<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T03:23:21.249302+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/4cedb471-db88-4331-8e7e-1aee673f8e63/export</id>
    <title>4cedb471-db88-4331-8e7e-1aee673f8e63</title>
    <updated>2026-05-04T03:23:21.660997+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4cedb471-db88-4331-8e7e-1aee673f8e63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-x5mq-jjr3-vmx6", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113861519101056622", "content": "", "creation_timestamp": "2025-01-20T16:01:42.870504Z"}</content>
    <link href="https://db.gcve.eu/sighting/4cedb471-db88-4331-8e7e-1aee673f8e63/export"/>
    <published>2025-01-20T16:01:42.870504+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/41d62d26-8bcb-4be4-afed-6532e138efc6/export</id>
    <title>41d62d26-8bcb-4be4-afed-6532e138efc6</title>
    <updated>2026-05-04T03:23:21.660002+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "41d62d26-8bcb-4be4-afed-6532e138efc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-X5MQ-JJR3-VMX6", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2408", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24013\n\ud83d\udd39 Description: CodeIgniter is a PHP full-stack web framework. Prior to 4.5.8, CodeIgniter lacked proper header validation for its name and value. The potential attacker can construct deliberately malformed headers with Header class. This could disrupt application functionality, potentially causing errors or generating invalid HTTP requests. In some cases, these malformed requests might lead to a DoS scenario if a remote service\u2019s web application firewall interprets them as malicious and blocks further communication with the application. This vulnerability is fixed in 4.5.8.\n\ud83d\udccf Published: 2025-01-20T15:57:37.975Z\n\ud83d\udccf Modified: 2025-01-21T14:51:01.754Z\n\ud83d\udd17 References:\n1. https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-x5mq-jjr3-vmx6\n2. https://github.com/codeigniter4/CodeIgniter4/commit/5f8aa24280fb09947897d6b322bf1f0e038b13b6\n3. https://datatracker.ietf.org/doc/html/rfc7230#section-3.2\n4. https://github.com/advisories/GHSA-wxmh-65f7-jcvw", "creation_timestamp": "2025-01-21T15:00:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/41d62d26-8bcb-4be4-afed-6532e138efc6/export"/>
    <published>2025-01-21T15:00:43+00:00</published>
  </entry>
</feed>
