<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 11:12:40 +0000</lastBuildDate>
    <item>
      <title>ddd13229-49d0-446f-aa99-efb165c00be6</title>
      <link>https://vulnerability.circl.lu/sighting/ddd13229-49d0-446f-aa99-efb165c00be6/export</link>
      <description>{"uuid": "ddd13229-49d0-446f-aa99-efb165c00be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "published-proof-of-concept", "source": "Telegram/6PZKKGQl03Vi6ZEkQInhbXHc7Cdk1szybYRTzghfbAVd-Q", "content": "", "creation_timestamp": "2023-07-02T10:21:51.000000Z"}</description>
      <content:encoded>{"uuid": "ddd13229-49d0-446f-aa99-efb165c00be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "published-proof-of-concept", "source": "Telegram/6PZKKGQl03Vi6ZEkQInhbXHc7Cdk1szybYRTzghfbAVd-Q", "content": "", "creation_timestamp": "2023-07-02T10:21:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ddd13229-49d0-446f-aa99-efb165c00be6/export</guid>
      <pubDate>Sun, 02 Jul 2023 10:21:51 +0000</pubDate>
    </item>
    <item>
      <title>158c7bc2-3d15-48df-a6f1-ae75133dfa28</title>
      <link>https://vulnerability.circl.lu/sighting/158c7bc2-3d15-48df-a6f1-ae75133dfa28/export</link>
      <description>{"uuid": "158c7bc2-3d15-48df-a6f1-ae75133dfa28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3787", "content": "\ud83d\udcdfDataLeak:\n\n\ud83d\udcccAsia Vital Components Leak : https://www.system32.ink/2023/06/asia-vital-components-leak.html\n\n\ud83d\udcccposkok_info Data Leak : https://www.system32.ink/2023/06/poskokinfo-data-leak.html\n\n\ud83d\udcccGeotecsacr Digital Marketing Agency Leak : https://www.system32.ink/2023/06/geotecsacr-digital-marketing-agency-leak.html\n\n\ud83d\udcccDarkForum Leak : https://www.system32.ink/2023/06/darkforums-data-leak.html\n\n\ud83d\udcccRussian Champion Tennis Club in Tomsk Leak : https://www.system32.ink/2023/06/russian-champion-tennis-club-in-tomsk.html\n\n\ud83e\uddeeExploits:\n\n\ud83d\udcccLightdash Exploit (CVE-2023-35844) : https://www.system32.ink/2023/06/lightdash-exploit-cve-2023-35844.html\n\n\ud83d\udcccCVE-2023-33140 OneNote Exploit : https://www.system32.ink/2023/06/cve-2023-33140-onenote-exploit.html\n\n\ud83d\udcccCVE-2023-34840 XSS POC OF angular-ui-notification : https://www.system32.ink/2023/06/cve-2023-34840-xss-poc-of-angular-ui.html\n\n\u2699\ufe0fTools:\n\n\ud83d\udcccCrackMapExec : https://www.system32.ink/2023/06/crackmapexec.html\n\n\ud83d\udcccSAFIREFUZZ - Same-Architecture Firmware Rehosting and Fuzzing : https://www.system32.ink/2023/06/safirefuzz-same-architecture-firmware.html\n\n\ud83d\udcccPwnDoc-ng - Pentest Report Generator : https://www.system32.ink/2023/06/pwndoc-ng-pentest-report-generator.html\n\n\ud83d\udcccVulnX - An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms : https://www.system32.ink/2023/06/vulnx-intelligent-bot-auto-shell.html\n\n\ud83d\udcccNetwork Signal Guru APK : https://www.system32.ink/2023/06/network-signal-guru-apk.html\n\n\ud83d\udcccGoogle CTF : https://www.system32.ink/2023/06/google-ctf.html\n\n\ud83e\udda0Rootkit ANd RAT:\n\n\ud83d\udccc888 RAT New Version 2023 ( 1.2.6 Full Setup ) For Lifetime : https://www.system32.ink/2023/06/888-rat-new-version-2023-126-full-setup.html\n\n\ud83d\udcccreveng_rtkit Rootkit : https://www.system32.ink/2023/06/revengrtkit-rootkit.html", "creation_timestamp": "2023-07-02T12:30:36.000000Z"}</description>
      <content:encoded>{"uuid": "158c7bc2-3d15-48df-a6f1-ae75133dfa28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3787", "content": "\ud83d\udcdfDataLeak:\n\n\ud83d\udcccAsia Vital Components Leak : https://www.system32.ink/2023/06/asia-vital-components-leak.html\n\n\ud83d\udcccposkok_info Data Leak : https://www.system32.ink/2023/06/poskokinfo-data-leak.html\n\n\ud83d\udcccGeotecsacr Digital Marketing Agency Leak : https://www.system32.ink/2023/06/geotecsacr-digital-marketing-agency-leak.html\n\n\ud83d\udcccDarkForum Leak : https://www.system32.ink/2023/06/darkforums-data-leak.html\n\n\ud83d\udcccRussian Champion Tennis Club in Tomsk Leak : https://www.system32.ink/2023/06/russian-champion-tennis-club-in-tomsk.html\n\n\ud83e\uddeeExploits:\n\n\ud83d\udcccLightdash Exploit (CVE-2023-35844) : https://www.system32.ink/2023/06/lightdash-exploit-cve-2023-35844.html\n\n\ud83d\udcccCVE-2023-33140 OneNote Exploit : https://www.system32.ink/2023/06/cve-2023-33140-onenote-exploit.html\n\n\ud83d\udcccCVE-2023-34840 XSS POC OF angular-ui-notification : https://www.system32.ink/2023/06/cve-2023-34840-xss-poc-of-angular-ui.html\n\n\u2699\ufe0fTools:\n\n\ud83d\udcccCrackMapExec : https://www.system32.ink/2023/06/crackmapexec.html\n\n\ud83d\udcccSAFIREFUZZ - Same-Architecture Firmware Rehosting and Fuzzing : https://www.system32.ink/2023/06/safirefuzz-same-architecture-firmware.html\n\n\ud83d\udcccPwnDoc-ng - Pentest Report Generator : https://www.system32.ink/2023/06/pwndoc-ng-pentest-report-generator.html\n\n\ud83d\udcccVulnX - An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms : https://www.system32.ink/2023/06/vulnx-intelligent-bot-auto-shell.html\n\n\ud83d\udcccNetwork Signal Guru APK : https://www.system32.ink/2023/06/network-signal-guru-apk.html\n\n\ud83d\udcccGoogle CTF : https://www.system32.ink/2023/06/google-ctf.html\n\n\ud83e\udda0Rootkit ANd RAT:\n\n\ud83d\udccc888 RAT New Version 2023 ( 1.2.6 Full Setup ) For Lifetime : https://www.system32.ink/2023/06/888-rat-new-version-2023-126-full-setup.html\n\n\ud83d\udcccreveng_rtkit Rootkit : https://www.system32.ink/2023/06/revengrtkit-rootkit.html", "creation_timestamp": "2023-07-02T12:30:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/158c7bc2-3d15-48df-a6f1-ae75133dfa28/export</guid>
      <pubDate>Sun, 02 Jul 2023 12:30:36 +0000</pubDate>
    </item>
    <item>
      <title>e4d2a21d-c388-446a-8353-9d2df242d223</title>
      <link>https://vulnerability.circl.lu/sighting/e4d2a21d-c388-446a-8353-9d2df242d223/export</link>
      <description>{"uuid": "e4d2a21d-c388-446a-8353-9d2df242d223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35843", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4710", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-35843 NocoDB \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\nURL\uff1ahttps://github.com/b3nguang/CVE-2023-35843\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-09T04:19:04.000000Z"}</description>
      <content:encoded>{"uuid": "e4d2a21d-c388-446a-8353-9d2df242d223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35843", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4710", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-35843 NocoDB \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\nURL\uff1ahttps://github.com/b3nguang/CVE-2023-35843\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-09T04:19:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e4d2a21d-c388-446a-8353-9d2df242d223/export</guid>
      <pubDate>Sun, 09 Jul 2023 04:19:04 +0000</pubDate>
    </item>
    <item>
      <title>ea12b54b-e7c0-491f-9885-b7f193191703</title>
      <link>https://vulnerability.circl.lu/sighting/ea12b54b-e7c0-491f-9885-b7f193191703/export</link>
      <description>{"uuid": "ea12b54b-e7c0-491f-9885-b7f193191703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/871", "content": "", "creation_timestamp": "2023-07-13T05:10:46.000000Z"}</description>
      <content:encoded>{"uuid": "ea12b54b-e7c0-491f-9885-b7f193191703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/871", "content": "", "creation_timestamp": "2023-07-13T05:10:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ea12b54b-e7c0-491f-9885-b7f193191703/export</guid>
      <pubDate>Thu, 13 Jul 2023 05:10:46 +0000</pubDate>
    </item>
    <item>
      <title>b7c20b63-5006-4a48-93b4-c81c8104a45e</title>
      <link>https://vulnerability.circl.lu/sighting/b7c20b63-5006-4a48-93b4-c81c8104a45e/export</link>
