<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 00:43:05 +0000</lastBuildDate>
    <item>
      <title>f496be88-b5e2-421b-b9aa-fa7399c443f6</title>
      <link>https://db.gcve.eu/sighting/f496be88-b5e2-421b-b9aa-fa7399c443f6/export</link>
      <description>{"uuid": "f496be88-b5e2-421b-b9aa-fa7399c443f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-C76H-2CCP-4975", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2434", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22150\n\ud83d\udd39 Description: Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.\n\ud83d\udccf Published: 2025-01-21T17:46:58.872Z\n\ud83d\udccf Modified: 2025-01-21T17:46:58.872Z\n\ud83d\udd17 References:\n1. https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975\n2. https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0\n3. https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a\n4. https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385\n5. https://hackerone.com/reports/2913312\n6. https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f\n7. https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113", "creation_timestamp": "2025-01-21T18:00:46.000000Z"}</description>
      <content:encoded>{"uuid": "f496be88-b5e2-421b-b9aa-fa7399c443f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-C76H-2CCP-4975", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2434", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22150\n\ud83d\udd39 Description: Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.\n\ud83d\udccf Published: 2025-01-21T17:46:58.872Z\n\ud83d\udccf Modified: 2025-01-21T17:46:58.872Z\n\ud83d\udd17 References:\n1. https://github.com/nodejs/undici/security/advisories/GHSA-c76h-2ccp-4975\n2. https://github.com/nodejs/undici/commit/711e20772764c29f6622ddc937c63b6eefdf07d0\n3. https://github.com/nodejs/undici/commit/c2d78cd19fe4f4c621424491e26ce299e65e934a\n4. https://github.com/nodejs/undici/commit/c3acc6050b781b827d80c86cbbab34f14458d385\n5. https://hackerone.com/reports/2913312\n6. https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f\n7. https://github.com/nodejs/undici/blob/8b06b8250907d92fead664b3368f1d2aa27c1f35/lib/web/fetch/body.js#L113", "creation_timestamp": "2025-01-21T18:00:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f496be88-b5e2-421b-b9aa-fa7399c443f6/export</guid>
      <pubDate>Tue, 21 Jan 2025 18:00:46 +0000</pubDate>
    </item>
    <item>
      <title>df30e19f-78a3-465a-a115-8c1a3d9324d8</title>
      <link>https://db.gcve.eu/sighting/df30e19f-78a3-465a-a115-8c1a3d9324d8/export</link>
      <description>{"uuid": "df30e19f-78a3-465a-a115-8c1a3d9324d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-c76h-2ccp-4975", "type": "seen", "source": "https://bsky.app/profile/azu.bsky.social/post/3lgmegl3kq32k", "content": "", "creation_timestamp": "2025-01-26T02:20:06.009171Z"}</description>
      <content:encoded>{"uuid": "df30e19f-78a3-465a-a115-8c1a3d9324d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-c76h-2ccp-4975", "type": "seen", "source": "https://bsky.app/profile/azu.bsky.social/post/3lgmegl3kq32k", "content": "", "creation_timestamp": "2025-01-26T02:20:06.009171Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/df30e19f-78a3-465a-a115-8c1a3d9324d8/export</guid>
      <pubDate>Sun, 26 Jan 2025 02:20:06 +0000</pubDate>
    </item>
    <item>
      <title>d26ab59e-32c7-46fb-a74b-0dad1a535b25</title>
      <link>https://db.gcve.eu/sighting/d26ab59e-32c7-46fb-a74b-0dad1a535b25/export</link>
      <description>{"uuid": "d26ab59e-32c7-46fb-a74b-0dad1a535b25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-c76h-2ccp-4975", "type": "seen", "source": "https://bsky.app/profile/azu.bsky.social/post/3lgmfljjbmo2w", "content": "", "creation_timestamp": "2025-01-26T02:40:45.873807Z"}</description>
      <content:encoded>{"uuid": "d26ab59e-32c7-46fb-a74b-0dad1a535b25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-c76h-2ccp-4975", "type": "seen", "source": "https://bsky.app/profile/azu.bsky.social/post/3lgmfljjbmo2w", "content": "", "creation_timestamp": "2025-01-26T02:40:45.873807Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d26ab59e-32c7-46fb-a74b-0dad1a535b25/export</guid>
      <pubDate>Sun, 26 Jan 2025 02:40:45 +0000</pubDate>
    </item>
    <item>
      <title>51741da3-46e1-4a3a-8b7d-970863c25a8f</title>
      <link>https://db.gcve.eu/sighting/51741da3-46e1-4a3a-8b7d-970863c25a8f/export</link>
      <description>{"uuid": "51741da3-46e1-4a3a-8b7d-970863c25a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-c76h-2ccp-4975", "type": "seen", "source": "https://bsky.app/profile/tech-trending.bsky.social/post/3lgn4jhna4p2g", "content": "", "creation_timestamp": "2025-01-26T09:31:13.630032Z"}</description>
      <content:encoded>{"uuid": "51741da3-46e1-4a3a-8b7d-970863c25a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-c76h-2ccp-4975", "type": "seen", "source": "https://bsky.app/profile/tech-trending.bsky.social/post/3lgn4jhna4p2g", "content": "", "creation_timestamp": "2025-01-26T09:31:13.630032Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/51741da3-46e1-4a3a-8b7d-970863c25a8f/export</guid>
      <pubDate>Sun, 26 Jan 2025 09:31:13 +0000</pubDate>
    </item>
  </channel>
</rss>
