<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:47:00.104398+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/14f64c49-d2e2-4899-b586-fc334565fa35/export</id>
    <title>14f64c49-d2e2-4899-b586-fc334565fa35</title>
    <updated>2026-05-06T09:47:00.445107+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "14f64c49-d2e2-4899-b586-fc334565fa35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44790", "type": "seen", "source": "https://t.me/cibsecurity/54252", "content": "\u203c CVE-2022-44790 \u203c\n\nInterspire Email Marketer through 6.5.1 allows SQL Injection via the surveys module. An unauthenticated attacker could successfully perform an attack to extract potentially sensitive information from the database if the survey id exists.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-10T02:37:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/14f64c49-d2e2-4899-b586-fc334565fa35/export"/>
    <published>2022-12-10T02:37:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bc7a8d54-14f1-4f64-8489-bd0948331926/export</id>
    <title>bc7a8d54-14f1-4f64-8489-bd0948331926</title>
    <updated>2026-05-06T09:47:00.444821+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bc7a8d54-14f1-4f64-8489-bd0948331926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44792", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14907", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44792\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.\n\ud83d\udccf Published: 2022-11-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T16:12:17.885Z\n\ud83d\udd17 References:\n1. https://github.com/net-snmp/net-snmp/issues/474\n2. https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428\n3. https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html\n4. https://security.netapp.com/advisory/ntap-20230223-0011/", "creation_timestamp": "2025-05-05T16:19:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bc7a8d54-14f1-4f64-8489-bd0948331926/export"/>
    <published>2025-05-05T16:19:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/111bcec1-729e-4763-91dc-ed48df247304/export</id>
    <title>111bcec1-729e-4763-91dc-ed48df247304</title>
    <updated>2026-05-06T09:47:00.441461+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "111bcec1-729e-4763-91dc-ed48df247304", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44793", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14908", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44793\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.\n\ud83d\udccf Published: 2022-11-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T16:12:07.945Z\n\ud83d\udd17 References:\n1. https://github.com/net-snmp/net-snmp/issues/475\n2. https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f\n3. https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html\n4. https://security.netapp.com/advisory/ntap-20230223-0011/", "creation_timestamp": "2025-05-05T16:20:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/111bcec1-729e-4763-91dc-ed48df247304/export"/>
    <published>2025-05-05T16:20:00+00:00</published>
  </entry>
</feed>
