<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 04:12:41 +0000</lastBuildDate>
    <item>
      <title>229df25a-ee20-4d48-849a-f6f7ecd65e4f</title>
      <link>https://vulnerability.circl.lu/sighting/229df25a-ee20-4d48-849a-f6f7ecd65e4f/export</link>
      <description>{"uuid": "229df25a-ee20-4d48-849a-f6f7ecd65e4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28429", "type": "seen", "source": "https://t.me/cibsecurity/60320", "content": "\u203c CVE-2023-28429 \u203c\n\nPimcore is an open source data and experience management platform. Versions prior to 10.5.19 have an unsecured tooltip field in DataObject class definition. This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 10.5.19 or, as a workaround, apply the patch manually.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-20T17:34:08.000000Z"}</description>
      <content:encoded>{"uuid": "229df25a-ee20-4d48-849a-f6f7ecd65e4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28429", "type": "seen", "source": "https://t.me/cibsecurity/60320", "content": "\u203c CVE-2023-28429 \u203c\n\nPimcore is an open source data and experience management platform. Versions prior to 10.5.19 have an unsecured tooltip field in DataObject class definition. This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 10.5.19 or, as a workaround, apply the patch manually.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-20T17:34:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/229df25a-ee20-4d48-849a-f6f7ecd65e4f/export</guid>
      <pubDate>Mon, 20 Mar 2023 17:34:08 +0000</pubDate>
    </item>
  </channel>
</rss>
