<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T03:08:02.137087+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de433869-49b0-485d-967a-aa8f15348d92/export</id>
    <title>de433869-49b0-485d-967a-aa8f15348d92</title>
    <updated>2026-05-01T03:08:02.463911+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "de433869-49b0-485d-967a-aa8f15348d92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/192129", "content": "https://ift.tt/BCS1E9l\nCVE-2022-43842", "creation_timestamp": "2024-02-23T20:26:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de433869-49b0-485d-967a-aa8f15348d92/export"/>
    <published>2024-02-23T20:26:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/88ee9524-8f3e-47df-ba01-c3d093d769c2/export</id>
    <title>88ee9524-8f3e-47df-ba01-c3d093d769c2</title>
    <updated>2026-05-01T03:08:02.463811+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "88ee9524-8f3e-47df-ba01-c3d093d769c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/192132", "content": "https://ift.tt/BCS1E9l\nCVE-2022-43842", "creation_timestamp": "2024-02-23T20:26:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/88ee9524-8f3e-47df-ba01-c3d093d769c2/export"/>
    <published>2024-02-23T20:26:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e366ca3a-20e5-41fe-ad16-2772cdd6b16c/export</id>
    <title>e366ca3a-20e5-41fe-ad16-2772cdd6b16c</title>
    <updated>2026-05-01T03:08:02.463713+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e366ca3a-20e5-41fe-ad16-2772cdd6b16c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/207336", "content": "https://ift.tt/J4EHRlC\nCVE-2022-43842 | IBM Aspera Console up to 3.4.2 sql injection (XFDB-239079)", "creation_timestamp": "2024-03-14T01:16:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e366ca3a-20e5-41fe-ad16-2772cdd6b16c/export"/>
    <published>2024-03-14T01:16:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9ffe1107-4339-4a0c-aece-e93f5f388257/export</id>
    <title>9ffe1107-4339-4a0c-aece-e93f5f388257</title>
    <updated>2026-05-01T03:08:02.463599+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9ffe1107-4339-4a0c-aece-e93f5f388257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4384", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8782", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4384\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information.\n\ud83d\udccf Published: 2023-02-06T19:59:16.563Z\n\ud83d\udccf Modified: 2025-03-25T20:41:44.440Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5", "creation_timestamp": "2025-03-25T21:25:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9ffe1107-4339-4a0c-aece-e93f5f388257/export"/>
    <published>2025-03-25T21:25:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5451f661-cd74-422e-8229-f7c9ffdb045f/export</id>
    <title>5451f661-cd74-422e-8229-f7c9ffdb045f</title>
    <updated>2026-05-01T03:08:02.463489+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5451f661-cd74-422e-8229-f7c9ffdb045f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11699", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43840\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4\n\nis vulnerable to an XPath injection vulnerability, which could allow an authenticated attacker to exfiltrate sensitive application data and/or determine the structure of the XML document.\n\ud83d\udccf Published: 2025-04-14T20:43:28.652Z\n\ud83d\udccf Modified: 2025-04-14T20:43:28.652Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5451f661-cd74-422e-8229-f7c9ffdb045f/export"/>
    <published>2025-04-14T20:54:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/47fd43b2-39e3-4e74-a279-c0222c26ff1e/export</id>
    <title>47fd43b2-39e3-4e74-a279-c0222c26ff1e</title>
    <updated>2026-05-01T03:08:02.463379+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "47fd43b2-39e3-4e74-a279-c0222c26ff1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11703", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43847\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4 \n\nis vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.\n\ud83d\udccf Published: 2025-04-14T20:22:01.813Z\n\ud83d\udccf Modified: 2025-04-14T20:31:15.666Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/47fd43b2-39e3-4e74-a279-c0222c26ff1e/export"/>
    <published>2025-04-14T20:54:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bb462ba9-9076-40d2-9192-247796e4f49a/export</id>
    <title>bb462ba9-9076-40d2-9192-247796e4f49a</title>
    <updated>2026-05-01T03:08:02.463275+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bb462ba9-9076-40d2-9192-247796e4f49a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvtzoj62i", "content": "", "creation_timestamp": "2025-04-14T22:38:57.388179Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bb462ba9-9076-40d2-9192-247796e4f49a/export"/>
    <published>2025-04-14T22:38:57.388179+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/43ee2db0-685e-491a-baf2-859fed26b257/export</id>
    <title>43ee2db0-685e-491a-baf2-859fed26b257</title>
    <updated>2026-05-01T03:08:02.463164+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "43ee2db0-685e-491a-baf2-859fed26b257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvugpix24", "content": "", "creation_timestamp": "2025-04-14T22:38:58.789664Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/43ee2db0-685e-491a-baf2-859fed26b257/export"/>
    <published>2025-04-14T22:38:58.789664+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/61c485d9-3979-4e3a-bf1d-3ae998785744/export</id>
    <title>61c485d9-3979-4e3a-bf1d-3ae998785744</title>
    <updated>2026-05-01T03:08:02.462999+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "61c485d9-3979-4e3a-bf1d-3ae998785744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://t.me/cvedetector/22894", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43840 - IBM Aspera Console XPath Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43840 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4  \n  \nis vulnerable to an XPath injection vulnerability, which could allow an authenticated attacker to exfiltrate sensitive application data and/or determine the structure of the XML document. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/61c485d9-3979-4e3a-bf1d-3ae998785744/export"/>
    <published>2025-04-15T01:32:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e35aa835-d14c-4d97-89d8-b0de1f44cbe0/export</id>
    <title>e35aa835-d14c-4d97-89d8-b0de1f44cbe0</title>
    <updated>2026-05-01T03:08:02.459977+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e35aa835-d14c-4d97-89d8-b0de1f44cbe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://t.me/cvedetector/22895", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43847 - IBM Aspera Console HTTP Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43847 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4   \n  \nis vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e35aa835-d14c-4d97-89d8-b0de1f44cbe0/export"/>
    <published>2025-04-15T01:32:49+00:00</published>
  </entry>
</feed>
