<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 19:54:55 +0000</lastBuildDate>
    <item>
      <title>bd8d3537-b3d6-409d-9200-3d14bb5dbb71</title>
      <link>https://vulnerability.circl.lu/sighting/bd8d3537-b3d6-409d-9200-3d14bb5dbb71/export</link>
      <description>{"uuid": "bd8d3537-b3d6-409d-9200-3d14bb5dbb71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28637", "type": "seen", "source": "https://t.me/cibsecurity/60974", "content": "\u203c CVE-2023-28637 \u203c\n\nDataEase is an open source data visualization analysis tool. In Dataease users are normally allowed to modify data and the data sources are expected to properly sanitize data. The AWS redshift data source does not provide data sanitization which may lead to remote code execution. This vulnerability has been fixed in v1.18.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:49:54.000000Z"}</description>
      <content:encoded>{"uuid": "bd8d3537-b3d6-409d-9200-3d14bb5dbb71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28637", "type": "seen", "source": "https://t.me/cibsecurity/60974", "content": "\u203c CVE-2023-28637 \u203c\n\nDataEase is an open source data visualization analysis tool. In Dataease users are normally allowed to modify data and the data sources are expected to properly sanitize data. The AWS redshift data source does not provide data sanitization which may lead to remote code execution. This vulnerability has been fixed in v1.18.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:49:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bd8d3537-b3d6-409d-9200-3d14bb5dbb71/export</guid>
      <pubDate>Wed, 29 Mar 2023 00:49:54 +0000</pubDate>
    </item>
  </channel>
</rss>
