<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:34:14.600618+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/780607ce-4dd3-4c04-bb72-7c4b3e9cc625/export</id>
    <title>780607ce-4dd3-4c04-bb72-7c4b3e9cc625</title>
    <updated>2026-05-04T10:34:14.904220+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "780607ce-4dd3-4c04-bb72-7c4b3e9cc625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35908", "type": "seen", "source": "https://t.me/cibsecurity/66530", "content": "\u203c CVE-2023-35908 \u203c\n\nApache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unauthorized read access to a DAG through the URL.\u00c2\u00a0It is recommended to upgrade to a version that is not affected\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-12T14:45:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/780607ce-4dd3-4c04-bb72-7c4b3e9cc625/export"/>
    <published>2023-07-12T14:45:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6ef99642-4878-4eb8-90f8-a8d0c0619a4b/export</id>
    <title>6ef99642-4878-4eb8-90f8-a8d0c0619a4b</title>
    <updated>2026-05-04T10:34:14.904106+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6ef99642-4878-4eb8-90f8-a8d0c0619a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3590", "type": "seen", "source": "https://t.me/cibsecurity/66836", "content": "\u203c CVE-2023-3590 \u203c\n\nMattermost\u00c2\u00a0fails to delete card attachments in Boards, allowing an attacker to access deleted attachments.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T20:40:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6ef99642-4878-4eb8-90f8-a8d0c0619a4b/export"/>
    <published>2023-07-17T20:40:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/116ad06a-1bc1-4cb2-be30-4ce70a94e205/export</id>
    <title>116ad06a-1bc1-4cb2-be30-4ce70a94e205</title>
    <updated>2026-05-04T10:34:14.903974+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "116ad06a-1bc1-4cb2-be30-4ce70a94e205", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35900", "type": "seen", "source": "https://t.me/cibsecurity/66979", "content": "\u203c CVE-2023-35900 \u203c\n\nIBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.4 and 23.0.0 through 23.0.5 is vulnerable to disclosing server version information which may be used to determine software vulnerabilities at the operating system level. IBM X-Force ID: 259368.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-19T07:24:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/116ad06a-1bc1-4cb2-be30-4ce70a94e205/export"/>
    <published>2023-07-19T07:24:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ea006fb6-c1f4-48e9-91cd-4655ceab7a74/export</id>
    <title>ea006fb6-c1f4-48e9-91cd-4655ceab7a74</title>
    <updated>2026-05-04T10:34:14.903857+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ea006fb6-c1f4-48e9-91cd-4655ceab7a74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35906", "type": "seen", "source": "https://t.me/cibsecurity/69819", "content": "\u203c CVE-2023-35906 \u203c\n\nIBM Aspera Faspex 5.0.5 could allow a remote attacked to bypass IP restrictions due to improper access controls. IBM X-Force ID: 259649.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T07:16:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ea006fb6-c1f4-48e9-91cd-4655ceab7a74/export"/>
    <published>2023-09-05T07:16:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/45e676b5-9545-40e9-b2f0-b1792fb62847/export</id>
    <title>45e676b5-9545-40e9-b2f0-b1792fb62847</title>
    <updated>2026-05-04T10:34:14.903744+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "45e676b5-9545-40e9-b2f0-b1792fb62847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35909", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1276", "content": "", "creation_timestamp": "2024-11-17T03:13:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/45e676b5-9545-40e9-b2f0-b1792fb62847/export"/>
    <published>2024-11-17T03:13:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c2428e6-6952-4df8-bb02-3697895e83ab/export</id>
    <title>3c2428e6-6952-4df8-bb02-3697895e83ab</title>
    <updated>2026-05-04T10:34:14.903625+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c2428e6-6952-4df8-bb02-3697895e83ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113912641474357507", "content": "", "creation_timestamp": "2025-01-29T16:42:48.269364Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c2428e6-6952-4df8-bb02-3697895e83ab/export"/>
    <published>2025-01-29T16:42:48.269364+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dc5b8f21-96ad-4003-a760-7c4f26cd5d07/export</id>
    <title>dc5b8f21-96ad-4003-a760-7c4f26cd5d07</title>
    <updated>2026-05-04T10:34:14.903503+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dc5b8f21-96ad-4003-a760-7c4f26cd5d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgvhutgt762t", "content": "", "creation_timestamp": "2025-01-29T17:15:43.302742Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dc5b8f21-96ad-4003-a760-7c4f26cd5d07/export"/>
    <published>2025-01-29T17:15:43.302742+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9bc095e9-d8bd-43ef-a130-7b3fae61c90c/export</id>
    <title>9bc095e9-d8bd-43ef-a130-7b3fae61c90c</title>
    <updated>2026-05-04T10:34:14.903374+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9bc095e9-d8bd-43ef-a130-7b3fae61c90c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3389", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35907\n\ud83d\udd25 CVSS Score: 5.8 (CVSS_V3)\n\ud83d\udd39 Description: IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.\n\ud83d\udccf Published: 2025-01-29T18:31:22Z\n\ud83d\udccf Modified: 2025-01-29T18:31:22Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-35907\n2. https://www.ibm.com/support/pages/node/7181814", "creation_timestamp": "2025-01-29T19:11:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9bc095e9-d8bd-43ef-a130-7b3fae61c90c/export"/>
    <published>2025-01-29T19:11:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6c371ddb-576b-4c60-bc3b-0e8f0cff3968/export</id>
    <title>6c371ddb-576b-4c60-bc3b-0e8f0cff3968</title>
    <updated>2026-05-04T10:34:14.903201+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6c371ddb-576b-4c60-bc3b-0e8f0cff3968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgvojtrdoh2k", "content": "", "creation_timestamp": "2025-01-29T19:14:55.143519Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6c371ddb-576b-4c60-bc3b-0e8f0cff3968/export"/>
    <published>2025-01-29T19:14:55.143519+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/472832e2-80e9-43d1-aad4-45b93b59cbaf/export</id>
    <title>472832e2-80e9-43d1-aad4-45b93b59cbaf</title>
    <updated>2026-05-04T10:34:14.900769+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "472832e2-80e9-43d1-aad4-45b93b59cbaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://t.me/cvedetector/16691", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-35907 - IBM Aspera Faspex Authentication Weakness\", \n  \"Content\": \"CVE ID : CVE-2023-35907 \nPublished : Jan. 29, 2025, 5:15 p.m. | 59\u00a0minutes ago \nDescription : IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-29T19:52:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/472832e2-80e9-43d1-aad4-45b93b59cbaf/export"/>
    <published>2025-01-29T19:52:03+00:00</published>
  </entry>
</feed>
