<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 19:54:35 +0000</lastBuildDate>
    <item>
      <title>d9b8cc32-d6e9-4495-b6b1-9fa8186a7768</title>
      <link>https://vulnerability.circl.lu/sighting/d9b8cc32-d6e9-4495-b6b1-9fa8186a7768/export</link>
      <description>{"uuid": "d9b8cc32-d6e9-4495-b6b1-9fa8186a7768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43228", "type": "seen", "source": "https://t.me/cibsecurity/52254", "content": "\u203c CVE-2022-43228 (barangay_management_system) \u203c\n\nBarangay Management System v1.0 was discovered to contain a SQL injection vulnerability via the hidden_id parameter at /clearance/clearance.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T22:29:50.000000Z"}</description>
      <content:encoded>{"uuid": "d9b8cc32-d6e9-4495-b6b1-9fa8186a7768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43228", "type": "seen", "source": "https://t.me/cibsecurity/52254", "content": "\u203c CVE-2022-43228 (barangay_management_system) \u203c\n\nBarangay Management System v1.0 was discovered to contain a SQL injection vulnerability via the hidden_id parameter at /clearance/clearance.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T22:29:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d9b8cc32-d6e9-4495-b6b1-9fa8186a7768/export</guid>
      <pubDate>Fri, 28 Oct 2022 22:29:50 +0000</pubDate>
    </item>
    <item>
      <title>553a531a-c082-4866-a11c-3ae668102df3</title>
      <link>https://vulnerability.circl.lu/sighting/553a531a-c082-4866-a11c-3ae668102df3/export</link>
      <description>{"uuid": "553a531a-c082-4866-a11c-3ae668102df3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43221", "type": "seen", "source": "https://t.me/cibsecurity/52369", "content": "\u203c CVE-2022-43221 \u203c\n\nopen5gs v2.4.11 was discovered to contain a memory leak in the component src/upf/pfcp-path.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PFCP packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T17:13:43.000000Z"}</description>
      <content:encoded>{"uuid": "553a531a-c082-4866-a11c-3ae668102df3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43221", "type": "seen", "source": "https://t.me/cibsecurity/52369", "content": "\u203c CVE-2022-43221 \u203c\n\nopen5gs v2.4.11 was discovered to contain a memory leak in the component src/upf/pfcp-path.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PFCP packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T17:13:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/553a531a-c082-4866-a11c-3ae668102df3/export</guid>
      <pubDate>Tue, 01 Nov 2022 17:13:43 +0000</pubDate>
    </item>
    <item>
      <title>e10cb54c-0712-4b91-aa0d-5b628612596a</title>
      <link>https://vulnerability.circl.lu/sighting/e10cb54c-0712-4b91-aa0d-5b628612596a/export</link>
      <description>{"uuid": "e10cb54c-0712-4b91-aa0d-5b628612596a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43223", "type": "seen", "source": "https://t.me/cibsecurity/52373", "content": "\u203c CVE-2022-43223 \u203c\n\nopen5gs v2.4.11 was discovered to contain a memory leak in the component ngap-handler.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted UE attachment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T17:13:50.000000Z"}</description>
      <content:encoded>{"uuid": "e10cb54c-0712-4b91-aa0d-5b628612596a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43223", "type": "seen", "source": "https://t.me/cibsecurity/52373", "content": "\u203c CVE-2022-43223 \u203c\n\nopen5gs v2.4.11 was discovered to contain a memory leak in the component ngap-handler.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted UE attachment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T17:13:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e10cb54c-0712-4b91-aa0d-5b628612596a/export</guid>
      <pubDate>Tue, 01 Nov 2022 17:13:50 +0000</pubDate>
    </item>
    <item>
      <title>cc36b4a5-6ac9-49c8-ad61-c65e3e123e56</title>
      <link>https://vulnerability.circl.lu/sighting/cc36b4a5-6ac9-49c8-ad61-c65e3e123e56/export</link>
      <description>{"uuid": "cc36b4a5-6ac9-49c8-ad61-c65e3e123e56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43222", "type": "seen", "source": "https://t.me/cibsecurity/52376", "content": "\u203c CVE-2022-43222 \u203c\n\nopen5gs v2.4.11 was discovered to contain a memory leak in the component src/smf/pfcp-path.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PFCP packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T17:13:53.000000Z"}</description>
