<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:11:51 +0000</lastBuildDate>
    <item>
      <title>d6b81e6a-4ac9-4aa0-9f26-0a5d331df85d</title>
      <link>https://vulnerability.circl.lu/sighting/d6b81e6a-4ac9-4aa0-9f26-0a5d331df85d/export</link>
      <description>{"uuid": "d6b81e6a-4ac9-4aa0-9f26-0a5d331df85d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0229", "type": "seen", "source": "https://t.me/cibsecurity/39335", "content": "\u203c CVE-2022-0229 \u203c\n\nThe miniOrange's Google Authenticator WordPress plugin before 5.5 does not have proper authorisation and CSRF checks when handling the reconfigureMethod, and does not validate the parameters passed to it properly. As a result, unauthenticated users could delete arbitrary options from the blog, making it unusable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-21T21:26:40.000000Z"}</description>
      <content:encoded>{"uuid": "d6b81e6a-4ac9-4aa0-9f26-0a5d331df85d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0229", "type": "seen", "source": "https://t.me/cibsecurity/39335", "content": "\u203c CVE-2022-0229 \u203c\n\nThe miniOrange's Google Authenticator WordPress plugin before 5.5 does not have proper authorisation and CSRF checks when handling the reconfigureMethod, and does not validate the parameters passed to it properly. As a result, unauthenticated users could delete arbitrary options from the blog, making it unusable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-21T21:26:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d6b81e6a-4ac9-4aa0-9f26-0a5d331df85d/export</guid>
      <pubDate>Mon, 21 Mar 2022 21:26:40 +0000</pubDate>
    </item>
  </channel>
</rss>
