<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T22:49:32.003684+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c64ce66a-cc60-482e-9b34-cc27b43ff32c/export</id>
    <title>c64ce66a-cc60-482e-9b34-cc27b43ff32c</title>
    <updated>2026-05-06T22:49:32.333026+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c64ce66a-cc60-482e-9b34-cc27b43ff32c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/ctinow/162519", "content": "https://ift.tt/lLBNrkC\nCVE-2023-46740", "creation_timestamp": "2024-01-03T18:31:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c64ce66a-cc60-482e-9b34-cc27b43ff32c/export"/>
    <published>2024-01-03T18:31:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/077c61fb-7242-42c8-ae52-cd941088280d/export</id>
    <title>077c61fb-7242-42c8-ae52-cd941088280d</title>
    <updated>2026-05-06T22:49:32.332888+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "077c61fb-7242-42c8-ae52-cd941088280d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/cibsecurity/74330", "content": "\u203c\ufe0fCVE-2023-46740\u203c\ufe0f\n\nCubeFS is an opensource cloudnative file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate userspecific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict andor guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the accessKey. To create the \"accesKey\", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:36:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/077c61fb-7242-42c8-ae52-cd941088280d/export"/>
    <published>2024-01-04T01:36:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5bec89b7-02f8-4726-a631-4957cbc9a6bd/export</id>
    <title>5bec89b7-02f8-4726-a631-4957cbc9a6bd</title>
    <updated>2026-05-06T22:49:32.332673+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5bec89b7-02f8-4726-a631-4957cbc9a6bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/arpsyndicate/2525", "content": "#ExploitObserverAlert\n\nCVE-2023-46740\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46740. CubeFS is an open-source cloud-native file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate user-specific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict and/or guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the \u201caccessKey\u201d. To create the \"accesKey\", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.", "creation_timestamp": "2024-01-05T21:11:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5bec89b7-02f8-4726-a631-4957cbc9a6bd/export"/>
    <published>2024-01-05T21:11:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3ffdeab7-d6c4-4a0e-954b-8fccabf176a6/export</id>
    <title>3ffdeab7-d6c4-4a0e-954b-8fccabf176a6</title>
    <updated>2026-05-06T22:49:32.330715+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3ffdeab7-d6c4-4a0e-954b-8fccabf176a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/ctinow/172292", "content": "https://ift.tt/6a9gRxO\nCVE-2023-46740 | CubeFS up to 3.3.0 random values", "creation_timestamp": "2024-01-23T21:02:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3ffdeab7-d6c4-4a0e-954b-8fccabf176a6/export"/>
    <published>2024-01-23T21:02:07+00:00</published>
  </entry>
</feed>
