<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 05:50:37 +0000</lastBuildDate>
    <item>
      <title>b64c2cf0-5293-4025-8287-b255fa93ffef</title>
      <link>https://vulnerability.circl.lu/sighting/b64c2cf0-5293-4025-8287-b255fa93ffef/export</link>
      <description>{"uuid": "b64c2cf0-5293-4025-8287-b255fa93ffef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4760", "type": "seen", "source": "https://t.me/cibsecurity/56841", "content": "\u203c CVE-2022-4760 \u203c\n\nThe OneClick Chat to Order WordPress plugin before 1.0.4.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-23T18:25:11.000000Z"}</description>
      <content:encoded>{"uuid": "b64c2cf0-5293-4025-8287-b255fa93ffef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4760", "type": "seen", "source": "https://t.me/cibsecurity/56841", "content": "\u203c CVE-2022-4760 \u203c\n\nThe OneClick Chat to Order WordPress plugin before 1.0.4.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-23T18:25:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b64c2cf0-5293-4025-8287-b255fa93ffef/export</guid>
      <pubDate>Mon, 23 Jan 2023 18:25:11 +0000</pubDate>
    </item>
    <item>
      <title>b5e5ff01-49da-4eb9-b21e-dfca006e4935</title>
      <link>https://vulnerability.circl.lu/sighting/b5e5ff01-49da-4eb9-b21e-dfca006e4935/export</link>
      <description>{"uuid": "b5e5ff01-49da-4eb9-b21e-dfca006e4935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47602", "type": "seen", "source": "https://t.me/cibsecurity/61153", "content": "\u203c CVE-2022-47602 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in JoomUnited WP Table Manager plugin &amp;lt;= 3.5.2 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-30T00:16:06.000000Z"}</description>
      <content:encoded>{"uuid": "b5e5ff01-49da-4eb9-b21e-dfca006e4935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47602", "type": "seen", "source": "https://t.me/cibsecurity/61153", "content": "\u203c CVE-2022-47602 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in JoomUnited WP Table Manager plugin &amp;lt;= 3.5.2 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-30T00:16:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b5e5ff01-49da-4eb9-b21e-dfca006e4935/export</guid>
      <pubDate>Thu, 30 Mar 2023 00:16:06 +0000</pubDate>
    </item>
    <item>
      <title>87bd6d5f-5b55-48f2-8043-e9e5e4f9a935</title>
      <link>https://vulnerability.circl.lu/sighting/87bd6d5f-5b55-48f2-8043-e9e5e4f9a935/export</link>
      <description>{"uuid": "87bd6d5f-5b55-48f2-8043-e9e5e4f9a935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47608", "type": "seen", "source": "https://t.me/cibsecurity/62816", "content": "\u203c CVE-2022-47608 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Fullworks Quick Contact Form plugin &amp;lt;=\u00c2\u00a08.0.3.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-25T20:24:54.000000Z"}</description>
      <content:encoded>{"uuid": "87bd6d5f-5b55-48f2-8043-e9e5e4f9a935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47608", "type": "seen", "source": "https://t.me/cibsecurity/62816", "content": "\u203c CVE-2022-47608 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Fullworks Quick Contact Form plugin &amp;lt;=\u00c2\u00a08.0.3.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-25T20:24:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/87bd6d5f-5b55-48f2-8043-e9e5e4f9a935/export</guid>
      <pubDate>Tue, 25 Apr 2023 20:24:54 +0000</pubDate>
    </item>
    <item>
      <title>748353f2-d7d0-48e8-b028-e5fa8cc98dad</title>
      <link>https://vulnerability.circl.lu/sighting/748353f2-d7d0-48e8-b028-e5fa8cc98dad/export</link>
      <description>{"uuid": "748353f2-d7d0-48e8-b028-e5fa8cc98dad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47600", "type": "seen", "source": "https://t.me/cibsecurity/63733", "content": "\u203c CVE-2022-47600 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Mass Email To users plugin &amp;lt;=\u00c2\u00a01.1.4 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T14:14:18.000000Z"}</description>
      <content:encoded>{"uuid": "748353f2-d7d0-48e8-b028-e5fa8cc98dad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47600", "type": "seen", "source": "https://t.me/cibsecurity/63733", "content": "\u203c CVE-2022-47600 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Mass Email To users plugin &amp;lt;=\u00c2\u00a01.1.4 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T14:14:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/748353f2-d7d0-48e8-b028-e5fa8cc98dad/export</guid>
      <pubDate>Wed, 10 May 2023 14:14:18 +0000</pubDate>
    </item>
    <item>
      <title>4e853e4e-cb4d-4b7e-b45c-f65e061508a8</title>
      <link>https://vulnerability.circl.lu/sighting/4e853e4e-cb4d-4b7e-b45c-f65e061508a8/export</link>
      <description>{"uuid": "4e853e4e-cb4d-4b7e-b45c-f65e061508a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47606", "type": "seen", "source": "https://t.me/cibsecurity/63738", "content": "\u203c CVE-2022-47606 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tim Stephenson WP-CORS plugin &amp;lt;=\u00c2\u00a00.2.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T14:14:26.000000Z"}</description>
