<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 03:25:43 +0000</lastBuildDate>
    <item>
      <title>d12ba567-42ec-4572-9d58-adc583515302</title>
      <link>https://vulnerability.circl.lu/sighting/d12ba567-42ec-4572-9d58-adc583515302/export</link>
      <description>{"uuid": "d12ba567-42ec-4572-9d58-adc583515302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45807", "type": "seen", "source": "https://t.me/cvedetector/6095", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45807 - Envoy Oghttp2 Stream Management Crash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45807 \nPublished : Sept. 20, 2024, 12:15 a.m. | 41\u00a0minutes ago \nDescription : Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using `oghttp` as the default HTTP/2 codec, and there are potential bugs around stream management in the codec. To resolve this Envoy will switch off the `oghttp2` by default. The impact of this issue is that envoy will crash. This issue has been addressed in release version 1.31.2. All users are advised to upgrade. There are no known workarounds for this issue. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T03:02:02.000000Z"}</description>
      <content:encoded>{"uuid": "d12ba567-42ec-4572-9d58-adc583515302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45807", "type": "seen", "source": "https://t.me/cvedetector/6095", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45807 - Envoy Oghttp2 Stream Management Crash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45807 \nPublished : Sept. 20, 2024, 12:15 a.m. | 41\u00a0minutes ago \nDescription : Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using `oghttp` as the default HTTP/2 codec, and there are potential bugs around stream management in the codec. To resolve this Envoy will switch off the `oghttp2` by default. The impact of this issue is that envoy will crash. This issue has been addressed in release version 1.31.2. All users are advised to upgrade. There are no known workarounds for this issue. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T03:02:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d12ba567-42ec-4572-9d58-adc583515302/export</guid>
      <pubDate>Fri, 20 Sep 2024 03:02:02 +0000</pubDate>
    </item>
  </channel>
</rss>
