<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 11:38:02 +0000</lastBuildDate>
    <item>
      <title>c64ce66a-cc60-482e-9b34-cc27b43ff32c</title>
      <link>https://db.gcve.eu/sighting/c64ce66a-cc60-482e-9b34-cc27b43ff32c/export</link>
      <description>{"uuid": "c64ce66a-cc60-482e-9b34-cc27b43ff32c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/ctinow/162519", "content": "https://ift.tt/lLBNrkC\nCVE-2023-46740", "creation_timestamp": "2024-01-03T18:31:47.000000Z"}</description>
      <content:encoded>{"uuid": "c64ce66a-cc60-482e-9b34-cc27b43ff32c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/ctinow/162519", "content": "https://ift.tt/lLBNrkC\nCVE-2023-46740", "creation_timestamp": "2024-01-03T18:31:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c64ce66a-cc60-482e-9b34-cc27b43ff32c/export</guid>
      <pubDate>Wed, 03 Jan 2024 18:31:47 +0000</pubDate>
    </item>
    <item>
      <title>077c61fb-7242-42c8-ae52-cd941088280d</title>
      <link>https://db.gcve.eu/sighting/077c61fb-7242-42c8-ae52-cd941088280d/export</link>
      <description>{"uuid": "077c61fb-7242-42c8-ae52-cd941088280d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/cibsecurity/74330", "content": "\u203c\ufe0fCVE-2023-46740\u203c\ufe0f\n\nCubeFS is an opensource cloudnative file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate userspecific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict andor guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the accessKey. To create the \"accesKey\", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:36:43.000000Z"}</description>
      <content:encoded>{"uuid": "077c61fb-7242-42c8-ae52-cd941088280d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/cibsecurity/74330", "content": "\u203c\ufe0fCVE-2023-46740\u203c\ufe0f\n\nCubeFS is an opensource cloudnative file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate userspecific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict andor guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the accessKey. To create the \"accesKey\", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:36:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/077c61fb-7242-42c8-ae52-cd941088280d/export</guid>
      <pubDate>Thu, 04 Jan 2024 01:36:43 +0000</pubDate>
    </item>
    <item>
      <title>5bec89b7-02f8-4726-a631-4957cbc9a6bd</title>
      <link>https://db.gcve.eu/sighting/5bec89b7-02f8-4726-a631-4957cbc9a6bd/export</link>
      <description>{"uuid": "5bec89b7-02f8-4726-a631-4957cbc9a6bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/arpsyndicate/2525", "content": "#ExploitObserverAlert\n\nCVE-2023-46740\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46740. CubeFS is an open-source cloud-native file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate user-specific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict and/or guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the \u201caccessKey\u201d. To create the \"accesKey\", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.", "creation_timestamp": "2024-01-05T21:11:48.000000Z"}</description>
      <content:encoded>{"uuid": "5bec89b7-02f8-4726-a631-4957cbc9a6bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/arpsyndicate/2525", "content": "#ExploitObserverAlert\n\nCVE-2023-46740\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46740. CubeFS is an open-source cloud-native file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate user-specific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict and/or guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the \u201caccessKey\u201d. To create the \"accesKey\", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.", "creation_timestamp": "2024-01-05T21:11:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5bec89b7-02f8-4726-a631-4957cbc9a6bd/export</guid>
      <pubDate>Fri, 05 Jan 2024 21:11:48 +0000</pubDate>
    </item>
    <item>
      <title>3ffdeab7-d6c4-4a0e-954b-8fccabf176a6</title>
      <link>https://db.gcve.eu/sighting/3ffdeab7-d6c4-4a0e-954b-8fccabf176a6/export</link>
      <description>{"uuid": "3ffdeab7-d6c4-4a0e-954b-8fccabf176a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/ctinow/172292", "content": "https://ift.tt/6a9gRxO\nCVE-2023-46740 | CubeFS up to 3.3.0 random values", "creation_timestamp": "2024-01-23T21:02:07.000000Z"}</description>
      <content:encoded>{"uuid": "3ffdeab7-d6c4-4a0e-954b-8fccabf176a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46740", "type": "seen", "source": "https://t.me/ctinow/172292", "content": "https://ift.tt/6a9gRxO\nCVE-2023-46740 | CubeFS up to 3.3.0 random values", "creation_timestamp": "2024-01-23T21:02:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3ffdeab7-d6c4-4a0e-954b-8fccabf176a6/export</guid>
      <pubDate>Tue, 23 Jan 2024 21:02:07 +0000</pubDate>
    </item>
  </channel>
</rss>
