<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 23 May 2026 08:51:59 +0000</lastBuildDate>
    <item>
      <title>bd50e038-fa85-4cbd-92af-ee3127c65944</title>
      <link>https://db.gcve.eu/sighting/bd50e038-fa85-4cbd-92af-ee3127c65944/export</link>
      <description>{"uuid": "bd50e038-fa85-4cbd-92af-ee3127c65944", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43367", "type": "seen", "source": "https://t.me/cvedetector/3290", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43367 - \"Boa AsyncGenerator Denial of Service Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-43367 \nPublished : Aug. 15, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : Boa is an embeddable and experimental Javascript engine written in Rust. Starting in version 0.16 and prior to version 0.19.0, a wrong assumption made when handling ECMAScript's `AsyncGenerator` operations can cause an uncaught exception on certain scripts. Boa's implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`. However, a carefully constructed code could trigger a state transition from a getter method for the promise's `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user. Version 0.19.0 is patched to correctly handle this case. Users unable to upgrade to the patched version would want to use `std::panic::catch_unwind` to ensure any exceptions caused by the engine don't impact the availability of the main application. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T00:20:22.000000Z"}</description>
      <content:encoded>{"uuid": "bd50e038-fa85-4cbd-92af-ee3127c65944", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43367", "type": "seen", "source": "https://t.me/cvedetector/3290", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43367 - \"Boa AsyncGenerator Denial of Service Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-43367 \nPublished : Aug. 15, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : Boa is an embeddable and experimental Javascript engine written in Rust. Starting in version 0.16 and prior to version 0.19.0, a wrong assumption made when handling ECMAScript's `AsyncGenerator` operations can cause an uncaught exception on certain scripts. Boa's implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`. However, a carefully constructed code could trigger a state transition from a getter method for the promise's `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user. Version 0.19.0 is patched to correctly handle this case. Users unable to upgrade to the patched version would want to use `std::panic::catch_unwind` to ensure any exceptions caused by the engine don't impact the availability of the main application. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T00:20:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bd50e038-fa85-4cbd-92af-ee3127c65944/export</guid>
      <pubDate>Fri, 16 Aug 2024 00:20:22 +0000</pubDate>
    </item>
  </channel>
</rss>
