<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:20:06.165682+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/72a477cf-170f-487f-b05c-59164f9fc8fb/export</id>
    <title>72a477cf-170f-487f-b05c-59164f9fc8fb</title>
    <updated>2026-05-04T10:20:06.590574+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "72a477cf-170f-487f-b05c-59164f9fc8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41267", "type": "seen", "source": "https://t.me/cibsecurity/70429", "content": "\u203c CVE-2023-41267 \u203c\n\nIn the Apache Airflow HDFS Provider, versions prior to 4.1.1, a documentation\u00c2\u00a0info pointed users to an install incorrect pip package. As this package name was unclaimed, in theory, an attacker could claim this package and provide code that would be executed when this package was installed. The Airflow team has since taken ownership of the package (neutralizing the risk), and fixed the doc strings in version 4.1.1\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-14T12:24:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/72a477cf-170f-487f-b05c-59164f9fc8fb/export"/>
    <published>2023-09-14T12:24:19+00:00</published>
  </entry>
</feed>
