<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T12:11:15.445460+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9535441d-953e-4576-9373-4236d6bd64fe/export</id>
    <title>9535441d-953e-4576-9373-4236d6bd64fe</title>
    <updated>2026-05-07T12:11:15.885484+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9535441d-953e-4576-9373-4236d6bd64fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30738", "type": "seen", "source": "https://t.me/cibsecurity/43959", "content": "\u203c CVE-2022-30738 \u203c\n\nImproper check in Loader in Samsung Internet prior to 17.0.1.69 allows attackers to spoof address bar via executing script.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-07T22:37:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9535441d-953e-4576-9373-4236d6bd64fe/export"/>
    <published>2022-06-07T22:37:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/90f1ab19-4184-4224-bd75-af5da8f260ba/export</id>
    <title>90f1ab19-4184-4224-bd75-af5da8f260ba</title>
    <updated>2026-05-07T12:11:15.885390+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "90f1ab19-4184-4224-bd75-af5da8f260ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30733", "type": "seen", "source": "https://t.me/cibsecurity/43963", "content": "\u203c CVE-2022-30733 \u203c\n\nSensitive information exposure in Sign-in log in Samsung Account prior to version 13.2.00.6 allows attackers to get an user email or phone number without permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-07T22:37:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/90f1ab19-4184-4224-bd75-af5da8f260ba/export"/>
    <published>2022-06-07T22:37:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8d545b9b-a2cb-4931-b673-b587ab4ee605/export</id>
    <title>8d545b9b-a2cb-4931-b673-b587ab4ee605</title>
    <updated>2026-05-07T12:11:15.885310+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8d545b9b-a2cb-4931-b673-b587ab4ee605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30739", "type": "seen", "source": "https://t.me/cibsecurity/43968", "content": "\u203c CVE-2022-30739 \u203c\n\nImproper privilege management vulnerability in Samsung Account prior to 13.2.00.6 allows attackers to get an user email or phone number with a normal level permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-07T22:37:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8d545b9b-a2cb-4931-b673-b587ab4ee605/export"/>
    <published>2022-06-07T22:37:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e6e6c161-ca7a-4711-8447-8b30135859ee/export</id>
    <title>e6e6c161-ca7a-4711-8447-8b30135859ee</title>
    <updated>2026-05-07T12:11:15.885224+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e6e6c161-ca7a-4711-8447-8b30135859ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30735", "type": "seen", "source": "https://t.me/cibsecurity/43970", "content": "\u203c CVE-2022-30735 \u203c\n\nImproper privilege management vulnerability in Samsung Account prior to 13.2.00.6 allows attackers to get the access_token without permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-07T22:37:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e6e6c161-ca7a-4711-8447-8b30135859ee/export"/>
    <published>2022-06-07T22:37:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/644eb052-8b4f-4c91-bd64-168dd52f8c93/export</id>
    <title>644eb052-8b4f-4c91-bd64-168dd52f8c93</title>
    <updated>2026-05-07T12:11:15.885145+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "644eb052-8b4f-4c91-bd64-168dd52f8c93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30732", "type": "seen", "source": "https://t.me/cibsecurity/43971", "content": "\u203c CVE-2022-30732 \u203c\n\nExposure of Sensitive Information vulnerability in Samsung Account prior to version 13.2.00.6 allows attacker to access sensitive information via onActivityResult.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-07T22:37:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/644eb052-8b4f-4c91-bd64-168dd52f8c93/export"/>
    <published>2022-06-07T22:37:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9ada9405-96ab-4254-8a5c-3ca5be896b9a/export</id>
    <title>9ada9405-96ab-4254-8a5c-3ca5be896b9a</title>
    <updated>2026-05-07T12:11:15.885054+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9ada9405-96ab-4254-8a5c-3ca5be896b9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30736", "type": "seen", "source": "https://t.me/cibsecurity/43973", "content": "\u203c CVE-2022-30736 \u203c\n\nImproper privilege management vulnerability in Samsung Account prior to 13.2.00.6 allows attackers to get the data of contact and gallery without permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-07T22:37:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9ada9405-96ab-4254-8a5c-3ca5be896b9a/export"/>
    <published>2022-06-07T22:37:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/67d8cb08-d181-4571-96d5-62e6f435fd6a/export</id>
    <title>67d8cb08-d181-4571-96d5-62e6f435fd6a</title>
    <updated>2026-05-07T12:11:15.884926+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "67d8cb08-d181-4571-96d5-62e6f435fd6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30730", "type": "seen", "source": "https://t.me/cibsecurity/43974", "content": "\u203c CVE-2022-30730 \u203c\n\nImproper authorization in Samsung Pass prior to 1.0.00.33 allows physical attackers to acess account list without authentication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-07T22:37:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/67d8cb08-d181-4571-96d5-62e6f435fd6a/export"/>
    <published>2022-06-07T22:37:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f4254f84-6ada-418e-8110-e7513e0ce1fc/export</id>
    <title>f4254f84-6ada-418e-8110-e7513e0ce1fc</title>
    <updated>2026-05-07T12:11:15.882691+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f4254f84-6ada-418e-8110-e7513e0ce1fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30731", "type": "seen", "source": "https://t.me/cibsecurity/43975", "content": "\u203c CVE-2022-30731 \u203c\n\nImproper access control vulnerability in My Files prior to version 13.1.00.193 allows attackers to access arbitrary private files in My Files application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-08T17:49:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f4254f84-6ada-418e-8110-e7513e0ce1fc/export"/>
    <published>2022-06-08T17:49:51+00:00</published>
  </entry>
</feed>
