<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 21 May 2026 12:31:00 +0000</lastBuildDate>
    <item>
      <title>1af11ae8-a007-4567-a210-12d31784be6e</title>
      <link>https://db.gcve.eu/sighting/1af11ae8-a007-4567-a210-12d31784be6e/export</link>
      <description>{"uuid": "1af11ae8-a007-4567-a210-12d31784be6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56709", "type": "seen", "source": "https://t.me/cvedetector/13871", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56709 - \"Linux Kernel io_uring Task Work \u2013 Deadlock Prevention\"\", \n  \"Content\": \"CVE ID : CVE-2024-56709 \nPublished : Dec. 29, 2024, 9:15 a.m. | 24\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nio_uring: check if iowq is killed before queuing  \n  \ntask work can be executed after the task has gone through io_uring  \ntermination, whether it's the final task_work run or the fallback path.  \nIn this case, task work will find -&amp;gt;io_wq being already killed and  \nnull'ed, which is a problem if it then tries to forward the request to  \nio_queue_iowq(). Make io_queue_iowq() fail requests in this case.  \n  \nNote that it also checks PF_KTHREAD, because the user can first close  \na DEFER_TASKRUN ring and shortly after kill the task, in which case  \n-&amp;gt;iowq check would race. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T10:41:23.000000Z"}</description>
      <content:encoded>{"uuid": "1af11ae8-a007-4567-a210-12d31784be6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56709", "type": "seen", "source": "https://t.me/cvedetector/13871", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56709 - \"Linux Kernel io_uring Task Work \u2013 Deadlock Prevention\"\", \n  \"Content\": \"CVE ID : CVE-2024-56709 \nPublished : Dec. 29, 2024, 9:15 a.m. | 24\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nio_uring: check if iowq is killed before queuing  \n  \ntask work can be executed after the task has gone through io_uring  \ntermination, whether it's the final task_work run or the fallback path.  \nIn this case, task work will find -&amp;gt;io_wq being already killed and  \nnull'ed, which is a problem if it then tries to forward the request to  \nio_queue_iowq(). Make io_queue_iowq() fail requests in this case.  \n  \nNote that it also checks PF_KTHREAD, because the user can first close  \na DEFER_TASKRUN ring and shortly after kill the task, in which case  \n-&amp;gt;iowq check would race. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T10:41:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1af11ae8-a007-4567-a210-12d31784be6e/export</guid>
      <pubDate>Sun, 29 Dec 2024 10:41:23 +0000</pubDate>
    </item>
    <item>
      <title>7c69918f-7544-4690-b152-986b313868cf</title>
      <link>https://db.gcve.eu/sighting/7c69918f-7544-4690-b152-986b313868cf/export</link>
      <description>{"uuid": "7c69918f-7544-4690-b152-986b313868cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56705", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "7c69918f-7544-4690-b152-986b313868cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56705", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7c69918f-7544-4690-b152-986b313868cf/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>cc0bc6e7-8b9f-479d-a2df-e8795511d0c1</title>
      <link>https://db.gcve.eu/sighting/cc0bc6e7-8b9f-479d-a2df-e8795511d0c1/export</link>
      <description>{"uuid": "cc0bc6e7-8b9f-479d-a2df-e8795511d0c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56701", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "cc0bc6e7-8b9f-479d-a2df-e8795511d0c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56701", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cc0bc6e7-8b9f-479d-a2df-e8795511d0c1/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>b21b5e99-f91d-4e87-afb5-95d08e32d7ac</title>
      <link>https://db.gcve.eu/sighting/b21b5e99-f91d-4e87-afb5-95d08e32d7ac/export</link>
      <description>{"uuid": "b21b5e99-f91d-4e87-afb5-95d08e32d7ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56700", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "b21b5e99-f91d-4e87-afb5-95d08e32d7ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56700", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b21b5e99-f91d-4e87-afb5-95d08e32d7ac/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>94a223aa-8943-458c-9f8c-11f2f32fd5ad</title>
      <link>https://db.gcve.eu/sighting/94a223aa-8943-458c-9f8c-11f2f32fd5ad/export</link>
      <description>{"uuid": "94a223aa-8943-458c-9f8c-11f2f32fd5ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56704", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "94a223aa-8943-458c-9f8c-11f2f32fd5ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56704", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/94a223aa-8943-458c-9f8c-11f2f32fd5ad/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>24e0c7e4-7ad6-40f6-9234-dd9ed080244d</title>
      <link>https://db.gcve.eu/sighting/24e0c7e4-7ad6-40f6-9234-dd9ed080244d/export</link>
      <description>{"uuid": "24e0c7e4-7ad6-40f6-9234-dd9ed080244d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56701", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "24e0c7e4-7ad6-40f6-9234-dd9ed080244d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56701", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/24e0c7e4-7ad6-40f6-9234-dd9ed080244d/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>7e70c095-7ac3-40c2-afde-e5597a1a00a6</title>
      <link>https://db.gcve.eu/sighting/7e70c095-7ac3-40c2-afde-e5597a1a00a6/export</link>
      <description>{"uuid": "7e70c095-7ac3-40c2-afde-e5597a1a00a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56703", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "7e70c095-7ac3-40c2-afde-e5597a1a00a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56703", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7e70c095-7ac3-40c2-afde-e5597a1a00a6/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>303c118f-828b-451b-8abc-235db799fd1a</title>
      <link>https://db.gcve.eu/sighting/303c118f-828b-451b-8abc-235db799fd1a/export</link>
      <description>{"uuid": "303c118f-828b-451b-8abc-235db799fd1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-56703", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "303c118f-828b-451b-8abc-235db799fd1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-56703", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/303c118f-828b-451b-8abc-235db799fd1a/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>ea258edf-3b5d-4559-87b0-72d3d6b603e6</title>
      <link>https://db.gcve.eu/sighting/ea258edf-3b5d-4559-87b0-72d3d6b603e6/export</link>
      <description>{"uuid": "ea258edf-3b5d-4559-87b0-72d3d6b603e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-56709", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "ea258edf-3b5d-4559-87b0-72d3d6b603e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-56709", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ea258edf-3b5d-4559-87b0-72d3d6b603e6/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>c35d6e93-792c-4fab-81f8-e2b5d5ec3d77</title>
      <link>https://db.gcve.eu/sighting/c35d6e93-792c-4fab-81f8-e2b5d5ec3d77/export</link>
      <description>{"uuid": "c35d6e93-792c-4fab-81f8-e2b5d5ec3d77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-56707", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "c35d6e93-792c-4fab-81f8-e2b5d5ec3d77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-56707", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c35d6e93-792c-4fab-81f8-e2b5d5ec3d77/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
