<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 12 May 2026 23:50:19 +0000</lastBuildDate>
    <item>
      <title>bec021b9-3bcc-4c70-b032-940fa348b18e</title>
      <link>https://db.gcve.eu/sighting/bec021b9-3bcc-4c70-b032-940fa348b18e/export</link>
      <description>{"uuid": "bec021b9-3bcc-4c70-b032-940fa348b18e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-4971", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/1777", "content": "CVE-2017-4971: Remote Code Execution Vulnerability In The Spring Web Flow Framework\nhttps://blog.gdssecurity.com/labs/2017/7/17/cve-2017-4971-remote-code-execution-vulnerability-in-the-spr.html", "creation_timestamp": "2017-07-17T20:25:19.000000Z"}</description>
      <content:encoded>{"uuid": "bec021b9-3bcc-4c70-b032-940fa348b18e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-4971", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/1777", "content": "CVE-2017-4971: Remote Code Execution Vulnerability In The Spring Web Flow Framework\nhttps://blog.gdssecurity.com/labs/2017/7/17/cve-2017-4971-remote-code-execution-vulnerability-in-the-spr.html", "creation_timestamp": "2017-07-17T20:25:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bec021b9-3bcc-4c70-b032-940fa348b18e/export</guid>
      <pubDate>Mon, 17 Jul 2017 20:25:19 +0000</pubDate>
    </item>
    <item>
      <title>ddbb5776-3d97-4ea7-a474-caf1c8675a31</title>
      <link>https://db.gcve.eu/sighting/ddbb5776-3d97-4ea7-a474-caf1c8675a31/export</link>
      <description>{"uuid": "ddbb5776-3d97-4ea7-a474-caf1c8675a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-4971", "type": "seen", "source": "https://t.me/arpsyndicate/1498", "content": "#ExploitObserverAlert\n\nCVE-2017-4971\n\nDESCRIPTION: Exploit Observer has 26 entries related to CVE-2017-4971. An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings.\n\nFIRST-EPSS: 0.259000000\nNVD-IS: 3.6\nNVD-ES: 2.2", "creation_timestamp": "2023-12-06T15:02:33.000000Z"}</description>
      <content:encoded>{"uuid": "ddbb5776-3d97-4ea7-a474-caf1c8675a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-4971", "type": "seen", "source": "https://t.me/arpsyndicate/1498", "content": "#ExploitObserverAlert\n\nCVE-2017-4971\n\nDESCRIPTION: Exploit Observer has 26 entries related to CVE-2017-4971. An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings.\n\nFIRST-EPSS: 0.259000000\nNVD-IS: 3.6\nNVD-ES: 2.2", "creation_timestamp": "2023-12-06T15:02:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ddbb5776-3d97-4ea7-a474-caf1c8675a31/export</guid>
      <pubDate>Wed, 06 Dec 2023 15:02:33 +0000</pubDate>
    </item>
  </channel>
</rss>
