<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 17 May 2026 10:45:54 +0000</lastBuildDate>
    <item>
      <title>14b819ec-399f-4635-a8b5-aa1d04dc363e</title>
      <link>https://db.gcve.eu/sighting/14b819ec-399f-4635-a8b5-aa1d04dc363e/export</link>
      <description>{"uuid": "14b819ec-399f-4635-a8b5-aa1d04dc363e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "seen", "source": "https://t.me/ctinow/162373", "content": "https://ift.tt/X3dJOmE\nCVE-2023-39655", "creation_timestamp": "2024-01-03T14:26:30.000000Z"}</description>
      <content:encoded>{"uuid": "14b819ec-399f-4635-a8b5-aa1d04dc363e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "seen", "source": "https://t.me/ctinow/162373", "content": "https://ift.tt/X3dJOmE\nCVE-2023-39655", "creation_timestamp": "2024-01-03T14:26:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/14b819ec-399f-4635-a8b5-aa1d04dc363e/export</guid>
      <pubDate>Wed, 03 Jan 2024 14:26:30 +0000</pubDate>
    </item>
    <item>
      <title>fc7a0d0b-fa90-4ce6-9a46-9006174a2c56</title>
      <link>https://db.gcve.eu/sighting/fc7a0d0b-fa90-4ce6-9a46-9006174a2c56/export</link>
      <description>{"uuid": "fc7a0d0b-fa90-4ce6-9a46-9006174a2c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "seen", "source": "https://t.me/cibsecurity/74317", "content": "\u203c\ufe0fCVE-2023-39655\u203c\ufe0f\n\nA host header injection vulnerability exists in the NPM package perfoodcouchauth versions  0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attackercontrolled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:35:39.000000Z"}</description>
      <content:encoded>{"uuid": "fc7a0d0b-fa90-4ce6-9a46-9006174a2c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "seen", "source": "https://t.me/cibsecurity/74317", "content": "\u203c\ufe0fCVE-2023-39655\u203c\ufe0f\n\nA host header injection vulnerability exists in the NPM package perfoodcouchauth versions  0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attackercontrolled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:35:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fc7a0d0b-fa90-4ce6-9a46-9006174a2c56/export</guid>
      <pubDate>Thu, 04 Jan 2024 01:35:39 +0000</pubDate>
    </item>
    <item>
      <title>7dd6cd02-e8d3-4f02-8e96-a47176007fb4</title>
      <link>https://db.gcve.eu/sighting/7dd6cd02-e8d3-4f02-8e96-a47176007fb4/export</link>
      <description>{"uuid": "7dd6cd02-e8d3-4f02-8e96-a47176007fb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "seen", "source": "https://t.me/ctinow/172148", "content": "https://ift.tt/EGtZbin\nCVE-2023-39655 | perfood couch-auth up to 0.20.0 Header Host password recovery", "creation_timestamp": "2024-01-23T17:26:50.000000Z"}</description>
      <content:encoded>{"uuid": "7dd6cd02-e8d3-4f02-8e96-a47176007fb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "seen", "source": "https://t.me/ctinow/172148", "content": "https://ift.tt/EGtZbin\nCVE-2023-39655 | perfood couch-auth up to 0.20.0 Header Host password recovery", "creation_timestamp": "2024-01-23T17:26:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7dd6cd02-e8d3-4f02-8e96-a47176007fb4/export</guid>
      <pubDate>Tue, 23 Jan 2024 17:26:50 +0000</pubDate>
    </item>
    <item>
      <title>a84ecd11-f17e-48b1-aa56-c6c72572ee9d</title>
      <link>https://db.gcve.eu/sighting/a84ecd11-f17e-48b1-aa56-c6c72572ee9d/export</link>
      <description>{"uuid": "a84ecd11-f17e-48b1-aa56-c6c72572ee9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18766", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-39655\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions &amp;lt;= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.\n\ud83d\udccf Published: 2024-01-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T15:24:04.602Z\n\ud83d\udd17 References:\n1. https://www.npmjs.com/package/%40perfood/couch-auth\n2. https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655", "creation_timestamp": "2025-06-18T15:42:57.000000Z"}</description>
      <content:encoded>{"uuid": "a84ecd11-f17e-48b1-aa56-c6c72572ee9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18766", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-39655\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions &amp;lt;= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.\n\ud83d\udccf Published: 2024-01-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T15:24:04.602Z\n\ud83d\udd17 References:\n1. https://www.npmjs.com/package/%40perfood/couch-auth\n2. https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655", "creation_timestamp": "2025-06-18T15:42:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a84ecd11-f17e-48b1-aa56-c6c72572ee9d/export</guid>
      <pubDate>Wed, 18 Jun 2025 15:42:57 +0000</pubDate>
    </item>
  </channel>
</rss>
