<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 18:44:50 +0000</lastBuildDate>
    <item>
      <title>4526d850-beee-4e37-b5d4-d2d5da11513a</title>
      <link>https://vulnerability.circl.lu/sighting/4526d850-beee-4e37-b5d4-d2d5da11513a/export</link>
      <description>{"uuid": "4526d850-beee-4e37-b5d4-d2d5da11513a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39702", "type": "seen", "source": "https://t.me/cvedetector/1518", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39702 - OpenResty LuaJIT HashDoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39702 \nPublished : July 23, 2024, 4:15 p.m. | 36\u00a0minutes ago \nDescription : In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT epository. is unaffected/ \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T18:54:38.000000Z"}</description>
      <content:encoded>{"uuid": "4526d850-beee-4e37-b5d4-d2d5da11513a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39702", "type": "seen", "source": "https://t.me/cvedetector/1518", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39702 - OpenResty LuaJIT HashDoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39702 \nPublished : July 23, 2024, 4:15 p.m. | 36\u00a0minutes ago \nDescription : In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT epository. is unaffected/ \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T18:54:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4526d850-beee-4e37-b5d4-d2d5da11513a/export</guid>
      <pubDate>Tue, 23 Jul 2024 18:54:38 +0000</pubDate>
    </item>
  </channel>
</rss>
