<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 05:04:11 +0000</lastBuildDate>
    <item>
      <title>5750d996-2bbf-4d03-b78b-5463ec897763</title>
      <link>https://db.gcve.eu/sighting/5750d996-2bbf-4d03-b78b-5463ec897763/export</link>
      <description>{"uuid": "5750d996-2bbf-4d03-b78b-5463ec897763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45289", "type": "seen", "source": "https://t.me/arpsyndicate/4129", "content": "#ExploitObserverAlert\n\nCVE-2023-45289\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-45289. When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-03-07T08:37:20.000000Z"}</description>
      <content:encoded>{"uuid": "5750d996-2bbf-4d03-b78b-5463ec897763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45289", "type": "seen", "source": "https://t.me/arpsyndicate/4129", "content": "#ExploitObserverAlert\n\nCVE-2023-45289\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-45289. When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-03-07T08:37:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5750d996-2bbf-4d03-b78b-5463ec897763/export</guid>
      <pubDate>Thu, 07 Mar 2024 08:37:20 +0000</pubDate>
    </item>
    <item>
      <title>0ce7781a-a759-4d7f-bc9f-a8b1cf6aab4e</title>
      <link>https://db.gcve.eu/sighting/0ce7781a-a759-4d7f-bc9f-a8b1cf6aab4e/export</link>
      <description>{"uuid": "0ce7781a-a759-4d7f-bc9f-a8b1cf6aab4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://t.me/arpsyndicate/4385", "content": "#ExploitObserverAlert\n\nCVE-2023-45288\n\nDESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-45288. An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-04-07T22:26:02.000000Z"}</description>
      <content:encoded>{"uuid": "0ce7781a-a759-4d7f-bc9f-a8b1cf6aab4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://t.me/arpsyndicate/4385", "content": "#ExploitObserverAlert\n\nCVE-2023-45288\n\nDESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-45288. An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-04-07T22:26:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0ce7781a-a759-4d7f-bc9f-a8b1cf6aab4e/export</guid>
      <pubDate>Sun, 07 Apr 2024 22:26:02 +0000</pubDate>
    </item>
    <item>
      <title>c5980e3d-a9c7-45e1-b91d-f0b897cf950f</title>
      <link>https://db.gcve.eu/sighting/c5980e3d-a9c7-45e1-b91d-f0b897cf950f/export</link>
      <description>{"uuid": "c5980e3d-a9c7-45e1-b91d-f0b897cf950f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://t.me/arpsyndicate/4415", "content": "#ExploitObserverAlert\n\nCVE-2023-45288\n\nDESCRIPTION: Exploit Observer has 43 entries in 10 file formats related to CVE-2023-45288. An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-04-09T20:26:43.000000Z"}</description>
      <content:encoded>{"uuid": "c5980e3d-a9c7-45e1-b91d-f0b897cf950f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://t.me/arpsyndicate/4415", "content": "#ExploitObserverAlert\n\nCVE-2023-45288\n\nDESCRIPTION: Exploit Observer has 43 entries in 10 file formats related to CVE-2023-45288. An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-04-09T20:26:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c5980e3d-a9c7-45e1-b91d-f0b897cf950f/export</guid>
      <pubDate>Tue, 09 Apr 2024 20:26:43 +0000</pubDate>
    </item>
    <item>
      <title>202f990d-ed0b-4411-811e-93d9482165f6</title>
      <link>https://db.gcve.eu/sighting/202f990d-ed0b-4411-811e-93d9482165f6/export</link>
      <description>{"uuid": "202f990d-ed0b-4411-811e-93d9482165f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://t.me/arpsyndicate/4574", "content": "#ExploitObserverAlert\n\nCVE-2023-45288\n\nDESCRIPTION: Exploit Observer has 45 entries in 10 file formats related to CVE-2023-45288. An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.\n\nFIRST-EPSS: 0.000450000\nARPS-EXPLOITABILITY: 0.7345311", "creation_timestamp": "2024-04-12T09:16:16.000000Z"}</description>
      <content:encoded>{"uuid": "202f990d-ed0b-4411-811e-93d9482165f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://t.me/arpsyndicate/4574", "content": "#ExploitObserverAlert\n\nCVE-2023-45288\n\nDESCRIPTION: Exploit Observer has 45 entries in 10 file formats related to CVE-2023-45288. An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.\n\nFIRST-EPSS: 0.000450000\nARPS-EXPLOITABILITY: 0.7345311", "creation_timestamp": "2024-04-12T09:16:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/202f990d-ed0b-4411-811e-93d9482165f6/export</guid>
      <pubDate>Fri, 12 Apr 2024 09:16:16 +0000</pubDate>
    </item>
    <item>
      <title>0e86f52b-4aaf-4a6c-865c-36e6f266b564</title>
      <link>https://db.gcve.eu/sighting/0e86f52b-4aaf-4a6c-865c-36e6f266b564/export</link>
      <description>{"uuid": "0e86f52b-4aaf-4a6c-865c-36e6f266b564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9362", "content": "Prototype Pollution in NASAs Open MCT CVE-2023-45282\n\nhttps://visionspace.com/prototype-pollution-in-nasas-open-mct-cve-2023-45282/", "creation_timestamp": "2024-11-23T11:40:16.000000Z"}</description>
