<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 23:09:49 +0000</lastBuildDate>
    <item>
      <title>872c0871-210b-4bc5-835f-b41a5ba072a9</title>
      <link>https://vulnerability.circl.lu/sighting/872c0871-210b-4bc5-835f-b41a5ba072a9/export</link>
      <description>{"uuid": "872c0871-210b-4bc5-835f-b41a5ba072a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/ctinow/162518", "content": "https://ift.tt/y4WEH1T\nCVE-2023-46739", "creation_timestamp": "2024-01-03T18:31:46.000000Z"}</description>
      <content:encoded>{"uuid": "872c0871-210b-4bc5-835f-b41a5ba072a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/ctinow/162518", "content": "https://ift.tt/y4WEH1T\nCVE-2023-46739", "creation_timestamp": "2024-01-03T18:31:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/872c0871-210b-4bc5-835f-b41a5ba072a9/export</guid>
      <pubDate>Wed, 03 Jan 2024 18:31:46 +0000</pubDate>
    </item>
    <item>
      <title>944ea50b-8825-4d1b-b753-3adf96316915</title>
      <link>https://vulnerability.circl.lu/sighting/944ea50b-8825-4d1b-b753-3adf96316915/export</link>
      <description>{"uuid": "944ea50b-8825-4d1b-b753-3adf96316915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/cibsecurity/74329", "content": "\u203c\ufe0fCVE-2023-46739\u203c\ufe0f\n\nCubeFS is an opensource cloudnative file storage system. A vulnerability was found during in the CubeFS master component in versions prior to 3.3.1 that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:36:38.000000Z"}</description>
      <content:encoded>{"uuid": "944ea50b-8825-4d1b-b753-3adf96316915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/cibsecurity/74329", "content": "\u203c\ufe0fCVE-2023-46739\u203c\ufe0f\n\nCubeFS is an opensource cloudnative file storage system. A vulnerability was found during in the CubeFS master component in versions prior to 3.3.1 that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:36:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/944ea50b-8825-4d1b-b753-3adf96316915/export</guid>
      <pubDate>Thu, 04 Jan 2024 01:36:38 +0000</pubDate>
    </item>
    <item>
      <title>dc429448-7b97-44aa-a80b-4eb5c03258d4</title>
      <link>https://vulnerability.circl.lu/sighting/dc429448-7b97-44aa-a80b-4eb5c03258d4/export</link>
      <description>{"uuid": "dc429448-7b97-44aa-a80b-4eb5c03258d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/arpsyndicate/2481", "content": "#ExploitObserverAlert\n\nCVE-2023-46739\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46739. CubeFS is an open-source cloud-native file storage system. A vulnerability was found during in the CubeFS master component in versions prior to 3.3.1 that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.", "creation_timestamp": "2024-01-05T14:07:23.000000Z"}</description>
      <content:encoded>{"uuid": "dc429448-7b97-44aa-a80b-4eb5c03258d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/arpsyndicate/2481", "content": "#ExploitObserverAlert\n\nCVE-2023-46739\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46739. CubeFS is an open-source cloud-native file storage system. A vulnerability was found during in the CubeFS master component in versions prior to 3.3.1 that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.", "creation_timestamp": "2024-01-05T14:07:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dc429448-7b97-44aa-a80b-4eb5c03258d4/export</guid>
      <pubDate>Fri, 05 Jan 2024 14:07:23 +0000</pubDate>
    </item>
    <item>
      <title>1ac0c943-035a-4062-a7a0-5294c140b80e</title>
      <link>https://vulnerability.circl.lu/sighting/1ac0c943-035a-4062-a7a0-5294c140b80e/export</link>
      <description>{"uuid": "1ac0c943-035a-4062-a7a0-5294c140b80e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/ctinow/172308", "content": "https://ift.tt/s27QwSl\nCVE-2023-46739 | CubeFS up to 3.3.0 information exposure", "creation_timestamp": "2024-01-23T21:26:15.000000Z"}</description>
      <content:encoded>{"uuid": "1ac0c943-035a-4062-a7a0-5294c140b80e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/ctinow/172308", "content": "https://ift.tt/s27QwSl\nCVE-2023-46739 | CubeFS up to 3.3.0 information exposure", "creation_timestamp": "2024-01-23T21:26:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1ac0c943-035a-4062-a7a0-5294c140b80e/export</guid>
      <pubDate>Tue, 23 Jan 2024 21:26:15 +0000</pubDate>
    </item>
  </channel>
</rss>
