<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 24 May 2026 07:12:13 +0000</lastBuildDate>
    <item>
      <title>3e6f074b-41fe-4819-8fe5-330771e21327</title>
      <link>https://db.gcve.eu/sighting/3e6f074b-41fe-4819-8fe5-330771e21327/export</link>
      <description>{"uuid": "3e6f074b-41fe-4819-8fe5-330771e21327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-8004", "type": "published-proof-of-concept", "source": "https://t.me/ExcreamOnSecurity/277", "content": "Security: HTTP Smuggling, Apache Traffic Server\n\nThis article will give a deep explanation of HTTP Smuggling issues present in CVE-2018-8004. Firstly because there's currently not much informations about it (\"Undergoing Analysis\" at the time of this writing on the previous link). Secondly some time has passed since the official announce (and even more since the availability of fixs in v7), also mostly because I keep receiving demands on what exactly is HTTP Smuggling and how to test/exploit this type of issues, also beacause Smuggling issues are now trending and easier to test thanks for the great stuff of James Kettle (@albinowax).\n\nhttps://regilero.github.io/english/security/2019/10/17/security_apache_traffic_server_http_smuggling/\n#web #owasp #apache", "creation_timestamp": "2019-09-22T20:34:10.000000Z"}</description>
      <content:encoded>{"uuid": "3e6f074b-41fe-4819-8fe5-330771e21327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-8004", "type": "published-proof-of-concept", "source": "https://t.me/ExcreamOnSecurity/277", "content": "Security: HTTP Smuggling, Apache Traffic Server\n\nThis article will give a deep explanation of HTTP Smuggling issues present in CVE-2018-8004. Firstly because there's currently not much informations about it (\"Undergoing Analysis\" at the time of this writing on the previous link). Secondly some time has passed since the official announce (and even more since the availability of fixs in v7), also mostly because I keep receiving demands on what exactly is HTTP Smuggling and how to test/exploit this type of issues, also beacause Smuggling issues are now trending and easier to test thanks for the great stuff of James Kettle (@albinowax).\n\nhttps://regilero.github.io/english/security/2019/10/17/security_apache_traffic_server_http_smuggling/\n#web #owasp #apache", "creation_timestamp": "2019-09-22T20:34:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3e6f074b-41fe-4819-8fe5-330771e21327/export</guid>
      <pubDate>Sun, 22 Sep 2019 20:34:10 +0000</pubDate>
    </item>
  </channel>
</rss>
