<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 19:54:32 +0000</lastBuildDate>
    <item>
      <title>1999bbd9-446a-4f4f-9345-8f9384aaf20c</title>
      <link>https://vulnerability.circl.lu/sighting/1999bbd9-446a-4f4f-9345-8f9384aaf20c/export</link>
      <description>{"uuid": "1999bbd9-446a-4f4f-9345-8f9384aaf20c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30359", "type": "seen", "source": "https://t.me/cvedetector/8965", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-30359 - OvalEdge Authentication Bypass: Sensitive User Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2022-30359 \nPublished : Oct. 25, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserList. Authentication is required. The information disclosed is associated with the all registered users, including user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T20:25:53.000000Z"}</description>
      <content:encoded>{"uuid": "1999bbd9-446a-4f4f-9345-8f9384aaf20c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30359", "type": "seen", "source": "https://t.me/cvedetector/8965", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-30359 - OvalEdge Authentication Bypass: Sensitive User Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2022-30359 \nPublished : Oct. 25, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserList. Authentication is required. The information disclosed is associated with the all registered users, including user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T20:25:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1999bbd9-446a-4f4f-9345-8f9384aaf20c/export</guid>
      <pubDate>Fri, 25 Oct 2024 20:25:53 +0000</pubDate>
    </item>
  </channel>
</rss>
