<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T07:34:59.889916+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/181c6110-9f17-4343-80bb-9929aa97f99a/export</id>
    <title>181c6110-9f17-4343-80bb-9929aa97f99a</title>
    <updated>2026-05-04T07:35:00.162916+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "181c6110-9f17-4343-80bb-9929aa97f99a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43525", "type": "seen", "source": "https://t.me/cibsecurity/55940", "content": "\u203c CVE-2022-43525 \u203c\n\nMultiple vulnerabilities within the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-05T12:23:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/181c6110-9f17-4343-80bb-9929aa97f99a/export"/>
    <published>2023-01-05T12:23:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5b54ad53-ac95-49d1-af67-865b09e07c62/export</id>
    <title>5b54ad53-ac95-49d1-af67-865b09e07c62</title>
    <updated>2026-05-04T07:35:00.162863+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5b54ad53-ac95-49d1-af67-865b09e07c62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43520", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11252", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43520\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the Aruba EdgeConnect Enterprise Orchestrator instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the Aruba EdgeConnect Enterprise Orchestrator host in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.\n\n\n\ud83d\udccf Published: 2023-01-03T18:51:55.515Z\n\ud83d\udccf Modified: 2025-04-10T15:39:40.703Z\n\ud83d\udd17 References:\n1. https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt", "creation_timestamp": "2025-04-10T15:48:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5b54ad53-ac95-49d1-af67-865b09e07c62/export"/>
    <published>2025-04-10T15:48:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/baca2840-a504-4388-a6ea-13652ade3cdb/export</id>
    <title>baca2840-a504-4388-a6ea-13652ade3cdb</title>
    <updated>2026-05-04T07:35:00.162809+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "baca2840-a504-4388-a6ea-13652ade3cdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43521", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11253", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43521\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the Aruba EdgeConnect Enterprise Orchestrator instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the Aruba EdgeConnect Enterprise Orchestrator host in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.\n\n\n\ud83d\udccf Published: 2023-01-03T18:58:56.544Z\n\ud83d\udccf Modified: 2025-04-10T15:38:38.744Z\n\ud83d\udd17 References:\n1. https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt", "creation_timestamp": "2025-04-10T15:48:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/baca2840-a504-4388-a6ea-13652ade3cdb/export"/>
    <published>2025-04-10T15:48:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3d99f41c-e298-49c6-a053-476ba34a6f4d/export</id>
    <title>3d99f41c-e298-49c6-a053-476ba34a6f4d</title>
    <updated>2026-05-04T07:35:00.162754+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3d99f41c-e298-49c6-a053-476ba34a6f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43522", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11257", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43522\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the Aruba EdgeConnect Enterprise Orchestrator instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the Aruba EdgeConnect Enterprise Orchestrator host in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.\n\n\n\ud83d\udccf Published: 2023-01-03T19:04:48.612Z\n\ud83d\udccf Modified: 2025-04-10T15:29:39.590Z\n\ud83d\udd17 References:\n1. https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt", "creation_timestamp": "2025-04-10T15:48:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3d99f41c-e298-49c6-a053-476ba34a6f4d/export"/>
    <published>2025-04-10T15:48:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/013034a0-d7ca-487c-b078-63640c45227f/export</id>
    <title>013034a0-d7ca-487c-b078-63640c45227f</title>
    <updated>2026-05-04T07:35:00.162699+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "013034a0-d7ca-487c-b078-63640c45227f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43525", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11280", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43525\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Multiple vulnerabilities within the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.\n\n\n\ud83d\udccf Published: 2023-01-03T19:28:02.818Z\n\ud83d\udccf Modified: 2025-04-10T16:22:35.567Z\n\ud83d\udd17 References:\n1. https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt", "creation_timestamp": "2025-04-10T16:49:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/013034a0-d7ca-487c-b078-63640c45227f/export"/>
    <published>2025-04-10T16:49:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fc690e6e-8ff4-4d19-a806-4e8fec7621b6/export</id>
    <title>fc690e6e-8ff4-4d19-a806-4e8fec7621b6</title>
