<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 11:14:15 +0000</lastBuildDate>
    <item>
      <title>72a477cf-170f-487f-b05c-59164f9fc8fb</title>
      <link>https://vulnerability.circl.lu/sighting/72a477cf-170f-487f-b05c-59164f9fc8fb/export</link>
      <description>{"uuid": "72a477cf-170f-487f-b05c-59164f9fc8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41267", "type": "seen", "source": "https://t.me/cibsecurity/70429", "content": "\u203c CVE-2023-41267 \u203c\n\nIn the Apache Airflow HDFS Provider, versions prior to 4.1.1, a documentation\u00c2\u00a0info pointed users to an install incorrect pip package. As this package name was unclaimed, in theory, an attacker could claim this package and provide code that would be executed when this package was installed. The Airflow team has since taken ownership of the package (neutralizing the risk), and fixed the doc strings in version 4.1.1\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-14T12:24:19.000000Z"}</description>
      <content:encoded>{"uuid": "72a477cf-170f-487f-b05c-59164f9fc8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41267", "type": "seen", "source": "https://t.me/cibsecurity/70429", "content": "\u203c CVE-2023-41267 \u203c\n\nIn the Apache Airflow HDFS Provider, versions prior to 4.1.1, a documentation\u00c2\u00a0info pointed users to an install incorrect pip package. As this package name was unclaimed, in theory, an attacker could claim this package and provide code that would be executed when this package was installed. The Airflow team has since taken ownership of the package (neutralizing the risk), and fixed the doc strings in version 4.1.1\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-14T12:24:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/72a477cf-170f-487f-b05c-59164f9fc8fb/export</guid>
      <pubDate>Thu, 14 Sep 2023 12:24:19 +0000</pubDate>
    </item>
  </channel>
</rss>