      <content:encoded>{"uuid": "0e86f52b-4aaf-4a6c-865c-36e6f266b564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9362", "content": "Prototype Pollution in NASAs Open MCT CVE-2023-45282\n\nhttps://visionspace.com/prototype-pollution-in-nasas-open-mct-cve-2023-45282/", "creation_timestamp": "2024-11-23T11:40:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0e86f52b-4aaf-4a6c-865c-36e6f266b564/export</guid>
      <pubDate>Sat, 23 Nov 2024 11:40:16 +0000</pubDate>
    </item>
    <item>
      <title>88a0d247-82ac-450a-a28f-888898596033</title>
      <link>https://db.gcve.eu/sighting/88a0d247-82ac-450a-a28f-888898596033/export</link>
      <description>{"uuid": "88a0d247-82ac-450a-a28f-888898596033", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "published-proof-of-concept", "source": "https://t.me/scorpionisready/942", "content": "Prototype Pollution in NASAs Open MCT CVE-2023-45282\n\nhttps://visionspace.com/prototype-pollution-in-nasas-open-mct-cve-2023-45282/", "creation_timestamp": "2024-11-25T21:18:52.000000Z"}</description>
      <content:encoded>{"uuid": "88a0d247-82ac-450a-a28f-888898596033", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "published-proof-of-concept", "source": "https://t.me/scorpionisready/942", "content": "Prototype Pollution in NASAs Open MCT CVE-2023-45282\n\nhttps://visionspace.com/prototype-pollution-in-nasas-open-mct-cve-2023-45282/", "creation_timestamp": "2024-11-25T21:18:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/88a0d247-82ac-450a-a28f-888898596033/export</guid>
      <pubDate>Mon, 25 Nov 2024 21:18:52 +0000</pubDate>
    </item>
    <item>
      <title>0e364f65-e021-468a-9008-ee0fe0749d4f</title>
      <link>https://db.gcve.eu/sighting/0e364f65-e021-468a-9008-ee0fe0749d4f/export</link>
      <description>{"uuid": "0e364f65-e021-468a-9008-ee0fe0749d4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113577221793310504", "content": "", "creation_timestamp": "2024-12-01T11:01:11.158129Z"}</description>
      <content:encoded>{"uuid": "0e364f65-e021-468a-9008-ee0fe0749d4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113577221793310504", "content": "", "creation_timestamp": "2024-12-01T11:01:11.158129Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0e364f65-e021-468a-9008-ee0fe0749d4f/export</guid>
      <pubDate>Sun, 01 Dec 2024 11:01:11 +0000</pubDate>
    </item>
    <item>
      <title>da1e18c1-aee9-409e-a1b5-9f5f1894ae8c</title>
      <link>https://db.gcve.eu/sighting/da1e18c1-aee9-409e-a1b5-9f5f1894ae8c/export</link>
      <description>{"uuid": "da1e18c1-aee9-409e-a1b5-9f5f1894ae8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113650832054100134", "content": "", "creation_timestamp": "2024-12-14T11:01:14.398462Z"}</description>
      <content:encoded>{"uuid": "da1e18c1-aee9-409e-a1b5-9f5f1894ae8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45282", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113650832054100134", "content": "", "creation_timestamp": "2024-12-14T11:01:14.398462Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/da1e18c1-aee9-409e-a1b5-9f5f1894ae8c/export</guid>
      <pubDate>Sat, 14 Dec 2024 11:01:14 +0000</pubDate>
    </item>
    <item>
      <title>155f93ed-41a9-4051-9316-e3484590cfa7</title>
      <link>https://db.gcve.eu/sighting/155f93ed-41a9-4051-9316-e3484590cfa7/export</link>
      <description>{"uuid": "155f93ed-41a9-4051-9316-e3484590cfa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrvmlum4hc2w", "content": "", "creation_timestamp": "2025-06-18T18:17:21.475893Z"}</description>
      <content:encoded>{"uuid": "155f93ed-41a9-4051-9316-e3484590cfa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrvmlum4hc2w", "content": "", "creation_timestamp": "2025-06-18T18:17:21.475893Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/155f93ed-41a9-4051-9316-e3484590cfa7/export</guid>
      <pubDate>Wed, 18 Jun 2025 18:17:21 +0000</pubDate>
    </item>
    <item>
      <title>285c14a5-546a-4e69-961c-153f65d349f8</title>
      <link>https://db.gcve.eu/sighting/285c14a5-546a-4e69-961c-153f65d349f8/export</link>
      <description>{"uuid": "285c14a5-546a-4e69-961c-153f65d349f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrvufmn5bk2w", "content": "", "creation_timestamp": "2025-06-18T20:37:01.608647Z"}</description>
      <content:encoded>{"uuid": "285c14a5-546a-4e69-961c-153f65d349f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45288", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrvufmn5bk2w", "content": "", "creation_timestamp": "2025-06-18T20:37:01.608647Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/285c14a5-546a-4e69-961c-153f65d349f8/export</guid>
      <pubDate>Wed, 18 Jun 2025 20:37:01 +0000</pubDate>
    </item>
  </channel>
</rss>
