{"vulnerability": "ghsa-3px7-jm2p-6h2c", "sightings": [{"uuid": "b36450ab-8c9d-46f5-ab8a-3c72d6d2364e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-3PX7-JM2P-6H2C", "type": "seen", "source": "https://t.me/arpsyndicate/2579", "content": "#ExploitObserverAlert\n\nGHSA-3px7-jm2p-6h2c\n\nDESCRIPTION: Exploit Observer has 3 entries related to GHSA-3PX7-JM2P-6H2C. The length of URIs and the various parts (eg path segments, query parameters) is usually limited by the webserver processing the incoming request. In the case of Puma the defaults are :\n\nGHSS: 7.5", "creation_timestamp": "2024-01-06T22:20:50.000000Z"}, {"uuid": "5bc0652d-31a3-4c87-b353-869a1f378bdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-3PX7-JM2P-6H2C", "type": "seen", "source": "https://t.me/ctinow/172586", "content": "https://ift.tt/nXCWxrw\nCVE-2024-0241 | encoded_id-rails up to 1.0.0.beta1 HTTP Request id resource consumption (GHSA-3px7-jm2p-6h2c)", "creation_timestamp": "2024-01-24T09:11:52.000000Z"}]}