<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 15 May 2026 13:59:11 +0000</lastBuildDate>
    <item>
      <title>44e36113-0681-4abc-b951-3c5ca553d8b2</title>
      <link>https://db.gcve.eu/sighting/44e36113-0681-4abc-b951-3c5ca553d8b2/export</link>
      <description>{"uuid": "44e36113-0681-4abc-b951-3c5ca553d8b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-C5Q2-7R4C-MV6G", "type": "seen", "source": "https://t.me/ctinow/202895", "content": "https://ift.tt/XP8dn5K\n[GHSA-c5q2-7r4c-mv6g] Go JOSE vulnerable to Improper Handling of Highly Compressed Data (Data Amplification)", "creation_timestamp": "2024-03-08T00:07:20.000000Z"}</description>
      <content:encoded>{"uuid": "44e36113-0681-4abc-b951-3c5ca553d8b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-C5Q2-7R4C-MV6G", "type": "seen", "source": "https://t.me/ctinow/202895", "content": "https://ift.tt/XP8dn5K\n[GHSA-c5q2-7r4c-mv6g] Go JOSE vulnerable to Improper Handling of Highly Compressed Data (Data Amplification)", "creation_timestamp": "2024-03-08T00:07:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/44e36113-0681-4abc-b951-3c5ca553d8b2/export</guid>
      <pubDate>Fri, 08 Mar 2024 00:07:20 +0000</pubDate>
    </item>
    <item>
      <title>5babcf08-2455-43ec-a7da-9cf6b028c4ab</title>
      <link>https://db.gcve.eu/sighting/5babcf08-2455-43ec-a7da-9cf6b028c4ab/export</link>
      <description>{"uuid": "5babcf08-2455-43ec-a7da-9cf6b028c4ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-C5Q2-7R4C-MV6G", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4311", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-28180\n\ud83d\udd25 CVSS Score: 4.2 (CVSS_V3)\n\ud83d\udd39 Description: ### Impact\nAn attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). Thanks to Enze Wang@Alioth and Jianjun Chen@Zhongguancun Lab (@zer0yu and @chenjj) for reporting.\n\n### Patches\nThe problem is fixed in the following packages and versions:\n- github.com/go-jose/go-jose/v4 version 4.0.1\n- github.com/go-jose/go-jose/v3 version 3.0.3\n- gopkg.in/go-jose/go-jose.v2 version 2.6.3\n\nThe problem will not be fixed in the following package because the package is archived:\n- gopkg.in/square/go-jose.v2\n\ud83d\udccf Published: 2024-03-07T22:54:44Z\n\ud83d\udccf Modified: 2025-02-13T19:07:25Z\n\ud83d\udd17 References:\n1. https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g\n2. https://nvd.nist.gov/vuln/detail/CVE-2024-28180\n3. https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298\n4. https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a\n5. https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502\n6. https://github.com/go-jose/go-jose\n7. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ\n8. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG\n9. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ\n10. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5\n11. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY\n12. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS\n13. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG\n14. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY\n15. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH", "creation_timestamp": "2025-02-13T19:15:35.000000Z"}</description>
      <content:encoded>{"uuid": "5babcf08-2455-43ec-a7da-9cf6b028c4ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-C5Q2-7R4C-MV6G", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4311", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-28180\n\ud83d\udd25 CVSS Score: 4.2 (CVSS_V3)\n\ud83d\udd39 Description: ### Impact\nAn attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). Thanks to Enze Wang@Alioth and Jianjun Chen@Zhongguancun Lab (@zer0yu and @chenjj) for reporting.\n\n### Patches\nThe problem is fixed in the following packages and versions:\n- github.com/go-jose/go-jose/v4 version 4.0.1\n- github.com/go-jose/go-jose/v3 version 3.0.3\n- gopkg.in/go-jose/go-jose.v2 version 2.6.3\n\nThe problem will not be fixed in the following package because the package is archived:\n- gopkg.in/square/go-jose.v2\n\ud83d\udccf Published: 2024-03-07T22:54:44Z\n\ud83d\udccf Modified: 2025-02-13T19:07:25Z\n\ud83d\udd17 References:\n1. https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g\n2. https://nvd.nist.gov/vuln/detail/CVE-2024-28180\n3. https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298\n4. https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a\n5. https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502\n6. https://github.com/go-jose/go-jose\n7. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ\n8. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG\n9. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ\n10. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5\n11. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY\n12. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS\n13. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG\n14. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY\n15. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH", "creation_timestamp": "2025-02-13T19:15:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5babcf08-2455-43ec-a7da-9cf6b028c4ab/export</guid>
      <pubDate>Thu, 13 Feb 2025 19:15:35 +0000</pubDate>
    </item>
  </channel>
</rss>
