<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 14:33:30 +0000</lastBuildDate>
    <item>
      <title>05d24edb-12f3-4cff-9466-85a01c498726</title>
      <link>https://vulnerability.circl.lu/sighting/05d24edb-12f3-4cff-9466-85a01c498726/export</link>
      <description>{"uuid": "05d24edb-12f3-4cff-9466-85a01c498726", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28154", "type": "seen", "source": "https://t.me/cibsecurity/24816", "content": "\u203c CVE-2021-28154 \u203c\n\n** DISPUTED ** Camunda Modeler (aka camunda-modeler) through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states \"The way we secured the app is that it does not allow any remote scripts to be opened, no unsafe scripts to be evaluated, no remote sites to be browsed.\"\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-12T00:54:41.000000Z"}</description>
      <content:encoded>{"uuid": "05d24edb-12f3-4cff-9466-85a01c498726", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28154", "type": "seen", "source": "https://t.me/cibsecurity/24816", "content": "\u203c CVE-2021-28154 \u203c\n\n** DISPUTED ** Camunda Modeler (aka camunda-modeler) through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states \"The way we secured the app is that it does not allow any remote scripts to be opened, no unsafe scripts to be evaluated, no remote sites to be browsed.\"\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-12T00:54:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/05d24edb-12f3-4cff-9466-85a01c498726/export</guid>
      <pubDate>Fri, 12 Mar 2021 00:54:41 +0000</pubDate>
    </item>
  </channel>
</rss>