      <content:encoded>{"uuid": "4e853e4e-cb4d-4b7e-b45c-f65e061508a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47606", "type": "seen", "source": "https://t.me/cibsecurity/63738", "content": "\u203c CVE-2022-47606 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tim Stephenson WP-CORS plugin &amp;lt;=\u00c2\u00a00.2.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T14:14:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4e853e4e-cb4d-4b7e-b45c-f65e061508a8/export</guid>
      <pubDate>Wed, 10 May 2023 14:14:26 +0000</pubDate>
    </item>
    <item>
      <title>ecb417ca-89db-4193-b2e1-dea3dfcb0896</title>
      <link>https://vulnerability.circl.lu/sighting/ecb417ca-89db-4193-b2e1-dea3dfcb0896/export</link>
      <description>{"uuid": "ecb417ca-89db-4193-b2e1-dea3dfcb0896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47609", "type": "seen", "source": "https://t.me/cibsecurity/64510", "content": "\u203c CVE-2022-47609 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Nicearma DNUI plugin &amp;lt;=\u00c2\u00a02.8.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T12:25:35.000000Z"}</description>
      <content:encoded>{"uuid": "ecb417ca-89db-4193-b2e1-dea3dfcb0896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47609", "type": "seen", "source": "https://t.me/cibsecurity/64510", "content": "\u203c CVE-2022-47609 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Nicearma DNUI plugin &amp;lt;=\u00c2\u00a02.8.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T12:25:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ecb417ca-89db-4193-b2e1-dea3dfcb0896/export</guid>
      <pubDate>Mon, 22 May 2023 12:25:35 +0000</pubDate>
    </item>
    <item>
      <title>7f8dfffb-8de3-4c61-ac48-c1e4227c6d8c</title>
      <link>https://vulnerability.circl.lu/sighting/7f8dfffb-8de3-4c61-ac48-c1e4227c6d8c/export</link>
      <description>{"uuid": "7f8dfffb-8de3-4c61-ac48-c1e4227c6d8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47601", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lerhw6vyho22", "content": "", "creation_timestamp": "2025-01-02T16:15:28.659758Z"}</description>
      <content:encoded>{"uuid": "7f8dfffb-8de3-4c61-ac48-c1e4227c6d8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47601", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lerhw6vyho22", "content": "", "creation_timestamp": "2025-01-02T16:15:28.659758Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7f8dfffb-8de3-4c61-ac48-c1e4227c6d8c/export</guid>
      <pubDate>Thu, 02 Jan 2025 16:15:28 +0000</pubDate>
    </item>
    <item>
      <title>0acf2708-98c3-48ab-86a8-ba51fcda9aa9</title>
      <link>https://vulnerability.circl.lu/sighting/0acf2708-98c3-48ab-86a8-ba51fcda9aa9/export</link>
      <description>{"uuid": "0acf2708-98c3-48ab-86a8-ba51fcda9aa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47601", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lerjxkzmot25", "content": "", "creation_timestamp": "2025-01-02T16:52:00.713017Z"}</description>
      <content:encoded>{"uuid": "0acf2708-98c3-48ab-86a8-ba51fcda9aa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47601", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lerjxkzmot25", "content": "", "creation_timestamp": "2025-01-02T16:52:00.713017Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0acf2708-98c3-48ab-86a8-ba51fcda9aa9/export</guid>
      <pubDate>Thu, 02 Jan 2025 16:52:00 +0000</pubDate>
    </item>
    <item>
      <title>edb87de2-d799-4cd3-872f-248588e303fb</title>
      <link>https://vulnerability.circl.lu/sighting/edb87de2-d799-4cd3-872f-248588e303fb/export</link>
      <description>{"uuid": "edb87de2-d799-4cd3-872f-248588e303fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47601", "type": "seen", "source": "https://t.me/cvedetector/14185", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-47601 - \"JoomUnited WP Table Manager Authorization Bypass\"\", \n  \"Content\": \"CVE ID : CVE-2022-47601 \nPublished : Jan. 2, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : Missing Authorization vulnerability in JoomUnited WP Table Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Table Manager: from n/a through 3.5.2. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T17:36:42.000000Z"}</description>
      <content:encoded>{"uuid": "edb87de2-d799-4cd3-872f-248588e303fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47601", "type": "seen", "source": "https://t.me/cvedetector/14185", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-47601 - \"JoomUnited WP Table Manager Authorization Bypass\"\", \n  \"Content\": \"CVE ID : CVE-2022-47601 \nPublished : Jan. 2, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : Missing Authorization vulnerability in JoomUnited WP Table Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Table Manager: from n/a through 3.5.2. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T17:36:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/edb87de2-d799-4cd3-872f-248588e303fb/export</guid>
      <pubDate>Thu, 02 Jan 2025 17:36:42 +0000</pubDate>
    </item>
  </channel>
</rss>
