<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T00:19:39.960072+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9cf2c35d-3216-4152-88c2-8f93ef4cb409/export</id>
    <title>9cf2c35d-3216-4152-88c2-8f93ef4cb409</title>
    <updated>2026-05-09T00:19:40.398157+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9cf2c35d-3216-4152-88c2-8f93ef4cb409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1939", "type": "seen", "source": "https://t.me/arpsyndicate/1719", "content": "#ExploitObserverAlert\n\nCVE-2022-1939\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-1939. The Allow svg files WordPress plugin before 1.1 does not properly validate uploaded files, which could allow high privilege users such as admin to upload PHP files even when they are not allowed to\n\nFIRST-EPSS: 0.000860000\nNVD-IS: 5.9\nNVD-ES: 1.2", "creation_timestamp": "2023-12-11T11:24:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9cf2c35d-3216-4152-88c2-8f93ef4cb409/export"/>
    <published>2023-12-11T11:24:53+00:00</published>
  </entry>
</feed>
