<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 00:54:08 +0000</lastBuildDate>
    <item>
      <title>0785e01c-d8f1-478c-91d9-120e541e9e57</title>
      <link>https://vulnerability.circl.lu/sighting/0785e01c-d8f1-478c-91d9-120e541e9e57/export</link>
      <description>{"uuid": "0785e01c-d8f1-478c-91d9-120e541e9e57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39264", "type": "seen", "source": "https://t.me/cibsecurity/70002", "content": "\u203c CVE-2023-39264 \u203c\n\nBy default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users.\u00c2\u00a0This vulnerability exists in Apache Superset versions up to and including 2.1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T16:17:45.000000Z"}</description>
      <content:encoded>{"uuid": "0785e01c-d8f1-478c-91d9-120e541e9e57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39264", "type": "seen", "source": "https://t.me/cibsecurity/70002", "content": "\u203c CVE-2023-39264 \u203c\n\nBy default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users.\u00c2\u00a0This vulnerability exists in Apache Superset versions up to and including 2.1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T16:17:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0785e01c-d8f1-478c-91d9-120e541e9e57/export</guid>
      <pubDate>Wed, 06 Sep 2023 16:17:45 +0000</pubDate>
    </item>
    <item>
      <title>e2767404-f8fb-49da-9944-ea6702f961cb</title>
      <link>https://vulnerability.circl.lu/sighting/e2767404-f8fb-49da-9944-ea6702f961cb/export</link>
      <description>{"uuid": "e2767404-f8fb-49da-9944-ea6702f961cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39264", "type": "seen", "source": "https://t.me/arpsyndicate/593", "content": "#ExploitObserverAlert\n\nCVE-2023-39264\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-39264. By default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users.\u00a0This vulnerability exists in Apache Superset versions up to and including 2.1.0.\n\nFIRST-EPSS: 0.000620000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2023-11-27T21:38:11.000000Z"}</description>
      <content:encoded>{"uuid": "e2767404-f8fb-49da-9944-ea6702f961cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39264", "type": "seen", "source": "https://t.me/arpsyndicate/593", "content": "#ExploitObserverAlert\n\nCVE-2023-39264\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-39264. By default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users.\u00a0This vulnerability exists in Apache Superset versions up to and including 2.1.0.\n\nFIRST-EPSS: 0.000620000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2023-11-27T21:38:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e2767404-f8fb-49da-9944-ea6702f961cb/export</guid>
      <pubDate>Mon, 27 Nov 2023 21:38:11 +0000</pubDate>
    </item>
  </channel>
</rss>