    <updated>2026-05-04T07:35:00.162645+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fc690e6e-8ff4-4d19-a806-4e8fec7621b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43526", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11281", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43526\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Multiple vulnerabilities within the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.\n\n\n\ud83d\udccf Published: 2023-01-03T19:34:18.122Z\n\ud83d\udccf Modified: 2025-04-10T16:18:40.192Z\n\ud83d\udd17 References:\n1. https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt", "creation_timestamp": "2025-04-10T16:49:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fc690e6e-8ff4-4d19-a806-4e8fec7621b6/export"/>
    <published>2025-04-10T16:49:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/25ec1a2a-f2af-49d5-b6f9-78be47e5477c/export</id>
    <title>25ec1a2a-f2af-49d5-b6f9-78be47e5477c</title>
    <updated>2026-05-04T07:35:00.162585+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "25ec1a2a-f2af-49d5-b6f9-78be47e5477c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43527", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11284", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43527\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Multiple vulnerabilities within the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.\n\n\n\ud83d\udccf Published: 2023-01-03T19:39:33.171Z\n\ud83d\udccf Modified: 2025-04-10T16:09:09.377Z\n\ud83d\udd17 References:\n1. https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt", "creation_timestamp": "2025-04-10T16:49:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/25ec1a2a-f2af-49d5-b6f9-78be47e5477c/export"/>
    <published>2025-04-10T16:49:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4349bc25-b450-470b-b4a2-e9da795c892e/export</id>
    <title>4349bc25-b450-470b-b4a2-e9da795c892e</title>
    <updated>2026-05-04T07:35:00.162518+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4349bc25-b450-470b-b4a2-e9da795c892e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43528", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11285", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43528\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Under certain configurations, an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi-factor authentication code. Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.\n\n\n\ud83d\udccf Published: 2023-01-03T19:41:05.942Z\n\ud83d\udccf Modified: 2025-04-10T16:08:36.153Z\n\ud83d\udd17 References:\n1. https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt", "creation_timestamp": "2025-04-10T16:49:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4349bc25-b450-470b-b4a2-e9da795c892e/export"/>
    <published>2025-04-10T16:49:41+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/61cabc76-7f2e-4192-9372-8438d254a193/export</id>
    <title>61cabc76-7f2e-4192-9372-8438d254a193</title>
    <updated>2026-05-04T07:35:00.162431+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "61cabc76-7f2e-4192-9372-8438d254a193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43529", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11287", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43529\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an remote attacker to persist a session after a password reset or similar session clearing event. Successful exploitation of this vulnerability could allow an authenticated attacker to remain on the system with the permissions of their current session after the session should be invalidated  in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.\n\n\n\ud83d\udccf Published: 2023-01-03T19:43:23.017Z\n\ud83d\udccf Modified: 2025-04-10T16:07:26.448Z\n\ud83d\udd17 References:\n1. https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt", "creation_timestamp": "2025-04-10T16:49:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/61cabc76-7f2e-4192-9372-8438d254a193/export"/>
    <published>2025-04-10T16:49:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f0cd1765-b13a-4fce-9527-b04b5516633f/export</id>
    <title>f0cd1765-b13a-4fce-9527-b04b5516633f</title>
    <updated>2026-05-04T07:35:00.160366+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f0cd1765-b13a-4fce-9527-b04b5516633f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4352", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11304", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4352\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Qe SEO Handyman WordPress plugin through 1.0 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin\n\ud83d\udccf Published: 2023-01-02T21:49:35.146Z\n\ud83d\udccf Modified: 2025-04-10T18:41:43.663Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/325874f4-2482-4ae5-b5cf-cb9ff0843067\n2. https://bulletin.iese.de/post/qe-seo-handyman_1-0_2", "creation_timestamp": "2025-04-10T18:49:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f0cd1765-b13a-4fce-9527-b04b5516633f/export"/>
    <published>2025-04-10T18:49:18+00:00</published>
  </entry>
</feed>
