue and set an upper limit for the number of  \nCEQE handled by a single call of work handler. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T04:00:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/065b1a55-d1dd-4c2e-a4ed-0cb9008cf6ec/export"/>
    <published>2024-08-21T04:00:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2eca843c-9b7c-4df0-bb9a-5b4f95a38a1a/export</id>
    <title>2eca843c-9b7c-4df0-bb9a-5b4f95a38a1a</title>
    <updated>2026-05-09T10:27:30.834352+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2eca843c-9b7c-4df0-bb9a-5b4f95a38a1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43872", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://db.gcve.eu/sighting/2eca843c-9b7c-4df0-bb9a-5b4f95a38a1a/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d508e3c6-b1cd-42b3-9809-765ca79a996a/export</id>
    <title>d508e3c6-b1cd-42b3-9809-765ca79a996a</title>
    <updated>2026-05-09T10:27:30.832227+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "d508e3c6-b1cd-42b3-9809-765ca79a996a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-43872", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d508e3c6-b1cd-42b3-9809-765ca79a996a/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
</feed>
