<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 09:46:59 +0000</lastBuildDate>
    <item>
      <title>14f64c49-d2e2-4899-b586-fc334565fa35</title>
      <link>https://vulnerability.circl.lu/sighting/14f64c49-d2e2-4899-b586-fc334565fa35/export</link>
      <description>{"uuid": "14f64c49-d2e2-4899-b586-fc334565fa35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44790", "type": "seen", "source": "https://t.me/cibsecurity/54252", "content": "\u203c CVE-2022-44790 \u203c\n\nInterspire Email Marketer through 6.5.1 allows SQL Injection via the surveys module. An unauthenticated attacker could successfully perform an attack to extract potentially sensitive information from the database if the survey id exists.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-10T02:37:20.000000Z"}</description>
      <content:encoded>{"uuid": "14f64c49-d2e2-4899-b586-fc334565fa35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44790", "type": "seen", "source": "https://t.me/cibsecurity/54252", "content": "\u203c CVE-2022-44790 \u203c\n\nInterspire Email Marketer through 6.5.1 allows SQL Injection via the surveys module. An unauthenticated attacker could successfully perform an attack to extract potentially sensitive information from the database if the survey id exists.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-10T02:37:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/14f64c49-d2e2-4899-b586-fc334565fa35/export</guid>
      <pubDate>Sat, 10 Dec 2022 02:37:20 +0000</pubDate>
    </item>
    <item>
      <title>bc7a8d54-14f1-4f64-8489-bd0948331926</title>
      <link>https://vulnerability.circl.lu/sighting/bc7a8d54-14f1-4f64-8489-bd0948331926/export</link>
      <description>{"uuid": "bc7a8d54-14f1-4f64-8489-bd0948331926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44792", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14907", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44792\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.\n\ud83d\udccf Published: 2022-11-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T16:12:17.885Z\n\ud83d\udd17 References:\n1. https://github.com/net-snmp/net-snmp/issues/474\n2. https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428\n3. https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html\n4. https://security.netapp.com/advisory/ntap-20230223-0011/", "creation_timestamp": "2025-05-05T16:19:59.000000Z"}</description>
      <content:encoded>{"uuid": "bc7a8d54-14f1-4f64-8489-bd0948331926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44792", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14907", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44792\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.\n\ud83d\udccf Published: 2022-11-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T16:12:17.885Z\n\ud83d\udd17 References:\n1. https://github.com/net-snmp/net-snmp/issues/474\n2. https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428\n3. https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html\n4. https://security.netapp.com/advisory/ntap-20230223-0011/", "creation_timestamp": "2025-05-05T16:19:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bc7a8d54-14f1-4f64-8489-bd0948331926/export</guid>
      <pubDate>Mon, 05 May 2025 16:19:59 +0000</pubDate>
    </item>
    <item>
      <title>111bcec1-729e-4763-91dc-ed48df247304</title>
      <link>https://vulnerability.circl.lu/sighting/111bcec1-729e-4763-91dc-ed48df247304/export</link>
      <description>{"uuid": "111bcec1-729e-4763-91dc-ed48df247304", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44793", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14908", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44793\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.\n\ud83d\udccf Published: 2022-11-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T16:12:07.945Z\n\ud83d\udd17 References:\n1. https://github.com/net-snmp/net-snmp/issues/475\n2. https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f\n3. https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html\n4. https://security.netapp.com/advisory/ntap-20230223-0011/", "creation_timestamp": "2025-05-05T16:20:00.000000Z"}</description>
      <content:encoded>{"uuid": "111bcec1-729e-4763-91dc-ed48df247304", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44793", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14908", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44793\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.\n\ud83d\udccf Published: 2022-11-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T16:12:07.945Z\n\ud83d\udd17 References:\n1. https://github.com/net-snmp/net-snmp/issues/475\n2. https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f\n3. https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html\n4. https://security.netapp.com/advisory/ntap-20230223-0011/", "creation_timestamp": "2025-05-05T16:20:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/111bcec1-729e-4763-91dc-ed48df247304/export</guid>
      <pubDate>Mon, 05 May 2025 16:20:00 +0000</pubDate>
    </item>
  </channel>
</rss>