      <description>{"uuid": "b7c20b63-5006-4a48-93b4-c81c8104a45e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35843", "type": "seen", "source": "https://t.me/kasraone_com/376", "content": "\ud83d\udd34 CVE\n\u00a0\u00a0\u00a0\u00a0\u00a0\n      CVE-2023-35843\n\n\n\u0646\u0633\u062e\u0647 0.106.0 (\u06cc\u0627 0.109.1) \u0627\u0632 NocoDB \u062f\u0627\u0631\u0627\u06cc \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0646\u0627\u0648\u0628\u0631\u06cc \u0645\u0633\u06cc\u0631 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647 \u06cc\u06a9 \u062d\u0645\u0644\u0647\u200c\u06a9\u0646\u0646\u062f\u0647 \u0628\u062f\u0648\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0648\u06cc \u0633\u0631\u0648\u0631 \u0631\u0627 \u0628\u0627 \u062a\u063a\u06cc\u06cc\u0631 \u067e\u0627\u0631\u0627\u0645\u062a\u0631 \u0645\u0633\u06cc\u0631 \u062f\u0631 \u0645\u0633\u06cc\u0631 /download \u0645\u06cc\u200c\u062f\u0647\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u0628\u0647 \u06cc\u06a9 \u062d\u0645\u0644\u0647\u200c\u06a9\u0646\u0646\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627 \u0648 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u0631\u0648\u06cc \u0633\u0631\u0648\u0631 \u0631\u0627\u060c \u0634\u0627\u0645\u0644 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc\u060c \u06a9\u062f \u0645\u0646\u0628\u0639 \u0648 \u0633\u0627\u06cc\u0631 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633\u060c \u0628\u062f\u0647\u062f.", "creation_timestamp": "2023-07-15T05:28:23.000000Z"}</description>
      <content:encoded>{"uuid": "b7c20b63-5006-4a48-93b4-c81c8104a45e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35843", "type": "seen", "source": "https://t.me/kasraone_com/376", "content": "\ud83d\udd34 CVE\n\u00a0\u00a0\u00a0\u00a0\u00a0\n      CVE-2023-35843\n\n\n\u0646\u0633\u062e\u0647 0.106.0 (\u06cc\u0627 0.109.1) \u0627\u0632 NocoDB \u062f\u0627\u0631\u0627\u06cc \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0646\u0627\u0648\u0628\u0631\u06cc \u0645\u0633\u06cc\u0631 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647 \u06cc\u06a9 \u062d\u0645\u0644\u0647\u200c\u06a9\u0646\u0646\u062f\u0647 \u0628\u062f\u0648\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0648\u06cc \u0633\u0631\u0648\u0631 \u0631\u0627 \u0628\u0627 \u062a\u063a\u06cc\u06cc\u0631 \u067e\u0627\u0631\u0627\u0645\u062a\u0631 \u0645\u0633\u06cc\u0631 \u062f\u0631 \u0645\u0633\u06cc\u0631 /download \u0645\u06cc\u200c\u062f\u0647\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u0628\u0647 \u06cc\u06a9 \u062d\u0645\u0644\u0647\u200c\u06a9\u0646\u0646\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627 \u0648 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u0631\u0648\u06cc \u0633\u0631\u0648\u0631 \u0631\u0627\u060c \u0634\u0627\u0645\u0644 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc\u060c \u06a9\u062f \u0645\u0646\u0628\u0639 \u0648 \u0633\u0627\u06cc\u0631 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633\u060c \u0628\u062f\u0647\u062f.", "creation_timestamp": "2023-07-15T05:28:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b7c20b63-5006-4a48-93b4-c81c8104a45e/export</guid>
      <pubDate>Sat, 15 Jul 2023 05:28:23 +0000</pubDate>
    </item>
    <item>
      <title>81ba869c-685f-4e0f-83a0-dfb240687dc0</title>
      <link>https://vulnerability.circl.lu/sighting/81ba869c-685f-4e0f-83a0-dfb240687dc0/export</link>
      <description>{"uuid": "81ba869c-685f-4e0f-83a0-dfb240687dc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3584", "type": "seen", "source": "https://t.me/cibsecurity/66847", "content": "\u203c CVE-2023-3584 \u203c\n\nMattermost fails to properly check the authorization of\u00c2\u00a0POST /api/v4/teams when passing a team override scheme ID in the request,\u00c2\u00a0allowing an authenticated attacker with knowledge of a Team Override Scheme ID to create a new team with said team override scheme.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T20:40:30.000000Z"}</description>
      <content:encoded>{"uuid": "81ba869c-685f-4e0f-83a0-dfb240687dc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3584", "type": "seen", "source": "https://t.me/cibsecurity/66847", "content": "\u203c CVE-2023-3584 \u203c\n\nMattermost fails to properly check the authorization of\u00c2\u00a0POST /api/v4/teams when passing a team override scheme ID in the request,\u00c2\u00a0allowing an authenticated attacker with knowledge of a Team Override Scheme ID to create a new team with said team override scheme.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T20:40:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/81ba869c-685f-4e0f-83a0-dfb240687dc0/export</guid>