      <content:encoded>{"uuid": "cc36b4a5-6ac9-49c8-ad61-c65e3e123e56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43222", "type": "seen", "source": "https://t.me/cibsecurity/52376", "content": "\u203c CVE-2022-43222 \u203c\n\nopen5gs v2.4.11 was discovered to contain a memory leak in the component src/smf/pfcp-path.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PFCP packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T17:13:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cc36b4a5-6ac9-49c8-ad61-c65e3e123e56/export</guid>
      <pubDate>Tue, 01 Nov 2022 17:13:53 +0000</pubDate>
    </item>
    <item>
      <title>5777c10a-ea1a-4805-9ecf-e7741b3e64c7</title>
      <link>https://vulnerability.circl.lu/sighting/5777c10a-ea1a-4805-9ecf-e7741b3e64c7/export</link>
      <description>{"uuid": "5777c10a-ea1a-4805-9ecf-e7741b3e64c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43227", "type": "seen", "source": "https://t.me/cibsecurity/52481", "content": "\u203c CVE-2022-43227 \u203c\n\nOnline Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/admin/?page=appointments/view_appointment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T19:19:46.000000Z"}</description>
      <content:encoded>{"uuid": "5777c10a-ea1a-4805-9ecf-e7741b3e64c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43227", "type": "seen", "source": "https://t.me/cibsecurity/52481", "content": "\u203c CVE-2022-43227 \u203c\n\nOnline Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/admin/?page=appointments/view_appointment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T19:19:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5777c10a-ea1a-4805-9ecf-e7741b3e64c7/export</guid>
      <pubDate>Wed, 02 Nov 2022 19:19:46 +0000</pubDate>
    </item>
    <item>
      <title>a6cb8d8d-32ab-4b74-b219-be4023a4ba17</title>
      <link>https://vulnerability.circl.lu/sighting/a6cb8d8d-32ab-4b74-b219-be4023a4ba17/export</link>
      <description>{"uuid": "a6cb8d8d-32ab-4b74-b219-be4023a4ba17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43226", "type": "seen", "source": "https://t.me/cibsecurity/52488", "content": "\u203c CVE-2022-43226 \u203c\n\nOnline Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/?page=appointments/view_appointment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T19:19:56.000000Z"}</description>
      <content:encoded>{"uuid": "a6cb8d8d-32ab-4b74-b219-be4023a4ba17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43226", "type": "seen", "source": "https://t.me/cibsecurity/52488", "content": "\u203c CVE-2022-43226 \u203c\n\nOnline Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/?page=appointments/view_appointment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T19:19:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a6cb8d8d-32ab-4b74-b219-be4023a4ba17/export</guid>
      <pubDate>Wed, 02 Nov 2022 19:19:56 +0000</pubDate>
    </item>
    <item>
      <title>8e14ba87-bfea-4aa3-9c86-519ee5af2863</title>
      <link>https://vulnerability.circl.lu/sighting/8e14ba87-bfea-4aa3-9c86-519ee5af2863/export</link>
      <description>{"uuid": "8e14ba87-bfea-4aa3-9c86-519ee5af2863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4322", "type": "seen", "source": "https://t.me/cibsecurity/54117", "content": "\u203c CVE-2022-4322 \u203c\n\nA vulnerability, which was classified as critical, was found in maku-boot up to 2.2.0. This affects the function doExecute of the file AbstractScheduleJob.java of the component Scheduled Task Handler. The manipulation leads to injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 446eb7294332efca2bfd791bc37281cedac0d0ff. It is recommended to apply a patch to fix this issue. The identifier VDB-215013 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-07T12:24:50.000000Z"}</description>
      <content:encoded>{"uuid": "8e14ba87-bfea-4aa3-9c86-519ee5af2863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4322", "type": "seen", "source": "https://t.me/cibsecurity/54117", "content": "\u203c CVE-2022-4322 \u203c\n\nA vulnerability, which was classified as critical, was found in maku-boot up to 2.2.0. This affects the function doExecute of the file AbstractScheduleJob.java of the component Scheduled Task Handler. The manipulation leads to injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 446eb7294332efca2bfd791bc37281cedac0d0ff. It is recommended to apply a patch to fix this issue. The identifier VDB-215013 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-07T12:24:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8e14ba87-bfea-4aa3-9c86-519ee5af2863/export</guid>
      <pubDate>Wed, 07 Dec 2022 12:24:50 +0000</pubDate>
    </item>
    <item>
      <title>5d2e16d7-c411-4b5d-ac32-5f94dbe3ca9b</title>
      <link>https://vulnerability.circl.lu/sighting/5d2e16d7-c411-4b5d-ac32-5f94dbe3ca9b/export</link>
