<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T22:11:14.533107+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a6300134-b59d-4bcb-aebd-9917ade28b4f/export</id>
    <title>a6300134-b59d-4bcb-aebd-9917ade28b4f</title>
    <updated>2026-05-10T22:11:14.901547+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a6300134-b59d-4bcb-aebd-9917ade28b4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1761", "type": "seen", "source": "https://t.me/cibsecurity/44275", "content": "\u203c CVE-2022-1761 \u203c\n\nThe Peter\u00c3\u00a2\u00e2\u201a\u00ac\u00e2\u201e\u00a2s Collaboration E-mails WordPress plugin through 2.2.0 is vulnerable to CSRF due to missing nonce checks. This allows the change of its settings, which can be used to lower the required user level, change texts, the used email address and more.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-13T16:17:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a6300134-b59d-4bcb-aebd-9917ade28b4f/export"/>
    <published>2022-06-13T16:17:05+00:00</published>
  </entry>
</feed>
