<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:12:30.843791+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d6b81e6a-4ac9-4aa0-9f26-0a5d331df85d/export</id>
    <title>d6b81e6a-4ac9-4aa0-9f26-0a5d331df85d</title>
    <updated>2026-05-04T09:12:31.191005+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d6b81e6a-4ac9-4aa0-9f26-0a5d331df85d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0229", "type": "seen", "source": "https://t.me/cibsecurity/39335", "content": "\u203c CVE-2022-0229 \u203c\n\nThe miniOrange's Google Authenticator WordPress plugin before 5.5 does not have proper authorisation and CSRF checks when handling the reconfigureMethod, and does not validate the parameters passed to it properly. As a result, unauthenticated users could delete arbitrary options from the blog, making it unusable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-21T21:26:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d6b81e6a-4ac9-4aa0-9f26-0a5d331df85d/export"/>
    <published>2022-03-21T21:26:40+00:00</published>
  </entry>
</feed>
