{"vulnerability": "cve-2021-4362", "sightings": [{"uuid": "b0fe217c-883b-418d-8f91-3f1113de6024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43628", "type": "seen", "source": "https://t.me/cibsecurity/34520", "content": "\u203c CVE-2021-43628 \u203c\n\nProjectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the email parameter in hms-staff.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-22T20:18:54.000000Z"}, {"uuid": "1815f567-1567-4e1c-a777-a51b395701e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43629", "type": "seen", "source": "https://t.me/cibsecurity/34523", "content": "\u203c CVE-2021-43629 \u203c\n\nProjectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in admin_home.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-22T20:19:00.000000Z"}, {"uuid": "0bf65760-0aad-49d9-9456-b3f5897f2799", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43620", "type": "seen", "source": "https://t.me/cibsecurity/32396", "content": "\u203c CVE-2021-43620 \u203c\n\nAn issue was discovered in the fruity crate through 0.2.0 for Rust. Security-relevant validation of filename extensions is plausibly affected. Methods of NSString for conversion to a string may return a partial result. Because they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first '\\0' byte, which might not be the end of the string.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-15T07:11:53.000000Z"}]}