<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T12:46:38.580516+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/39b081d5-c355-45d5-aba8-93eb6ca4e402/export</id>
    <title>39b081d5-c355-45d5-aba8-93eb6ca4e402</title>
    <updated>2026-05-04T12:46:38.920057+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "39b081d5-c355-45d5-aba8-93eb6ca4e402", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25807", "type": "seen", "source": "https://t.me/cibsecurity/59102", "content": "\u203c CVE-2023-25807 \u203c\n\nDataEase is an open source data visualization and analysis tool. When saving a dashboard on the DataEase platform saved data can be modified and store malicious code. This vulnerability can lead to the execution of malicious code stored by the attacker on the server side when the user accesses the dashboard. The vulnerability has been fixed in version 1.18.3.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-28T18:27:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/39b081d5-c355-45d5-aba8-93eb6ca4e402/export"/>
    <published>2023-02-28T18:27:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0474f9ca-131c-42b7-ad03-0ebaaa68b99d/export</id>
    <title>0474f9ca-131c-42b7-ad03-0ebaaa68b99d</title>
    <updated>2026-05-04T12:46:38.917669+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0474f9ca-131c-42b7-ad03-0ebaaa68b99d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25807", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6701", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-25807\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: DataEase is an open source data visualization and analysis tool. When saving a dashboard on the DataEase platform saved data can be modified and store malicious code. This vulnerability can lead to the execution of malicious code stored by the attacker on the server side when the user accesses the dashboard. The vulnerability has been fixed in version 1.18.3.\n\n\ud83d\udccf Published: 2023-02-28T15:05:33.087Z\n\ud83d\udccf Modified: 2025-03-06T16:26:01.200Z\n\ud83d\udd17 References:\n1. https://github.com/dataease/dataease/security/advisories/GHSA-xj3h-3wmw-j5vf\n2. https://github.com/dataease/dataease/commit/cc94fb8e69ddbb37c96d02ec0f0ddcd74273ef49", "creation_timestamp": "2025-03-06T16:33:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0474f9ca-131c-42b7-ad03-0ebaaa68b99d/export"/>
    <published>2025-03-06T16:33:59+00:00</published>
  </entry>
</feed>
