<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 10:12:00 +0000</lastBuildDate>
    <item>
      <title>21d0550b-5978-4760-8ec4-e99bdc706219</title>
      <link>https://vulnerability.circl.lu/sighting/21d0550b-5978-4760-8ec4-e99bdc706219/export</link>
      <description>{"uuid": "21d0550b-5978-4760-8ec4-e99bdc706219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41834", "type": "seen", "source": "https://t.me/cibsecurity/70718", "content": "\u203c CVE-2023-41834 \u203c\n\nImproper Neutralization of CRLF Sequences in HTTP Headers in Apache Flink Stateful Functions 3.1.0, 3.1.1 and 3.2.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted HTTP requests.\u00c2\u00a0Attackers could potentially inject malicious content into the HTTP response that is sent to the user's browser. Users should upgrade to Apache Flink Stateful Functions version 3.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-19T16:29:26.000000Z"}</description>
      <content:encoded>{"uuid": "21d0550b-5978-4760-8ec4-e99bdc706219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41834", "type": "seen", "source": "https://t.me/cibsecurity/70718", "content": "\u203c CVE-2023-41834 \u203c\n\nImproper Neutralization of CRLF Sequences in HTTP Headers in Apache Flink Stateful Functions 3.1.0, 3.1.1 and 3.2.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted HTTP requests.\u00c2\u00a0Attackers could potentially inject malicious content into the HTTP response that is sent to the user's browser. Users should upgrade to Apache Flink Stateful Functions version 3.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-19T16:29:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/21d0550b-5978-4760-8ec4-e99bdc706219/export</guid>
      <pubDate>Tue, 19 Sep 2023 16:29:26 +0000</pubDate>
    </item>
  </channel>
</rss>