      <description>{"uuid": "5d2e16d7-c411-4b5d-ac32-5f94dbe3ca9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43227", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14507", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43227\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/admin/?page=appointments/view_appointment.\n\ud83d\udccf Published: 2022-11-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T15:57:50.265Z\n\ud83d\udd17 References:\n1. https://github.com/Happyd99/bug_report/blob/main/vendors/oretnom23/online-diagnostic-lab-management-system/SQLi-2.md", "creation_timestamp": "2025-05-02T16:15:59.000000Z"}</description>
      <content:encoded>{"uuid": "5d2e16d7-c411-4b5d-ac32-5f94dbe3ca9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43227", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14507", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43227\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/admin/?page=appointments/view_appointment.\n\ud83d\udccf Published: 2022-11-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T15:57:50.265Z\n\ud83d\udd17 References:\n1. https://github.com/Happyd99/bug_report/blob/main/vendors/oretnom23/online-diagnostic-lab-management-system/SQLi-2.md", "creation_timestamp": "2025-05-02T16:15:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5d2e16d7-c411-4b5d-ac32-5f94dbe3ca9b/export</guid>
      <pubDate>Fri, 02 May 2025 16:15:59 +0000</pubDate>
    </item>
    <item>
      <title>32df84f8-3846-49dc-92a0-ac30739c0d9f</title>
      <link>https://vulnerability.circl.lu/sighting/32df84f8-3846-49dc-92a0-ac30739c0d9f/export</link>
      <description>{"uuid": "32df84f8-3846-49dc-92a0-ac30739c0d9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43223", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14600", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43223\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: open5gs v2.4.11 was discovered to contain a memory leak in the component ngap-handler.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted UE attachment.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T21:12:00.825Z\n\ud83d\udd17 References:\n1. https://github.com/ToughRunner/Open5gs_bugreport2", "creation_timestamp": "2025-05-02T21:16:20.000000Z"}</description>
      <content:encoded>{"uuid": "32df84f8-3846-49dc-92a0-ac30739c0d9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43223", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14600", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43223\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: open5gs v2.4.11 was discovered to contain a memory leak in the component ngap-handler.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted UE attachment.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T21:12:00.825Z\n\ud83d\udd17 References:\n1. https://github.com/ToughRunner/Open5gs_bugreport2", "creation_timestamp": "2025-05-02T21:16:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/32df84f8-3846-49dc-92a0-ac30739c0d9f/export</guid>
      <pubDate>Fri, 02 May 2025 21:16:20 +0000</pubDate>
    </item>
    <item>
      <title>fc63a0fe-bd7f-4af1-82ab-509e8301970b</title>
      <link>https://vulnerability.circl.lu/sighting/fc63a0fe-bd7f-4af1-82ab-509e8301970b/export</link>
      <description>{"uuid": "fc63a0fe-bd7f-4af1-82ab-509e8301970b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43226", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14614", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43226\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/?page=appointments/view_appointment.\n\ud83d\udccf Published: 2022-11-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T20:49:54.822Z\n\ud83d\udd17 References:\n1. https://github.com/Happyd99/bug_report/blob/main/vendors/oretnom23/online-diagnostic-lab-management-system/SQLi-1.md", "creation_timestamp": "2025-05-02T21:16:37.000000Z"}</description>
      <content:encoded>{"uuid": "fc63a0fe-bd7f-4af1-82ab-509e8301970b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43226", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14614", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43226\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/?page=appointments/view_appointment.\n\ud83d\udccf Published: 2022-11-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T20:49:54.822Z\n\ud83d\udd17 References:\n1. https://github.com/Happyd99/bug_report/blob/main/vendors/oretnom23/online-diagnostic-lab-management-system/SQLi-1.md", "creation_timestamp": "2025-05-02T21:16:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fc63a0fe-bd7f-4af1-82ab-509e8301970b/export</guid>
      <pubDate>Fri, 02 May 2025 21:16:37 +0000</pubDate>
    </item>
  </channel>
</rss>
