<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:34:04 +0000</lastBuildDate>
    <item>
      <title>780607ce-4dd3-4c04-bb72-7c4b3e9cc625</title>
      <link>https://vulnerability.circl.lu/sighting/780607ce-4dd3-4c04-bb72-7c4b3e9cc625/export</link>
      <description>{"uuid": "780607ce-4dd3-4c04-bb72-7c4b3e9cc625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35908", "type": "seen", "source": "https://t.me/cibsecurity/66530", "content": "\u203c CVE-2023-35908 \u203c\n\nApache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unauthorized read access to a DAG through the URL.\u00c2\u00a0It is recommended to upgrade to a version that is not affected\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-12T14:45:36.000000Z"}</description>
      <content:encoded>{"uuid": "780607ce-4dd3-4c04-bb72-7c4b3e9cc625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35908", "type": "seen", "source": "https://t.me/cibsecurity/66530", "content": "\u203c CVE-2023-35908 \u203c\n\nApache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unauthorized read access to a DAG through the URL.\u00c2\u00a0It is recommended to upgrade to a version that is not affected\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-12T14:45:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/780607ce-4dd3-4c04-bb72-7c4b3e9cc625/export</guid>
      <pubDate>Wed, 12 Jul 2023 14:45:36 +0000</pubDate>
    </item>
    <item>
      <title>6ef99642-4878-4eb8-90f8-a8d0c0619a4b</title>
      <link>https://vulnerability.circl.lu/sighting/6ef99642-4878-4eb8-90f8-a8d0c0619a4b/export</link>
      <description>{"uuid": "6ef99642-4878-4eb8-90f8-a8d0c0619a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3590", "type": "seen", "source": "https://t.me/cibsecurity/66836", "content": "\u203c CVE-2023-3590 \u203c\n\nMattermost\u00c2\u00a0fails to delete card attachments in Boards, allowing an attacker to access deleted attachments.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T20:40:16.000000Z"}</description>
      <content:encoded>{"uuid": "6ef99642-4878-4eb8-90f8-a8d0c0619a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3590", "type": "seen", "source": "https://t.me/cibsecurity/66836", "content": "\u203c CVE-2023-3590 \u203c\n\nMattermost\u00c2\u00a0fails to delete card attachments in Boards, allowing an attacker to access deleted attachments.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T20:40:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6ef99642-4878-4eb8-90f8-a8d0c0619a4b/export</guid>
      <pubDate>Mon, 17 Jul 2023 20:40:16 +0000</pubDate>
    </item>
    <item>
      <title>116ad06a-1bc1-4cb2-be30-4ce70a94e205</title>
      <link>https://vulnerability.circl.lu/sighting/116ad06a-1bc1-4cb2-be30-4ce70a94e205/export</link>
      <description>{"uuid": "116ad06a-1bc1-4cb2-be30-4ce70a94e205", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35900", "type": "seen", "source": "https://t.me/cibsecurity/66979", "content": "\u203c CVE-2023-35900 \u203c\n\nIBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.4 and 23.0.0 through 23.0.5 is vulnerable to disclosing server version information which may be used to determine software vulnerabilities at the operating system level. IBM X-Force ID: 259368.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-19T07:24:48.000000Z"}</description>
      <content:encoded>{"uuid": "116ad06a-1bc1-4cb2-be30-4ce70a94e205", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35900", "type": "seen", "source": "https://t.me/cibsecurity/66979", "content": "\u203c CVE-2023-35900 \u203c\n\nIBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.4 and 23.0.0 through 23.0.5 is vulnerable to disclosing server version information which may be used to determine software vulnerabilities at the operating system level. IBM X-Force ID: 259368.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-19T07:24:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/116ad06a-1bc1-4cb2-be30-4ce70a94e205/export</guid>
      <pubDate>Wed, 19 Jul 2023 07:24:48 +0000</pubDate>
    </item>
    <item>
      <title>ea006fb6-c1f4-48e9-91cd-4655ceab7a74</title>
      <link>https://vulnerability.circl.lu/sighting/ea006fb6-c1f4-48e9-91cd-4655ceab7a74/export</link>
      <description>{"uuid": "ea006fb6-c1f4-48e9-91cd-4655ceab7a74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35906", "type": "seen", "source": "https://t.me/cibsecurity/69819", "content": "\u203c CVE-2023-35906 \u203c\n\nIBM Aspera Faspex 5.0.5 could allow a remote attacked to bypass IP restrictions due to improper access controls. IBM X-Force ID: 259649.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T07:16:52.000000Z"}</description>
      <content:encoded>{"uuid": "ea006fb6-c1f4-48e9-91cd-4655ceab7a74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35906", "type": "seen", "source": "https://t.me/cibsecurity/69819", "content": "\u203c CVE-2023-35906 \u203c\n\nIBM Aspera Faspex 5.0.5 could allow a remote attacked to bypass IP restrictions due to improper access controls. IBM X-Force ID: 259649.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T07:16:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ea006fb6-c1f4-48e9-91cd-4655ceab7a74/export</guid>
      <pubDate>Tue, 05 Sep 2023 07:16:52 +0000</pubDate>
    </item>
    <item>
      <title>45e676b5-9545-40e9-b2f0-b1792fb62847</title>
      <link>https://vulnerability.circl.lu/sighting/45e676b5-9545-40e9-b2f0-b1792fb62847/export</link>
      <description>{"uuid": "45e676b5-9545-40e9-b2f0-b1792fb62847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35909", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1276", "content": "", "creation_timestamp": "2024-11-17T03:13:55.000000Z"}</description>