      <pubDate>Mon, 17 Jul 2023 20:40:30 +0000</pubDate>
    </item>
    <item>
      <title>5df54a45-6d2a-484e-ab3c-d5088c32e708</title>
      <link>https://vulnerability.circl.lu/sighting/5df54a45-6d2a-484e-ab3c-d5088c32e708/export</link>
      <description>{"uuid": "5df54a45-6d2a-484e-ab3c-d5088c32e708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35843", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/899", "content": "#CVE202335843", "creation_timestamp": "2023-07-22T03:48:33.000000Z"}</description>
      <content:encoded>{"uuid": "5df54a45-6d2a-484e-ab3c-d5088c32e708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35843", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/899", "content": "#CVE202335843", "creation_timestamp": "2023-07-22T03:48:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5df54a45-6d2a-484e-ab3c-d5088c32e708/export</guid>
      <pubDate>Sat, 22 Jul 2023 03:48:33 +0000</pubDate>
    </item>
    <item>
      <title>95c60f63-f1e7-4f87-9078-b561e84af032</title>
      <link>https://vulnerability.circl.lu/sighting/95c60f63-f1e7-4f87-9078-b561e84af032/export</link>
      <description>{"uuid": "95c60f63-f1e7-4f87-9078-b561e84af032", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35845", "type": "seen", "source": "https://t.me/cibsecurity/70192", "content": "\u203c CVE-2023-35845 \u203c\n\nAnaconda 3 2023.03-1-Linux allows local users to disrupt TLS certificate validation by modifying the cacert.pem file used by the installed pip program. This occurs because many files are installed as world-writable on Linux, ignoring umask, even when these files are installed as root. Miniconda is also affected.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-11T12:22:05.000000Z"}</description>
      <content:encoded>{"uuid": "95c60f63-f1e7-4f87-9078-b561e84af032", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35845", "type": "seen", "source": "https://t.me/cibsecurity/70192", "content": "\u203c CVE-2023-35845 \u203c\n\nAnaconda 3 2023.03-1-Linux allows local users to disrupt TLS certificate validation by modifying the cacert.pem file used by the installed pip program. This occurs because many files are installed as world-writable on Linux, ignoring umask, even when these files are installed as root. Miniconda is also affected.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-11T12:22:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/95c60f63-f1e7-4f87-9078-b561e84af032/export</guid>
      <pubDate>Mon, 11 Sep 2023 12:22:05 +0000</pubDate>
    </item>
    <item>
      <title>dbf2ebde-de34-4ea4-9c69-bc468eb39547</title>
      <link>https://vulnerability.circl.lu/sighting/dbf2ebde-de34-4ea4-9c69-bc468eb39547/export</link>
      <description>{"uuid": "dbf2ebde-de34-4ea4-9c69-bc468eb39547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-04)", "content": "", "creation_timestamp": "2025-04-04T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "dbf2ebde-de34-4ea4-9c69-bc468eb39547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-04)", "content": "", "creation_timestamp": "2025-04-04T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dbf2ebde-de34-4ea4-9c69-bc468eb39547/export</guid>
      <pubDate>Fri, 04 Apr 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>d6dcbf9a-f537-4b93-91b5-81a39166ae31</title>
      <link>https://vulnerability.circl.lu/sighting/d6dcbf9a-f537-4b93-91b5-81a39166ae31/export</link>
      <description>{"uuid": "d6dcbf9a-f537-4b93-91b5-81a39166ae31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "d6dcbf9a-f537-4b93-91b5-81a39166ae31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d6dcbf9a-f537-4b93-91b5-81a39166ae31/export</guid>
      <pubDate>Sun, 27 Jul 2025 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
