<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:54:43.945611+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1999bbd9-446a-4f4f-9345-8f9384aaf20c/export</id>
    <title>1999bbd9-446a-4f4f-9345-8f9384aaf20c</title>
    <updated>2026-05-04T19:54:44.377004+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1999bbd9-446a-4f4f-9345-8f9384aaf20c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30359", "type": "seen", "source": "https://t.me/cvedetector/8965", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-30359 - OvalEdge Authentication Bypass: Sensitive User Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2022-30359 \nPublished : Oct. 25, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserList. Authentication is required. The information disclosed is associated with the all registered users, including user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T20:25:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1999bbd9-446a-4f4f-9345-8f9384aaf20c/export"/>
    <published>2024-10-25T20:25:53+00:00</published>
  </entry>
</feed>
