<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 00:44:17 +0000</lastBuildDate>
    <item>
      <title>9cf2c35d-3216-4152-88c2-8f93ef4cb409</title>
      <link>https://vulnerability.circl.lu/sighting/9cf2c35d-3216-4152-88c2-8f93ef4cb409/export</link>
      <description>{"uuid": "9cf2c35d-3216-4152-88c2-8f93ef4cb409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1939", "type": "seen", "source": "https://t.me/arpsyndicate/1719", "content": "#ExploitObserverAlert\n\nCVE-2022-1939\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-1939. The Allow svg files WordPress plugin before 1.1 does not properly validate uploaded files, which could allow high privilege users such as admin to upload PHP files even when they are not allowed to\n\nFIRST-EPSS: 0.000860000\nNVD-IS: 5.9\nNVD-ES: 1.2", "creation_timestamp": "2023-12-11T11:24:53.000000Z"}</description>
      <content:encoded>{"uuid": "9cf2c35d-3216-4152-88c2-8f93ef4cb409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1939", "type": "seen", "source": "https://t.me/arpsyndicate/1719", "content": "#ExploitObserverAlert\n\nCVE-2022-1939\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-1939. The Allow svg files WordPress plugin before 1.1 does not properly validate uploaded files, which could allow high privilege users such as admin to upload PHP files even when they are not allowed to\n\nFIRST-EPSS: 0.000860000\nNVD-IS: 5.9\nNVD-ES: 1.2", "creation_timestamp": "2023-12-11T11:24:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9cf2c35d-3216-4152-88c2-8f93ef4cb409/export</guid>
      <pubDate>Mon, 11 Dec 2023 11:24:53 +0000</pubDate>
    </item>
  </channel>
</rss>
