<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 11:31:29 +0000</lastBuildDate>
    <item>
      <title>cb71a231-7534-4e1d-9ad5-753fc8c38872</title>
      <link>https://db.gcve.eu/sighting/cb71a231-7534-4e1d-9ad5-753fc8c38872/export</link>
      <description>{"uuid": "cb71a231-7534-4e1d-9ad5-753fc8c38872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CXQV-R2CC-R9C9", "type": "seen", "source": "https://t.me/arpsyndicate/813", "content": "#ExploitObserverAlert\n\nGHSA-cxqv-r2cc-r9c9\n\nDESCRIPTION: Exploit Observer has 19 entries related to GHSA-CXQV-R2CC-R9C9. Improper input validation of octal strings in Python stdlib ipaddress 3.10 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on Python stdlib ipaddress. IP address octects are left stripped instead of evaluated as valid IP addresses.\n\nGHSS: 9.8", "creation_timestamp": "2023-11-30T09:42:23.000000Z"}</description>
      <content:encoded>{"uuid": "cb71a231-7534-4e1d-9ad5-753fc8c38872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CXQV-R2CC-R9C9", "type": "seen", "source": "https://t.me/arpsyndicate/813", "content": "#ExploitObserverAlert\n\nGHSA-cxqv-r2cc-r9c9\n\nDESCRIPTION: Exploit Observer has 19 entries related to GHSA-CXQV-R2CC-R9C9. Improper input validation of octal strings in Python stdlib ipaddress 3.10 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on Python stdlib ipaddress. IP address octects are left stripped instead of evaluated as valid IP addresses.\n\nGHSS: 9.8", "creation_timestamp": "2023-11-30T09:42:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cb71a231-7534-4e1d-9ad5-753fc8c38872/export</guid>
      <pubDate>Thu, 30 Nov 2023 09:42:23 +0000</pubDate>
    </item>
  </channel>
</rss>
