<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 10:46:57 +0000</lastBuildDate>
    <item>
      <title>83fba281-4711-4a82-9115-0f680bdbb840</title>
      <link>https://vulnerability.circl.lu/sighting/83fba281-4711-4a82-9115-0f680bdbb840/export</link>
      <description>{"uuid": "83fba281-4711-4a82-9115-0f680bdbb840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4118", "type": "seen", "source": "https://t.me/cibsecurity/67641", "content": "\u203c CVE-2023-4118 \u203c\n\nA vulnerability, which was classified as problematic, was found in Cute Http File Server 2.0. This affects an unknown part of the component Search. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235965 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-03T12:40:10.000000Z"}</description>
      <content:encoded>{"uuid": "83fba281-4711-4a82-9115-0f680bdbb840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4118", "type": "seen", "source": "https://t.me/cibsecurity/67641", "content": "\u203c CVE-2023-4118 \u203c\n\nA vulnerability, which was classified as problematic, was found in Cute Http File Server 2.0. This affects an unknown part of the component Search. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235965 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-03T12:40:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/83fba281-4711-4a82-9115-0f680bdbb840/export</guid>
      <pubDate>Thu, 03 Aug 2023 12:40:10 +0000</pubDate>
    </item>
    <item>
      <title>9266ec3b-f031-4fe0-955f-f9b2935cc256</title>
      <link>https://vulnerability.circl.lu/sighting/9266ec3b-f031-4fe0-955f-f9b2935cc256/export</link>
      <description>{"uuid": "9266ec3b-f031-4fe0-955f-f9b2935cc256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41180", "type": "seen", "source": "https://t.me/cibsecurity/69710", "content": "\u203c CVE-2023-41180 \u203c\n\nIncorrect certificate validation in InvokeHTTP on Apache NiFi MiNiFi C++ versions 0.13 to 0.14 allows an intermediary to present a forged certificate during TLS handshake negotation. The Disable Peer Verification property of InvokeHTTP was effectively flipped, disabling verification by default, when using HTTPS.Mitigation: Set the Disable Peer Verification property of InvokeHTTP to true when using MiNiFi C++ versions 0.13.0 or 0.14.0. Upgrading to MiNiFi C++ 0.15.0 corrects the default behavior.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-03T20:15:34.000000Z"}</description>
      <content:encoded>{"uuid": "9266ec3b-f031-4fe0-955f-f9b2935cc256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41180", "type": "seen", "source": "https://t.me/cibsecurity/69710", "content": "\u203c CVE-2023-41180 \u203c\n\nIncorrect certificate validation in InvokeHTTP on Apache NiFi MiNiFi C++ versions 0.13 to 0.14 allows an intermediary to present a forged certificate during TLS handshake negotation. The Disable Peer Verification property of InvokeHTTP was effectively flipped, disabling verification by default, when using HTTPS.Mitigation: Set the Disable Peer Verification property of InvokeHTTP to true when using MiNiFi C++ versions 0.13.0 or 0.14.0. Upgrading to MiNiFi C++ 0.15.0 corrects the default behavior.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-03T20:15:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9266ec3b-f031-4fe0-955f-f9b2935cc256/export</guid>
      <pubDate>Sun, 03 Sep 2023 20:15:34 +0000</pubDate>
    </item>
    <item>
      <title>8eef420a-0b25-4c09-9160-766970624cf9</title>
      <link>https://vulnerability.circl.lu/sighting/8eef420a-0b25-4c09-9160-766970624cf9/export</link>
      <description>{"uuid": "8eef420a-0b25-4c09-9160-766970624cf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41180", "type": "seen", "source": "https://t.me/arpsyndicate/2348", "content": "#ExploitObserverAlert\n\nCVE-2023-41180\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-41180. Incorrect certificate validation in InvokeHTTP on Apache NiFi MiNiFi C++ versions 0.13 to 0.14 allows an intermediary to present a forged certificate during TLS handshake negotation. The Disable Peer Verification property of InvokeHTTP was effectively flipped,  disabling verification by default, when using HTTPS.  Mitigation: Set the Disable Peer Verification property of InvokeHTTP to true when using MiNiFi C++ versions 0.13.0 or 0.14.0. Upgrading to MiNiFi C++ 0.15.0 corrects the default behavior.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 3.6\nNVD-ES: 2.2", "creation_timestamp": "2024-01-03T19:34:39.000000Z"}</description>
      <content:encoded>{"uuid": "8eef420a-0b25-4c09-9160-766970624cf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41180", "type": "seen", "source": "https://t.me/arpsyndicate/2348", "content": "#ExploitObserverAlert\n\nCVE-2023-41180\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-41180. Incorrect certificate validation in InvokeHTTP on Apache NiFi MiNiFi C++ versions 0.13 to 0.14 allows an intermediary to present a forged certificate during TLS handshake negotation. The Disable Peer Verification property of InvokeHTTP was effectively flipped,  disabling verification by default, when using HTTPS.  Mitigation: Set the Disable Peer Verification property of InvokeHTTP to true when using MiNiFi C++ versions 0.13.0 or 0.14.0. Upgrading to MiNiFi C++ 0.15.0 corrects the default behavior.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 3.6\nNVD-ES: 2.2", "creation_timestamp": "2024-01-03T19:34:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8eef420a-0b25-4c09-9160-766970624cf9/export</guid>
      <pubDate>Wed, 03 Jan 2024 19:34:39 +0000</pubDate>
    </item>
  </channel>
</rss>
