<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T18:28:50.564402+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/36bfd04c-f908-4d6a-a5af-11510af3c625/export</id>
    <title>36bfd04c-f908-4d6a-a5af-11510af3c625</title>
    <updated>2026-05-04T18:28:50.906711+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "36bfd04c-f908-4d6a-a5af-11510af3c625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45164", "type": "seen", "source": "https://t.me/cvedetector/9746", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45164 - Akamai SIA ThreatAvert Unauthorized Policy Disabling\", \n  \"Content\": \"CVE ID : CVE-2024-45164 \nPublished : Nov. 4, 2024, 2:15 p.m. | 36\u00a0minutes ago \nDescription : Akamai SIA (Secure Internet Access Enterprise) ThreatAvert, in SPS (Security and Personalization Services) before the latest 19.2.0 patch and Apps Portal before 19.2.0.3 or 19.2.0.20240814, has incorrect authorization controls for the Admin functionality on the ThreatAvert Policy page. An authenticated user can navigate directly to the /#app/intelligence/threatAvertPolicies URI and disable policy enforcement. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T16:06:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/36bfd04c-f908-4d6a-a5af-11510af3c625/export"/>
    <published>2024-11-04T16:06:52+00:00</published>
  </entry>
</feed>
