<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 23:49:42 +0000</lastBuildDate>
    <item>
      <title>eb87f244-e546-4587-958d-59beb0409b26</title>
      <link>https://vulnerability.circl.lu/sighting/eb87f244-e546-4587-958d-59beb0409b26/export</link>
      <description>{"uuid": "eb87f244-e546-4587-958d-59beb0409b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43232", "type": "seen", "source": "https://t.me/cibsecurity/52250", "content": "\u203c CVE-2022-43232 (canteen_management_system) \u203c\n\nCanteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the userid parameter at /php_action/fetchOrderData.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T22:29:47.000000Z"}</description>
      <content:encoded>{"uuid": "eb87f244-e546-4587-958d-59beb0409b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43232", "type": "seen", "source": "https://t.me/cibsecurity/52250", "content": "\u203c CVE-2022-43232 (canteen_management_system) \u203c\n\nCanteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the userid parameter at /php_action/fetchOrderData.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T22:29:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eb87f244-e546-4587-958d-59beb0409b26/export</guid>
      <pubDate>Fri, 28 Oct 2022 22:29:47 +0000</pubDate>
    </item>
    <item>
      <title>13df6e80-588c-485c-a21d-6e38e77d396f</title>
      <link>https://vulnerability.circl.lu/sighting/13df6e80-588c-485c-a21d-6e38e77d396f/export</link>
      <description>{"uuid": "13df6e80-588c-485c-a21d-6e38e77d396f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43233", "type": "seen", "source": "https://t.me/cibsecurity/52255", "content": "\u203c CVE-2022-43233 (canteen_management_system) \u203c\n\nCanteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the userid parameter at /php_action/fetchSelectedUser.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T22:29:54.000000Z"}</description>
      <content:encoded>{"uuid": "13df6e80-588c-485c-a21d-6e38e77d396f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43233", "type": "seen", "source": "https://t.me/cibsecurity/52255", "content": "\u203c CVE-2022-43233 (canteen_management_system) \u203c\n\nCanteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the userid parameter at /php_action/fetchSelectedUser.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T22:29:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/13df6e80-588c-485c-a21d-6e38e77d396f/export</guid>
      <pubDate>Fri, 28 Oct 2022 22:29:54 +0000</pubDate>
    </item>
    <item>
      <title>a3376b65-7e55-411d-84a1-49e4c14d3c09</title>
      <link>https://vulnerability.circl.lu/sighting/a3376b65-7e55-411d-84a1-49e4c14d3c09/export</link>
      <description>{"uuid": "a3376b65-7e55-411d-84a1-49e4c14d3c09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43237", "type": "seen", "source": "https://t.me/cibsecurity/52463", "content": "\u203c CVE-2022-43237 \u203c\n\nLibde265 v1.0.8 was discovered to contain a stack-buffer-overflow vulnerability via void put_epel_hv_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T17:19:54.000000Z"}</description>
      <content:encoded>{"uuid": "a3376b65-7e55-411d-84a1-49e4c14d3c09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43237", "type": "seen", "source": "https://t.me/cibsecurity/52463", "content": "\u203c CVE-2022-43237 \u203c\n\nLibde265 v1.0.8 was discovered to contain a stack-buffer-overflow vulnerability via void put_epel_hv_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T17:19:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a3376b65-7e55-411d-84a1-49e4c14d3c09/export</guid>
      <pubDate>Wed, 02 Nov 2022 17:19:54 +0000</pubDate>
    </item>
    <item>
      <title>c6284099-ce22-47fa-866e-5dd4df6c8daa</title>
      <link>https://vulnerability.circl.lu/sighting/c6284099-ce22-47fa-866e-5dd4df6c8daa/export</link>
      <description>{"uuid": "c6284099-ce22-47fa-866e-5dd4df6c8daa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43236", "type": "seen", "source": "https://t.me/cibsecurity/52470", "content": "\u203c CVE-2022-43236 \u203c\n\nLibde265 v1.0.8 was discovered to contain a stack-buffer-overflow vulnerability via put_qpel_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T17:20:03.000000Z"}</description>
      <content:encoded>{"uuid": "c6284099-ce22-47fa-866e-5dd4df6c8daa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43236", "type": "seen", "source": "https://t.me/cibsecurity/52470", "content": "\u203c CVE-2022-43236 \u203c\n\nLibde265 v1.0.8 was discovered to contain a stack-buffer-overflow vulnerability via put_qpel_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T17:20:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c6284099-ce22-47fa-866e-5dd4df6c8daa/export</guid>
      <pubDate>Wed, 02 Nov 2022 17:20:03 +0000</pubDate>
    </item>
    <item>
      <title>14eb4cea-17c9-45e5-85d8-5fe6b2055b52</title>
      <link>https://vulnerability.circl.lu/sighting/14eb4cea-17c9-45e5-85d8-5fe6b2055b52/export</link>
      <description>{"uuid": "14eb4cea-17c9-45e5-85d8-5fe6b2055b52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43235", "type": "seen", "source": "https://t.me/cibsecurity/52471", "content": "\u203c CVE-2022-43235 \u203c\n\nLibde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T17:20:04.000000Z"}</description>
      <content:encoded>{"uuid": "14eb4cea-17c9-45e5-85d8-5fe6b2055b52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43235", "type": "seen", "source": "https://t.me/cibsecurity/52471", "content": "\u203c CVE-2022-43235 \u203c\n\nLibde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T17:20:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/14eb4cea-17c9-45e5-85d8-5fe6b2055b52/export</guid>
      <pubDate>Wed, 02 Nov 2022 17:20:04 +0000</pubDate>
    </item>
    <item>
      <title>c4996685-c741-443b-926a-82316683c1be</title>
      <link>https://vulnerability.circl.lu/sighting/c4996685-c741-443b-926a-82316683c1be/export</link>
      <description>{"uuid": "c4996685-c741-443b-926a-82316683c1be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43238", "type": "seen", "source": "https://t.me/cibsecurity/52475", "content": "\u203c CVE-2022-43238 \u203c\n\nLibde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T17:20:11.000000Z"}</description>
