<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 12:50:54 +0000</lastBuildDate>
    <item>
      <title>de433869-49b0-485d-967a-aa8f15348d92</title>
      <link>https://vulnerability.circl.lu/sighting/de433869-49b0-485d-967a-aa8f15348d92/export</link>
      <description>{"uuid": "de433869-49b0-485d-967a-aa8f15348d92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/192129", "content": "https://ift.tt/BCS1E9l\nCVE-2022-43842", "creation_timestamp": "2024-02-23T20:26:09.000000Z"}</description>
      <content:encoded>{"uuid": "de433869-49b0-485d-967a-aa8f15348d92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/192129", "content": "https://ift.tt/BCS1E9l\nCVE-2022-43842", "creation_timestamp": "2024-02-23T20:26:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/de433869-49b0-485d-967a-aa8f15348d92/export</guid>
      <pubDate>Fri, 23 Feb 2024 20:26:09 +0000</pubDate>
    </item>
    <item>
      <title>88ee9524-8f3e-47df-ba01-c3d093d769c2</title>
      <link>https://vulnerability.circl.lu/sighting/88ee9524-8f3e-47df-ba01-c3d093d769c2/export</link>
      <description>{"uuid": "88ee9524-8f3e-47df-ba01-c3d093d769c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/192132", "content": "https://ift.tt/BCS1E9l\nCVE-2022-43842", "creation_timestamp": "2024-02-23T20:26:13.000000Z"}</description>
      <content:encoded>{"uuid": "88ee9524-8f3e-47df-ba01-c3d093d769c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/192132", "content": "https://ift.tt/BCS1E9l\nCVE-2022-43842", "creation_timestamp": "2024-02-23T20:26:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/88ee9524-8f3e-47df-ba01-c3d093d769c2/export</guid>
      <pubDate>Fri, 23 Feb 2024 20:26:13 +0000</pubDate>
    </item>
    <item>
      <title>e366ca3a-20e5-41fe-ad16-2772cdd6b16c</title>
      <link>https://vulnerability.circl.lu/sighting/e366ca3a-20e5-41fe-ad16-2772cdd6b16c/export</link>
      <description>{"uuid": "e366ca3a-20e5-41fe-ad16-2772cdd6b16c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/207336", "content": "https://ift.tt/J4EHRlC\nCVE-2022-43842 | IBM Aspera Console up to 3.4.2 sql injection (XFDB-239079)", "creation_timestamp": "2024-03-14T01:16:41.000000Z"}</description>
      <content:encoded>{"uuid": "e366ca3a-20e5-41fe-ad16-2772cdd6b16c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/207336", "content": "https://ift.tt/J4EHRlC\nCVE-2022-43842 | IBM Aspera Console up to 3.4.2 sql injection (XFDB-239079)", "creation_timestamp": "2024-03-14T01:16:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e366ca3a-20e5-41fe-ad16-2772cdd6b16c/export</guid>
      <pubDate>Thu, 14 Mar 2024 01:16:41 +0000</pubDate>
    </item>
    <item>
      <title>9ffe1107-4339-4a0c-aece-e93f5f388257</title>
      <link>https://vulnerability.circl.lu/sighting/9ffe1107-4339-4a0c-aece-e93f5f388257/export</link>
      <description>{"uuid": "9ffe1107-4339-4a0c-aece-e93f5f388257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4384", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8782", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4384\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information.\n\ud83d\udccf Published: 2023-02-06T19:59:16.563Z\n\ud83d\udccf Modified: 2025-03-25T20:41:44.440Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5", "creation_timestamp": "2025-03-25T21:25:31.000000Z"}</description>
      <content:encoded>{"uuid": "9ffe1107-4339-4a0c-aece-e93f5f388257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4384", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8782", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4384\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information.\n\ud83d\udccf Published: 2023-02-06T19:59:16.563Z\n\ud83d\udccf Modified: 2025-03-25T20:41:44.440Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5", "creation_timestamp": "2025-03-25T21:25:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9ffe1107-4339-4a0c-aece-e93f5f388257/export</guid>
      <pubDate>Tue, 25 Mar 2025 21:25:31 +0000</pubDate>
    </item>
    <item>
      <title>5451f661-cd74-422e-8229-f7c9ffdb045f</title>
      <link>https://vulnerability.circl.lu/sighting/5451f661-cd74-422e-8229-f7c9ffdb045f/export</link>
      <description>{"uuid": "5451f661-cd74-422e-8229-f7c9ffdb045f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11699", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43840\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4\n\nis vulnerable to an XPath injection vulnerability, which could allow an authenticated attacker to exfiltrate sensitive application data and/or determine the structure of the XML document.\n\ud83d\udccf Published: 2025-04-14T20:43:28.652Z\n\ud83d\udccf Modified: 2025-04-14T20:43:28.652Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:32.000000Z"}</description>
      <content:encoded>{"uuid": "5451f661-cd74-422e-8229-f7c9ffdb045f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11699", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43840\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4\n\nis vulnerable to an XPath injection vulnerability, which could allow an authenticated attacker to exfiltrate sensitive application data and/or determine the structure of the XML document.\n\ud83d\udccf Published: 2025-04-14T20:43:28.652Z\n\ud83d\udccf Modified: 2025-04-14T20:43:28.652Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5451f661-cd74-422e-8229-f7c9ffdb045f/export</guid>
