<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T08:59:47.387986+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d633331a-5d11-4acb-b97a-a1edbdb49847/export</id>
    <title>d633331a-5d11-4acb-b97a-a1edbdb49847</title>
    <updated>2026-05-06T08:59:47.706958+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d633331a-5d11-4acb-b97a-a1edbdb49847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41714", "type": "seen", "source": "https://t.me/cibsecurity/52542", "content": "\u203c CVE-2022-41714 \u203c\n\nfastest-json-copy version 1.0.1 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-03T23:26:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d633331a-5d11-4acb-b97a-a1edbdb49847/export"/>
    <published>2022-11-03T23:26:07+00:00</published>
  </entry>
</feed>
