<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="/tag-feed.xsl" type="text/xsl"?><rss version="2.0"><channel><title>guisso.dev - CVE</title><description>O endereço desta página também é um RSS feed. Use no seu leitor favorito para seguir apenas meus posts sobre CVE.</description><link>https://guisso.dev/</link><homeLink>/</homeLink><item><title>CVE-2024-29041 só funciona no Safari?</title><link>https://guisso.dev/blog/cve-2024-29041-browser-parsers/</link><guid isPermaLink="true">https://guisso.dev/blog/cve-2024-29041-browser-parsers/</guid><description>Indo a fundo no código-fonte do Chromium e do Firefox para entender por que o payload enquanto o Safari navega para o host malicioso.</description><pubDate>Mon, 02 Mar 2026 13:00:00 GMT</pubDate><category>CVE</category><category>Express.js</category><category>AppSec</category><category>Security</category><category>Browser</category><category>Node.js</category></item><item><title>Express.js Open Redirect</title><link>https://guisso.dev/blog/cve-2024-29041-express-open-redirect/</link><guid isPermaLink="true">https://guisso.dev/blog/cve-2024-29041-express-open-redirect/</guid><description>Como uma barra invertida em uma URL bypassa allowlists e engana o browser. Análise completa do CVE-2024-29041 no Express.js com demo interativo.</description><pubDate>Thu, 26 Feb 2026 13:00:00 GMT</pubDate><category>CVE</category><category>Express.js</category><category>AppSec</category><category>Security</category><category>Node.js</category></item></channel></rss>