<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T03:25:44.214680+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d12ba567-42ec-4572-9d58-adc583515302/export</id>
    <title>d12ba567-42ec-4572-9d58-adc583515302</title>
    <updated>2026-05-06T03:25:44.656006+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d12ba567-42ec-4572-9d58-adc583515302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45807", "type": "seen", "source": "https://t.me/cvedetector/6095", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45807 - Envoy Oghttp2 Stream Management Crash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45807 \nPublished : Sept. 20, 2024, 12:15 a.m. | 41\u00a0minutes ago \nDescription : Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using `oghttp` as the default HTTP/2 codec, and there are potential bugs around stream management in the codec. To resolve this Envoy will switch off the `oghttp2` by default. The impact of this issue is that envoy will crash. This issue has been addressed in release version 1.31.2. All users are advised to upgrade. There are no known workarounds for this issue. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T03:02:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d12ba567-42ec-4572-9d58-adc583515302/export"/>
    <published>2024-09-20T03:02:02+00:00</published>
  </entry>
</feed>
