<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 11:24:47 +0000</lastBuildDate>
    <item>
      <title>4539e1ef-a5a0-4123-a7ca-c07ce1529b81</title>
      <link>https://vulnerability.circl.lu/sighting/4539e1ef-a5a0-4123-a7ca-c07ce1529b81/export</link>
      <description>{"uuid": "4539e1ef-a5a0-4123-a7ca-c07ce1529b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51502", "type": "seen", "source": "https://t.me/cvedetector/9793", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51502 - Loona HPack HTTP Header Exploit\", \n  \"Content\": \"CVE ID : CVE-2024-51502 \nPublished : Nov. 4, 2024, 11:15 p.m. | 39\u00a0minutes ago \nDescription : loona is an experimental, HTTP/1.1 and HTTP/2 implementation in Rust on top of io-uring. `loona-hpack` suffers from the same vulnerability as the original `hpack` as documented in issue #11. All users who try to decode untrusted input using the Decoder are vulnerable to this exploit. This issue has been addressed in release version 0.4.3. All users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T01:19:04.000000Z"}</description>
      <content:encoded>{"uuid": "4539e1ef-a5a0-4123-a7ca-c07ce1529b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51502", "type": "seen", "source": "https://t.me/cvedetector/9793", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51502 - Loona HPack HTTP Header Exploit\", \n  \"Content\": \"CVE ID : CVE-2024-51502 \nPublished : Nov. 4, 2024, 11:15 p.m. | 39\u00a0minutes ago \nDescription : loona is an experimental, HTTP/1.1 and HTTP/2 implementation in Rust on top of io-uring. `loona-hpack` suffers from the same vulnerability as the original `hpack` as documented in issue #11. All users who try to decode untrusted input using the Decoder are vulnerable to this exploit. This issue has been addressed in release version 0.4.3. All users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T01:19:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4539e1ef-a5a0-4123-a7ca-c07ce1529b81/export</guid>
      <pubDate>Tue, 05 Nov 2024 01:19:04 +0000</pubDate>
    </item>
  </channel>
</rss>