      <content:encoded>{"uuid": "45e676b5-9545-40e9-b2f0-b1792fb62847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35909", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1276", "content": "", "creation_timestamp": "2024-11-17T03:13:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/45e676b5-9545-40e9-b2f0-b1792fb62847/export</guid>
      <pubDate>Sun, 17 Nov 2024 03:13:55 +0000</pubDate>
    </item>
    <item>
      <title>3c2428e6-6952-4df8-bb02-3697895e83ab</title>
      <link>https://vulnerability.circl.lu/sighting/3c2428e6-6952-4df8-bb02-3697895e83ab/export</link>
      <description>{"uuid": "3c2428e6-6952-4df8-bb02-3697895e83ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113912641474357507", "content": "", "creation_timestamp": "2025-01-29T16:42:48.269364Z"}</description>
      <content:encoded>{"uuid": "3c2428e6-6952-4df8-bb02-3697895e83ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113912641474357507", "content": "", "creation_timestamp": "2025-01-29T16:42:48.269364Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3c2428e6-6952-4df8-bb02-3697895e83ab/export</guid>
      <pubDate>Wed, 29 Jan 2025 16:42:48 +0000</pubDate>
    </item>
    <item>
      <title>dc5b8f21-96ad-4003-a760-7c4f26cd5d07</title>
      <link>https://vulnerability.circl.lu/sighting/dc5b8f21-96ad-4003-a760-7c4f26cd5d07/export</link>
      <description>{"uuid": "dc5b8f21-96ad-4003-a760-7c4f26cd5d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgvhutgt762t", "content": "", "creation_timestamp": "2025-01-29T17:15:43.302742Z"}</description>
      <content:encoded>{"uuid": "dc5b8f21-96ad-4003-a760-7c4f26cd5d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgvhutgt762t", "content": "", "creation_timestamp": "2025-01-29T17:15:43.302742Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dc5b8f21-96ad-4003-a760-7c4f26cd5d07/export</guid>
      <pubDate>Wed, 29 Jan 2025 17:15:43 +0000</pubDate>
    </item>
    <item>
      <title>9bc095e9-d8bd-43ef-a130-7b3fae61c90c</title>
      <link>https://vulnerability.circl.lu/sighting/9bc095e9-d8bd-43ef-a130-7b3fae61c90c/export</link>
      <description>{"uuid": "9bc095e9-d8bd-43ef-a130-7b3fae61c90c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3389", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35907\n\ud83d\udd25 CVSS Score: 5.8 (CVSS_V3)\n\ud83d\udd39 Description: IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.\n\ud83d\udccf Published: 2025-01-29T18:31:22Z\n\ud83d\udccf Modified: 2025-01-29T18:31:22Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-35907\n2. https://www.ibm.com/support/pages/node/7181814", "creation_timestamp": "2025-01-29T19:11:28.000000Z"}</description>
      <content:encoded>{"uuid": "9bc095e9-d8bd-43ef-a130-7b3fae61c90c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3389", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35907\n\ud83d\udd25 CVSS Score: 5.8 (CVSS_V3)\n\ud83d\udd39 Description: IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.\n\ud83d\udccf Published: 2025-01-29T18:31:22Z\n\ud83d\udccf Modified: 2025-01-29T18:31:22Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-35907\n2. https://www.ibm.com/support/pages/node/7181814", "creation_timestamp": "2025-01-29T19:11:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9bc095e9-d8bd-43ef-a130-7b3fae61c90c/export</guid>
      <pubDate>Wed, 29 Jan 2025 19:11:28 +0000</pubDate>
    </item>
    <item>
      <title>6c371ddb-576b-4c60-bc3b-0e8f0cff3968</title>
      <link>https://vulnerability.circl.lu/sighting/6c371ddb-576b-4c60-bc3b-0e8f0cff3968/export</link>
      <description>{"uuid": "6c371ddb-576b-4c60-bc3b-0e8f0cff3968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgvojtrdoh2k", "content": "", "creation_timestamp": "2025-01-29T19:14:55.143519Z"}</description>
      <content:encoded>{"uuid": "6c371ddb-576b-4c60-bc3b-0e8f0cff3968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgvojtrdoh2k", "content": "", "creation_timestamp": "2025-01-29T19:14:55.143519Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6c371ddb-576b-4c60-bc3b-0e8f0cff3968/export</guid>
      <pubDate>Wed, 29 Jan 2025 19:14:55 +0000</pubDate>
    </item>
    <item>
      <title>472832e2-80e9-43d1-aad4-45b93b59cbaf</title>
      <link>https://vulnerability.circl.lu/sighting/472832e2-80e9-43d1-aad4-45b93b59cbaf/export</link>
      <description>{"uuid": "472832e2-80e9-43d1-aad4-45b93b59cbaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://t.me/cvedetector/16691", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-35907 - IBM Aspera Faspex Authentication Weakness\", \n  \"Content\": \"CVE ID : CVE-2023-35907 \nPublished : Jan. 29, 2025, 5:15 p.m. | 59\u00a0minutes ago \nDescription : IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-29T19:52:03.000000Z"}</description>
      <content:encoded>{"uuid": "472832e2-80e9-43d1-aad4-45b93b59cbaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35907", "type": "seen", "source": "https://t.me/cvedetector/16691", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-35907 - IBM Aspera Faspex Authentication Weakness\", \n  \"Content\": \"CVE ID : CVE-2023-35907 \nPublished : Jan. 29, 2025, 5:15 p.m. | 59\u00a0minutes ago \nDescription : IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-29T19:52:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/472832e2-80e9-43d1-aad4-45b93b59cbaf/export</guid>
      <pubDate>Wed, 29 Jan 2025 19:52:03 +0000</pubDate>
    </item>
  </channel>
</rss>
