<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T02:02:18.519022+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c2a9d76a-cc0b-4ded-b851-45d56f2dc960/export</id>
    <title>c2a9d76a-cc0b-4ded-b851-45d56f2dc960</title>
    <updated>2026-05-10T02:02:18.889229+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c2a9d76a-cc0b-4ded-b851-45d56f2dc960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0773", "type": "seen", "source": "https://t.me/cibsecurity/41751", "content": "\u203c CVE-2022-0773 \u203c\n\nThe Documentor WordPress plugin through 1.5.3 fails to sanitize and escape user input before it is being interpolated in an SQL statement and then executed, leading to an SQL Injection exploitable by unauthenticated users.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-02T20:28:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c2a9d76a-cc0b-4ded-b851-45d56f2dc960/export"/>
    <published>2022-05-02T20:28:23+00:00</published>
  </entry>
</feed>
