<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T14:13:17.678368+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c694c0a6-30b6-40b0-be3e-4643ab27a3e9/export</id>
    <title>c694c0a6-30b6-40b0-be3e-4643ab27a3e9</title>
    <updated>2026-05-06T14:13:18.029205+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c694c0a6-30b6-40b0-be3e-4643ab27a3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/ctinow/162521", "content": "https://ift.tt/m9GNMzy\nCVE-2023-46742", "creation_timestamp": "2024-01-03T18:31:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c694c0a6-30b6-40b0-be3e-4643ab27a3e9/export"/>
    <published>2024-01-03T18:31:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8afe82a2-1fca-4f72-8d66-42fc8208559b/export</id>
    <title>8afe82a2-1fca-4f72-8d66-42fc8208559b</title>
    <updated>2026-05-06T14:13:18.029113+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8afe82a2-1fca-4f72-8d66-42fc8208559b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/cibsecurity/74332", "content": "\u203c\ufe0fCVE-2023-46742\u203c\ufe0f\n\nCubeFS is an opensource cloudnative file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lowerprivileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:36:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8afe82a2-1fca-4f72-8d66-42fc8208559b/export"/>
    <published>2024-01-04T01:36:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/31e0d7c4-fb45-49d6-b207-fd644aedc808/export</id>
    <title>31e0d7c4-fb45-49d6-b207-fd644aedc808</title>
    <updated>2026-05-06T14:13:18.028970+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "31e0d7c4-fb45-49d6-b207-fd644aedc808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/arpsyndicate/2471", "content": "#ExploitObserverAlert\n\nCVE-2023-46742\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46742. CubeFS is an open-source cloud-native file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lower-privileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.", "creation_timestamp": "2024-01-05T12:16:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/31e0d7c4-fb45-49d6-b207-fd644aedc808/export"/>
    <published>2024-01-05T12:16:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/da27f2d7-df70-432b-a5f0-7d8844e89213/export</id>
    <title>da27f2d7-df70-432b-a5f0-7d8844e89213</title>
    <updated>2026-05-06T14:13:18.025783+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "da27f2d7-df70-432b-a5f0-7d8844e89213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/ctinow/172275", "content": "https://ift.tt/SNtCg65\nCVE-2023-46742 | CubeFS up to 3.3.0 log file", "creation_timestamp": "2024-01-23T20:27:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/da27f2d7-df70-432b-a5f0-7d8844e89213/export"/>
    <published>2024-01-23T20:27:01+00:00</published>
  </entry>
</feed>
