<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T22:40:05.696090+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/83fba281-4711-4a82-9115-0f680bdbb840/export</id>
    <title>83fba281-4711-4a82-9115-0f680bdbb840</title>
    <updated>2026-05-06T22:40:06.186911+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "83fba281-4711-4a82-9115-0f680bdbb840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4118", "type": "seen", "source": "https://t.me/cibsecurity/67641", "content": "\u203c CVE-2023-4118 \u203c\n\nA vulnerability, which was classified as problematic, was found in Cute Http File Server 2.0. This affects an unknown part of the component Search. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235965 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-03T12:40:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/83fba281-4711-4a82-9115-0f680bdbb840/export"/>
    <published>2023-08-03T12:40:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9266ec3b-f031-4fe0-955f-f9b2935cc256/export</id>
    <title>9266ec3b-f031-4fe0-955f-f9b2935cc256</title>
    <updated>2026-05-06T22:40:06.186790+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9266ec3b-f031-4fe0-955f-f9b2935cc256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41180", "type": "seen", "source": "https://t.me/cibsecurity/69710", "content": "\u203c CVE-2023-41180 \u203c\n\nIncorrect certificate validation in InvokeHTTP on Apache NiFi MiNiFi C++ versions 0.13 to 0.14 allows an intermediary to present a forged certificate during TLS handshake negotation. The Disable Peer Verification property of InvokeHTTP was effectively flipped, disabling verification by default, when using HTTPS.Mitigation: Set the Disable Peer Verification property of InvokeHTTP to true when using MiNiFi C++ versions 0.13.0 or 0.14.0. Upgrading to MiNiFi C++ 0.15.0 corrects the default behavior.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-03T20:15:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9266ec3b-f031-4fe0-955f-f9b2935cc256/export"/>
    <published>2023-09-03T20:15:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8eef420a-0b25-4c09-9160-766970624cf9/export</id>
    <title>8eef420a-0b25-4c09-9160-766970624cf9</title>
    <updated>2026-05-06T22:40:06.184487+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8eef420a-0b25-4c09-9160-766970624cf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41180", "type": "seen", "source": "https://t.me/arpsyndicate/2348", "content": "#ExploitObserverAlert\n\nCVE-2023-41180\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-41180. Incorrect certificate validation in InvokeHTTP on Apache NiFi MiNiFi C++ versions 0.13 to 0.14 allows an intermediary to present a forged certificate during TLS handshake negotation. The Disable Peer Verification property of InvokeHTTP was effectively flipped,  disabling verification by default, when using HTTPS.  Mitigation: Set the Disable Peer Verification property of InvokeHTTP to true when using MiNiFi C++ versions 0.13.0 or 0.14.0. Upgrading to MiNiFi C++ 0.15.0 corrects the default behavior.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 3.6\nNVD-ES: 2.2", "creation_timestamp": "2024-01-03T19:34:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8eef420a-0b25-4c09-9160-766970624cf9/export"/>
    <published>2024-01-03T19:34:39+00:00</published>
  </entry>
</feed>
