<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T15:04:41.739858+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0785e01c-d8f1-478c-91d9-120e541e9e57/export</id>
    <title>0785e01c-d8f1-478c-91d9-120e541e9e57</title>
    <updated>2026-05-06T15:04:42.163768+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0785e01c-d8f1-478c-91d9-120e541e9e57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39264", "type": "seen", "source": "https://t.me/cibsecurity/70002", "content": "\u203c CVE-2023-39264 \u203c\n\nBy default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users.\u00c2\u00a0This vulnerability exists in Apache Superset versions up to and including 2.1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T16:17:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0785e01c-d8f1-478c-91d9-120e541e9e57/export"/>
    <published>2023-09-06T16:17:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e2767404-f8fb-49da-9944-ea6702f961cb/export</id>
    <title>e2767404-f8fb-49da-9944-ea6702f961cb</title>
    <updated>2026-05-06T15:04:42.161634+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e2767404-f8fb-49da-9944-ea6702f961cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39264", "type": "seen", "source": "https://t.me/arpsyndicate/593", "content": "#ExploitObserverAlert\n\nCVE-2023-39264\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-39264. By default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users.\u00a0This vulnerability exists in Apache Superset versions up to and including 2.1.0.\n\nFIRST-EPSS: 0.000620000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2023-11-27T21:38:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e2767404-f8fb-49da-9944-ea6702f961cb/export"/>
    <published>2023-11-27T21:38:11+00:00</published>
  </entry>
</feed>
