{"vulnerability": "CVE-2021-3538", "sightings": [{"uuid": "14ae8a4f-5811-4969-a9cd-d5ebfa49d598", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35387", "type": "seen", "source": "https://t.me/cibsecurity/52217", "content": "\u203c CVE-2021-35387 \u203c\n\nHospital Management System v 4.0 is vulnerable to SQL Injection via file:hospital/hms/admin/view-patient.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T18:34:37.000000Z"}, {"uuid": "96e7bac6-8b05-4190-bfe3-4ebc7e3ce90c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35388", "type": "seen", "source": "https://t.me/cibsecurity/52211", "content": "\u203c CVE-2021-35388 \u203c\n\nHospital Management System v 4.0 is vulnerable to Cross Site Scripting (XSS) via /hospital/hms/admin/patient-search.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T18:34:28.000000Z"}, {"uuid": "db3eb42e-bf52-4f1a-b5d0-f7c76ecfafc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35380", "type": "seen", "source": "https://t.me/cibsecurity/37547", "content": "\u203c CVE-2021-35380 \u203c\n\nA Directory Traversal vulnerability exists in Solari di Udine TermTalk Server (TTServer) 3.24.0.2, which lets an unauthenticated malicious user gain access to the files on the remote system by gaining access to the relative path of the file they want to download (http://url:port/file?valore).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-16T00:36:00.000000Z"}]}