<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 10:27:30 +0000</lastBuildDate>
    <item>
      <title>065b1a55-d1dd-4c2e-a4ed-0cb9008cf6ec</title>
      <link>https://db.gcve.eu/sighting/065b1a55-d1dd-4c2e-a4ed-0cb9008cf6ec/export</link>
      <description>{"uuid": "065b1a55-d1dd-4c2e-a4ed-0cb9008cf6ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43872", "type": "seen", "source": "https://t.me/cvedetector/3713", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43872 - Linux kernel - RDMA/HNS Soft Lockup Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43872 \nPublished : Aug. 21, 2024, 1:15 a.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nRDMA/hns: Fix soft lockup under heavy CEQE load  \n  \nCEQEs are handled in interrupt handler currently. This may cause the  \nCPU core staying in interrupt context too long and lead to soft lockup  \nunder heavy load.  \n  \nHandle CEQEs in BH workqueue and set an upper limit for the number of  \nCEQE handled by a single call of work handler. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T04:00:40.000000Z"}</description>
      <content:encoded>{"uuid": "065b1a55-d1dd-4c2e-a4ed-0cb9008cf6ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43872", "type": "seen", "source": "https://t.me/cvedetector/3713", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43872 - Linux kernel - RDMA/HNS Soft Lockup Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43872 \nPublished : Aug. 21, 2024, 1:15 a.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nRDMA/hns: Fix soft lockup under heavy CEQE load  \n  \nCEQEs are handled in interrupt handler currently. This may cause the  \nCPU core staying in interrupt context too long and lead to soft lockup  \nunder heavy load.  \n  \nHandle CEQEs in BH workqueue and set an upper limit for the number of  \nCEQE handled by a single call of work handler. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T04:00:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/065b1a55-d1dd-4c2e-a4ed-0cb9008cf6ec/export</guid>
      <pubDate>Wed, 21 Aug 2024 04:00:40 +0000</pubDate>
    </item>
    <item>
      <title>2eca843c-9b7c-4df0-bb9a-5b4f95a38a1a</title>
      <link>https://db.gcve.eu/sighting/2eca843c-9b7c-4df0-bb9a-5b4f95a38a1a/export</link>
      <description>{"uuid": "2eca843c-9b7c-4df0-bb9a-5b4f95a38a1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43872", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "2eca843c-9b7c-4df0-bb9a-5b4f95a38a1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43872", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2eca843c-9b7c-4df0-bb9a-5b4f95a38a1a/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>d508e3c6-b1cd-42b3-9809-765ca79a996a</title>
      <link>https://db.gcve.eu/sighting/d508e3c6-b1cd-42b3-9809-765ca79a996a/export</link>
      <description>{"uuid": "d508e3c6-b1cd-42b3-9809-765ca79a996a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-43872", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "d508e3c6-b1cd-42b3-9809-765ca79a996a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-43872", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d508e3c6-b1cd-42b3-9809-765ca79a996a/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
