<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 10:53:05 +0000</lastBuildDate>
    <item>
      <title>c694c0a6-30b6-40b0-be3e-4643ab27a3e9</title>
      <link>https://db.gcve.eu/sighting/c694c0a6-30b6-40b0-be3e-4643ab27a3e9/export</link>
      <description>{"uuid": "c694c0a6-30b6-40b0-be3e-4643ab27a3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/ctinow/162521", "content": "https://ift.tt/m9GNMzy\nCVE-2023-46742", "creation_timestamp": "2024-01-03T18:31:50.000000Z"}</description>
      <content:encoded>{"uuid": "c694c0a6-30b6-40b0-be3e-4643ab27a3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/ctinow/162521", "content": "https://ift.tt/m9GNMzy\nCVE-2023-46742", "creation_timestamp": "2024-01-03T18:31:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c694c0a6-30b6-40b0-be3e-4643ab27a3e9/export</guid>
      <pubDate>Wed, 03 Jan 2024 18:31:50 +0000</pubDate>
    </item>
    <item>
      <title>8afe82a2-1fca-4f72-8d66-42fc8208559b</title>
      <link>https://db.gcve.eu/sighting/8afe82a2-1fca-4f72-8d66-42fc8208559b/export</link>
      <description>{"uuid": "8afe82a2-1fca-4f72-8d66-42fc8208559b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/cibsecurity/74332", "content": "\u203c\ufe0fCVE-2023-46742\u203c\ufe0f\n\nCubeFS is an opensource cloudnative file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lowerprivileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:36:53.000000Z"}</description>
      <content:encoded>{"uuid": "8afe82a2-1fca-4f72-8d66-42fc8208559b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/cibsecurity/74332", "content": "\u203c\ufe0fCVE-2023-46742\u203c\ufe0f\n\nCubeFS is an opensource cloudnative file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lowerprivileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:36:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8afe82a2-1fca-4f72-8d66-42fc8208559b/export</guid>
      <pubDate>Thu, 04 Jan 2024 01:36:53 +0000</pubDate>
    </item>
    <item>
      <title>31e0d7c4-fb45-49d6-b207-fd644aedc808</title>
      <link>https://db.gcve.eu/sighting/31e0d7c4-fb45-49d6-b207-fd644aedc808/export</link>
      <description>{"uuid": "31e0d7c4-fb45-49d6-b207-fd644aedc808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/arpsyndicate/2471", "content": "#ExploitObserverAlert\n\nCVE-2023-46742\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46742. CubeFS is an open-source cloud-native file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lower-privileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.", "creation_timestamp": "2024-01-05T12:16:29.000000Z"}</description>
      <content:encoded>{"uuid": "31e0d7c4-fb45-49d6-b207-fd644aedc808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/arpsyndicate/2471", "content": "#ExploitObserverAlert\n\nCVE-2023-46742\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46742. CubeFS is an open-source cloud-native file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lower-privileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.", "creation_timestamp": "2024-01-05T12:16:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/31e0d7c4-fb45-49d6-b207-fd644aedc808/export</guid>
      <pubDate>Fri, 05 Jan 2024 12:16:29 +0000</pubDate>
    </item>
    <item>
      <title>da27f2d7-df70-432b-a5f0-7d8844e89213</title>
      <link>https://db.gcve.eu/sighting/da27f2d7-df70-432b-a5f0-7d8844e89213/export</link>
      <description>{"uuid": "da27f2d7-df70-432b-a5f0-7d8844e89213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/ctinow/172275", "content": "https://ift.tt/SNtCg65\nCVE-2023-46742 | CubeFS up to 3.3.0 log file", "creation_timestamp": "2024-01-23T20:27:01.000000Z"}</description>
      <content:encoded>{"uuid": "da27f2d7-df70-432b-a5f0-7d8844e89213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46742", "type": "seen", "source": "https://t.me/ctinow/172275", "content": "https://ift.tt/SNtCg65\nCVE-2023-46742 | CubeFS up to 3.3.0 log file", "creation_timestamp": "2024-01-23T20:27:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/da27f2d7-df70-432b-a5f0-7d8844e89213/export</guid>
      <pubDate>Tue, 23 Jan 2024 20:27:01 +0000</pubDate>
    </item>
  </channel>
</rss>
