<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T05:04:11.904551+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/5750d996-2bbf-4d03-b78b-5463ec897763/export</id>
    <title>5750d996-2bbf-4d03-b78b-5463ec897763</title>
    <updated>2026-05-01T05:04:12.139358+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5750d996-2bbf-4d03-b78b-5463ec897763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45289", "type": "seen", "source": "https://t.me/arpsyndicate/4129", "content": "#ExploitObserverAlert\n\nCVE-2023-45289\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-45289. When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-03-07T08:37:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5750d996-2bbf-4d03-b78b-5463ec897763/export"/>
    <published>2024-03-07T08:37:20+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0ce7781a-a759-4d7f-bc9f-a8b1cf6aab4e/export</id>
    <title>0ce7781a-a759-4d7f-bc9f-a8b1cf6aab4e</title>
    <updated>2026-05-01T05:04:12.139302+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0ce7781a-a759-4d7f-bc9f-a8b1cf6aab4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://t.me/arpsyndicate/4385", "content": "#ExploitObserverAlert\n\nCVE-2023-45288\n\nDESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-45288. An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-04-07T22:26:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0ce7781a-a759-4d7f-bc9f-a8b1cf6aab4e/export"/>
    <published>2024-04-07T22:26:02+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c5980e3d-a9c7-45e1-b91d-f0b897cf950f/export</id>
    <title>c5980e3d-a9c7-45e1-b91d-f0b897cf950f</title>
    <updated>2026-05-01T05:04:12.139246+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c5980e3d-a9c7-45e1-b91d-f0b897cf950f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://t.me/arpsyndicate/4415", "content": "#ExploitObserverAlert\n\nCVE-2023-45288\n\nDESCRIPTION: Exploit Observer has 43 entries in 10 file formats related to CVE-2023-45288. An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-04-09T20:26:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c5980e3d-a9c7-45e1-b91d-f0b897cf950f/export"/>
    <published>2024-04-09T20:26:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/202f990d-ed0b-4411-811e-93d9482165f6/export</id>
    <title>202f990d-ed0b-4411-811e-93d9482165f6</title>
    <updated>2026-05-01T05:04:12.139185+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "202f990d-ed0b-4411-811e-93d9482165f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://t.me/arpsyndicate/4574", "content": "#ExploitObserverAlert\n\nCVE-2023-45288\n\nDESCRIPTION: Exploit Observer has 45 entries in 10 file formats related to CVE-2023-45288. An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.\n\nFIRST-EPSS: 0.000450000\nARPS-EXPLOITABILITY: 0.7345311", "creation_timestamp": "2024-04-12T09:16:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/202f990d-ed0b-4411-811e-93d9482165f6/export"/>
    <published>2024-04-12T09:16:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0e86f52b-4aaf-4a6c-865c-36e6f266b564/export</id>
    <title>0e86f52b-4aaf-4a6c-865c-36e6f266b564</title>
    <updated>2026-05-01T05:04:12.139129+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0e86f52b-4aaf-4a6c-865c-36e6f266b564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9362", "content": "Prototype Pollution in NASAs Open MCT CVE-2023-45282\n\nhttps://visionspace.com/prototype-pollution-in-nasas-open-mct-cve-2023-45282/", "creation_timestamp": "2024-11-23T11:40:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0e86f52b-4aaf-4a6c-865c-36e6f266b564/export"/>
    <published>2024-11-23T11:40:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/88a0d247-82ac-450a-a28f-888898596033/export</id>
    <title>88a0d247-82ac-450a-a28f-888898596033</title>
    <updated>2026-05-01T05:04:12.139070+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "88a0d247-82ac-450a-a28f-888898596033", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "published-proof-of-concept", "source": "https://t.me/scorpionisready/942", "content": "Prototype Pollution in NASAs Open MCT CVE-2023-45282\n\nhttps://visionspace.com/prototype-pollution-in-nasas-open-mct-cve-2023-45282/", "creation_timestamp": "2024-11-25T21:18:52.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/88a0d247-82ac-450a-a28f-888898596033/export"/>
    <published>2024-11-25T21:18:52+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0e364f65-e021-468a-9008-ee0fe0749d4f/export</id>
    <title>0e364f65-e021-468a-9008-ee0fe0749d4f</title>
    <updated>2026-05-01T05:04:12.139015+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0e364f65-e021-468a-9008-ee0fe0749d4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113577221793310504", "content": "", "creation_timestamp": "2024-12-01T11:01:11.158129Z"}</content>
    <link href="https://db.gcve.eu/sighting/0e364f65-e021-468a-9008-ee0fe0749d4f/export"/>
    <published>2024-12-01T11:01:11.158129+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/da1e18c1-aee9-409e-a1b5-9f5f1894ae8c/export</id>
    <title>da1e18c1-aee9-409e-a1b5-9f5f1894ae8c</title>
    <updated>2026-05-01T05:04:12.138959+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "da1e18c1-aee9-409e-a1b5-9f5f1894ae8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113650832054100134", "content": "", "creation_timestamp": "2024-12-14T11:01:14.398462Z"}</content>
    <link href="https://db.gcve.eu/sighting/da1e18c1-aee9-409e-a1b5-9f5f1894ae8c/export"/>
    <published>2024-12-14T11:01:14.398462+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/155f93ed-41a9-4051-9316-e3484590cfa7/export</id>
    <title>155f93ed-41a9-4051-9316-e3484590cfa7</title>
    <updated>2026-05-01T05:04:12.138879+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "155f93ed-41a9-4051-9316-e3484590cfa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrvmlum4hc2w", "content": "", "creation_timestamp": "2025-06-18T18:17:21.475893Z"}</content>
    <link href="https://db.gcve.eu/sighting/155f93ed-41a9-4051-9316-e3484590cfa7/export"/>
    <published>2025-06-18T18:17:21.475893+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/285c14a5-546a-4e69-961c-153f65d349f8/export</id>
    <title>285c14a5-546a-4e69-961c-153f65d349f8</title>
    <updated>2026-05-01T05:04:12.133856+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "285c14a5-546a-4e69-961c-153f65d349f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrvufmn5bk2w", "content": "", "creation_timestamp": "2025-06-18T20:37:01.608647Z"}</content>
    <link href="https://db.gcve.eu/sighting/285c14a5-546a-4e69-961c-153f65d349f8/export"/>
    <published>2025-06-18T20:37:01.608647+00:00</published>
  </entry>
</feed>
