<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T10:52:49.843490+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/4029d234-d9f2-426c-bba9-4535d4466047/export</id>
    <title>4029d234-d9f2-426c-bba9-4535d4466047</title>
    <updated>2026-05-06T10:52:50.068382+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4029d234-d9f2-426c-bba9-4535d4466047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49971", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1940", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49971\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Increase array size of dummy_boolean\n\n[WHY]\ndml2_core_shared_mode_support and dml_core_mode_support access the third\nelement of dummy_boolean, i.e. hw_debug5 = &amp;amp;s-&amp;gt;dummy_boolean[2], when\ndummy_boolean has size of 2. Any assignment to hw_debug5 causes an\nOVERRUN.\n\n[HOW]\nIncrease dummy_boolean's array size to 3.\n\nThis fixes 2 OVERRUN issues reported by Coverity.\n\ud83d\udccf Published: 2024-10-21T18:02:20.344Z\n\ud83d\udccf Modified: 2025-01-16T11:53:24.847Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e9e48b7bb9cf3b78f0305ef0144aaf61da0a83d8\n2. https://git.kernel.org/stable/c/6d64d39486197083497a01b39e23f2f8474b35d3", "creation_timestamp": "2025-01-16T12:55:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4029d234-d9f2-426c-bba9-4535d4466047/export"/>
    <published>2025-01-16T12:55:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/baf21220-0c52-437b-b232-6c7c4c9e3691/export</id>
    <title>baf21220-0c52-437b-b232-6c7c4c9e3691</title>
    <updated>2026-05-06T10:52:50.068316+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "baf21220-0c52-437b-b232-6c7c4c9e3691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49974", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16649", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49974\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Limit the number of concurrent async COPY operations\n\nNothing appears to limit the number of concurrent async COPY\noperations that clients can start. In addition, AFAICT each async\nCOPY can copy an unlimited number of 4MB chunks, so can run for a\nlong time. Thus IMO async COPY can become a DoS vector.\n\nAdd a restriction mechanism that bounds the number of concurrent\nbackground COPY operations. Start simple and try to be fair -- this\npatch implements a per-namespace limit.\n\nAn async COPY request that occurs while this limit is exceeded gets\nNFS4ERR_DELAY. The requesting client can choose to send the request\nagain after a delay or fall back to a traditional read/write style\ncopy.\n\nIf there is need to make the mechanism more sophisticated, we can\nvisit that in future patches.\n\ud83d\udccf Published: 2024-10-21T18:02:22.392Z\n\ud83d\udccf Modified: 2025-05-16T07:25:07.039Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/9e52ff544e0bfa09ee339fd7b0937ee3c080c24e\n2. https://git.kernel.org/stable/c/43e46ee5efc03990b223f7aa8b77aa9c3d3acfdf\n3. https://git.kernel.org/stable/c/7ea9260874b779637aff6d24c344b8ef4ac862a0\n4. https://git.kernel.org/stable/c/ae267989b7b7933dfedcd26468d0a88fc3a9da9e\n5. https://git.kernel.org/stable/c/b4e21431a0db4854b5023cd5af001be557e6c3db\n6. https://git.kernel.org/stable/c/6a488ad7745b8f64625c6d3a24ce7e448e83f11b\n7. https://git.kernel.org/stable/c/aadc3bbea163b6caaaebfdd2b6c4667fbc726752", "creation_timestamp": "2025-05-16T07:34:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/baf21220-0c52-437b-b232-6c7c4c9e3691/export"/>
    <published>2025-05-16T07:34:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/315b0e79-0813-47c5-b410-cbc6ebc88558/export</id>
    <title>315b0e79-0813-47c5-b410-cbc6ebc88558</title>
    <updated>2026-05-06T10:52:50.068265+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "315b0e79-0813-47c5-b410-cbc6ebc88558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49975", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/315b0e79-0813-47c5-b410-cbc6ebc88558/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/284bd400-6fe9-4470-9cde-2eb632f8e256/export</id>
    <title>284bd400-6fe9-4470-9cde-2eb632f8e256</title>
    <updated>2026-05-06T10:52:50.068216+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "284bd400-6fe9-4470-9cde-2eb632f8e256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49973", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/284bd400-6fe9-4470-9cde-2eb632f8e256/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4f49680d-80f5-4fdd-b5d4-3b356e34357d/export</id>
    <title>4f49680d-80f5-4fdd-b5d4-3b356e34357d</title>
    <updated>2026-05-06T10:52:50.068158+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4f49680d-80f5-4fdd-b5d4-3b356e34357d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49971", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4f49680d-80f5-4fdd-b5d4-3b356e34357d/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4ba62262-ad12-408e-8c09-9c5d14ae8e4d/export</id>
    <title>4ba62262-ad12-408e-8c09-9c5d14ae8e4d</title>
    <updated>2026-05-06T10:52:50.068099+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4ba62262-ad12-408e-8c09-9c5d14ae8e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49977", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4ba62262-ad12-408e-8c09-9c5d14ae8e4d/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4e72ca1c-1b3d-4bb8-ae32-1bc606c65db5/export</id>
    <title>4e72ca1c-1b3d-4bb8-ae32-1bc606c65db5</title>
    <updated>2026-05-06T10:52:50.068039+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4e72ca1c-1b3d-4bb8-ae32-1bc606c65db5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49974", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://db.gcve.eu/sighting/4e72ca1c-1b3d-4bb8-ae32-1bc606c65db5/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e4accc2e-153b-44b0-baea-138e3dc4e1b5/export</id>
    <title>e4accc2e-153b-44b0-baea-138e3dc4e1b5</title>
    <updated>2026-05-06T10:52:50.067557+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e4accc2e-153b-44b0-baea-138e3dc4e1b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49970", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://db.gcve.eu/sighting/e4accc2e-153b-44b0-baea-138e3dc4e1b5/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8f7a747b-1ddb-4116-8e61-a82efb18fb8d/export</id>
    <title>8f7a747b-1ddb-4116-8e61-a82efb18fb8d</title>
    <updated>2026-05-06T10:52:50.067483+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "8f7a747b-1ddb-4116-8e61-a82efb18fb8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-49978", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8f7a747b-1ddb-4116-8e61-a82efb18fb8d/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a5e7d57c-4460-4e8f-a76c-ba50821f8e35/export</id>
    <title>a5e7d57c-4460-4e8f-a76c-ba50821f8e35</title>
    <updated>2026-05-06T10:52:50.065508+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "a5e7d57c-4460-4e8f-a76c-ba50821f8e35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-49970", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a5e7d57c-4460-4e8f-a76c-ba50821f8e35/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
</feed>