      <pubDate>Mon, 14 Apr 2025 20:54:32 +0000</pubDate>
    </item>
    <item>
      <title>47fd43b2-39e3-4e74-a279-c0222c26ff1e</title>
      <link>https://vulnerability.circl.lu/sighting/47fd43b2-39e3-4e74-a279-c0222c26ff1e/export</link>
      <description>{"uuid": "47fd43b2-39e3-4e74-a279-c0222c26ff1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11703", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43847\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4 \n\nis vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.\n\ud83d\udccf Published: 2025-04-14T20:22:01.813Z\n\ud83d\udccf Modified: 2025-04-14T20:31:15.666Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:39.000000Z"}</description>
      <content:encoded>{"uuid": "47fd43b2-39e3-4e74-a279-c0222c26ff1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11703", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43847\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4 \n\nis vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.\n\ud83d\udccf Published: 2025-04-14T20:22:01.813Z\n\ud83d\udccf Modified: 2025-04-14T20:31:15.666Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/47fd43b2-39e3-4e74-a279-c0222c26ff1e/export</guid>
      <pubDate>Mon, 14 Apr 2025 20:54:39 +0000</pubDate>
    </item>
    <item>
      <title>bb462ba9-9076-40d2-9192-247796e4f49a</title>
      <link>https://vulnerability.circl.lu/sighting/bb462ba9-9076-40d2-9192-247796e4f49a/export</link>
      <description>{"uuid": "bb462ba9-9076-40d2-9192-247796e4f49a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvtzoj62i", "content": "", "creation_timestamp": "2025-04-14T22:38:57.388179Z"}</description>
      <content:encoded>{"uuid": "bb462ba9-9076-40d2-9192-247796e4f49a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvtzoj62i", "content": "", "creation_timestamp": "2025-04-14T22:38:57.388179Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bb462ba9-9076-40d2-9192-247796e4f49a/export</guid>
      <pubDate>Mon, 14 Apr 2025 22:38:57 +0000</pubDate>
    </item>
    <item>
      <title>43ee2db0-685e-491a-baf2-859fed26b257</title>
      <link>https://vulnerability.circl.lu/sighting/43ee2db0-685e-491a-baf2-859fed26b257/export</link>
      <description>{"uuid": "43ee2db0-685e-491a-baf2-859fed26b257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvugpix24", "content": "", "creation_timestamp": "2025-04-14T22:38:58.789664Z"}</description>
      <content:encoded>{"uuid": "43ee2db0-685e-491a-baf2-859fed26b257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvugpix24", "content": "", "creation_timestamp": "2025-04-14T22:38:58.789664Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/43ee2db0-685e-491a-baf2-859fed26b257/export</guid>
      <pubDate>Mon, 14 Apr 2025 22:38:58 +0000</pubDate>
    </item>
    <item>
      <title>61c485d9-3979-4e3a-bf1d-3ae998785744</title>
      <link>https://vulnerability.circl.lu/sighting/61c485d9-3979-4e3a-bf1d-3ae998785744/export</link>
      <description>{"uuid": "61c485d9-3979-4e3a-bf1d-3ae998785744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://t.me/cvedetector/22894", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43840 - IBM Aspera Console XPath Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43840 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4  \n  \nis vulnerable to an XPath injection vulnerability, which could allow an authenticated attacker to exfiltrate sensitive application data and/or determine the structure of the XML document. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:48.000000Z"}</description>
      <content:encoded>{"uuid": "61c485d9-3979-4e3a-bf1d-3ae998785744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://t.me/cvedetector/22894", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43840 - IBM Aspera Console XPath Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43840 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4  \n  \nis vulnerable to an XPath injection vulnerability, which could allow an authenticated attacker to exfiltrate sensitive application data and/or determine the structure of the XML document. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/61c485d9-3979-4e3a-bf1d-3ae998785744/export</guid>
      <pubDate>Tue, 15 Apr 2025 01:32:48 +0000</pubDate>
    </item>
    <item>
      <title>e35aa835-d14c-4d97-89d8-b0de1f44cbe0</title>
      <link>https://vulnerability.circl.lu/sighting/e35aa835-d14c-4d97-89d8-b0de1f44cbe0/export</link>
      <description>{"uuid": "e35aa835-d14c-4d97-89d8-b0de1f44cbe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://t.me/cvedetector/22895", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43847 - IBM Aspera Console HTTP Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43847 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4   \n  \nis vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:49.000000Z"}</description>
      <content:encoded>{"uuid": "e35aa835-d14c-4d97-89d8-b0de1f44cbe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://t.me/cvedetector/22895", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43847 - IBM Aspera Console HTTP Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43847 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4   \n  \nis vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e35aa835-d14c-4d97-89d8-b0de1f44cbe0/export</guid>
      <pubDate>Tue, 15 Apr 2025 01:32:49 +0000</pubDate>
    </item>
  </channel>
</rss>