      <content:encoded>{"uuid": "c4996685-c741-443b-926a-82316683c1be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43238", "type": "seen", "source": "https://t.me/cibsecurity/52475", "content": "\u203c CVE-2022-43238 \u203c\n\nLibde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T17:20:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c4996685-c741-443b-926a-82316683c1be/export</guid>
      <pubDate>Wed, 02 Nov 2022 17:20:11 +0000</pubDate>
    </item>
    <item>
      <title>8d24a504-2c5b-4e16-a419-1c48888b9626</title>
      <link>https://vulnerability.circl.lu/sighting/8d24a504-2c5b-4e16-a419-1c48888b9626/export</link>
      <description>{"uuid": "8d24a504-2c5b-4e16-a419-1c48888b9626", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43234", "type": "seen", "source": "https://t.me/cibsecurity/53039", "content": "\u203c CVE-2022-43234 \u203c\n\nAn arbitrary file upload vulnerability in the /attachments component of Hoosk v1.8 allows attackers to execute arbitrary code via a crafted PHP file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-17T15:52:55.000000Z"}</description>
      <content:encoded>{"uuid": "8d24a504-2c5b-4e16-a419-1c48888b9626", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43234", "type": "seen", "source": "https://t.me/cibsecurity/53039", "content": "\u203c CVE-2022-43234 \u203c\n\nAn arbitrary file upload vulnerability in the /attachments component of Hoosk v1.8 allows attackers to execute arbitrary code via a crafted PHP file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-17T15:52:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8d24a504-2c5b-4e16-a419-1c48888b9626/export</guid>
      <pubDate>Thu, 17 Nov 2022 15:52:55 +0000</pubDate>
    </item>
    <item>
      <title>c8b922ec-7f4d-4aa9-a0a9-eeb5b1708637</title>
      <link>https://vulnerability.circl.lu/sighting/c8b922ec-7f4d-4aa9-a0a9-eeb5b1708637/export</link>
      <description>{"uuid": "c8b922ec-7f4d-4aa9-a0a9-eeb5b1708637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4323", "type": "seen", "source": "https://t.me/cibsecurity/56846", "content": "\u203c CVE-2022-4323 \u203c\n\nThe Analyticator WordPress plugin before 6.5.6 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-23T18:25:18.000000Z"}</description>
      <content:encoded>{"uuid": "c8b922ec-7f4d-4aa9-a0a9-eeb5b1708637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4323", "type": "seen", "source": "https://t.me/cibsecurity/56846", "content": "\u203c CVE-2022-4323 \u203c\n\nThe Analyticator WordPress plugin before 6.5.6 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-23T18:25:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c8b922ec-7f4d-4aa9-a0a9-eeb5b1708637/export</guid>
      <pubDate>Mon, 23 Jan 2023 18:25:18 +0000</pubDate>
    </item>
    <item>
      <title>9c14cd98-5c84-43b1-add9-be8383612b66</title>
      <link>https://vulnerability.circl.lu/sighting/9c14cd98-5c84-43b1-add9-be8383612b66/export</link>
      <description>{"uuid": "9c14cd98-5c84-43b1-add9-be8383612b66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43235", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14615", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43235\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\ud83d\udccf Published: 2022-11-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T20:48:03.326Z\n\ud83d\udd17 References:\n1. https://github.com/strukturag/libde265/issues/337\n2. https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html\n3. https://www.debian.org/security/2023/dsa-5346", "creation_timestamp": "2025-05-02T21:16:38.000000Z"}</description>
      <content:encoded>{"uuid": "9c14cd98-5c84-43b1-add9-be8383612b66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43235", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14615", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43235\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\ud83d\udccf Published: 2022-11-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T20:48:03.326Z\n\ud83d\udd17 References:\n1. https://github.com/strukturag/libde265/issues/337\n2. https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html\n3. https://www.debian.org/security/2023/dsa-5346", "creation_timestamp": "2025-05-02T21:16:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9c14cd98-5c84-43b1-add9-be8383612b66/export</guid>
      <pubDate>Fri, 02 May 2025 21:16:38 +0000</pubDate>
    </item>
    <item>
      <title>dedb1961-11b4-4e9f-adc0-fe54307920ee</title>
      <link>https://vulnerability.circl.lu/sighting/dedb1961-11b4-4e9f-adc0-fe54307920ee/export</link>
      <description>{"uuid": "dedb1961-11b4-4e9f-adc0-fe54307920ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43238", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14616", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43238\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\ud83d\udccf Published: 2022-11-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T20:43:54.497Z\n\ud83d\udd17 References:\n1. https://github.com/strukturag/libde265/issues/336\n2. https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html\n3. https://www.debian.org/security/2023/dsa-5346", "creation_timestamp": "2025-05-02T21:16:40.000000Z"}</description>
      <content:encoded>{"uuid": "dedb1961-11b4-4e9f-adc0-fe54307920ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43238", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14616", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43238\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.\n\ud83d\udccf Published: 2022-11-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T20:43:54.497Z\n\ud83d\udd17 References:\n1. https://github.com/strukturag/libde265/issues/336\n2. https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html\n3. https://www.debian.org/security/2023/dsa-5346", "creation_timestamp": "2025-05-02T21:16:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dedb1961-11b4-4e9f-adc0-fe54307920ee/export</guid>
      <pubDate>Fri, 02 May 2025 21:16:40 +0000</pubDate>
    </item>
  </channel>
</rss>
