<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T21:35:32.268326+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8f9082b4-e881-408e-addf-643e6c883835/export</id>
    <title>8f9082b4-e881-408e-addf-643e6c883835</title>
    <updated>2026-05-04T21:35:32.551229+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8f9082b4-e881-408e-addf-643e6c883835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28437", "type": "seen", "source": "https://t.me/cibsecurity/60728", "content": "\u203c CVE-2023-28437 \u203c\n\nDataease is an open source data visualization and analysis tool. The blacklist for SQL injection protection is missing entries. This vulnerability has been fixed in version 1.18.5. There are no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-25T06:38:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8f9082b4-e881-408e-addf-643e6c883835/export"/>
    <published>2023-03-25T06:38:02+00:00</published>
  </entry>
</feed>
