<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:24:49 +0000</lastBuildDate>
    <item>
      <title>18337409-713f-4427-a507-79ecb4bc35c4</title>
      <link>https://vulnerability.circl.lu/sighting/18337409-713f-4427-a507-79ecb4bc35c4/export</link>
      <description>{"uuid": "18337409-713f-4427-a507-79ecb4bc35c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1599", "type": "seen", "source": "https://t.me/cibsecurity/45912", "content": "\u203c CVE-2022-1599 \u203c\n\nThe Admin Management Xtended WordPress plugin before 2.4.5 does not have CSRF checks in some of its AJAX actions, allowing attackers to make a logged users with the right capabilities to call them. This can lead to changes in post status (draft, published), slug, post date, comment status (enabled, disabled) and more.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-11T16:19:19.000000Z"}</description>
      <content:encoded>{"uuid": "18337409-713f-4427-a507-79ecb4bc35c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1599", "type": "seen", "source": "https://t.me/cibsecurity/45912", "content": "\u203c CVE-2022-1599 \u203c\n\nThe Admin Management Xtended WordPress plugin before 2.4.5 does not have CSRF checks in some of its AJAX actions, allowing attackers to make a logged users with the right capabilities to call them. This can lead to changes in post status (draft, published), slug, post date, comment status (enabled, disabled) and more.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-11T16:19:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/18337409-713f-4427-a507-79ecb4bc35c4/export</guid>
      <pubDate>Mon, 11 Jul 2022 16:19:19 +0000</pubDate>
    </item>
  </channel>
</rss>
