<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T21:29:10.176401+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/32cc737b-9af8-4fc9-b9b6-4ef082d4d4cd/export</id>
    <title>32cc737b-9af8-4fc9-b9b6-4ef082d4d4cd</title>
    <updated>2026-05-01T21:29:10.367892+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "32cc737b-9af8-4fc9-b9b6-4ef082d4d4cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43850", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11697", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43850\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4\n\nis vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-04-14T20:44:59.726Z\n\ud83d\udccf Modified: 2025-04-14T20:44:59.726Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/32cc737b-9af8-4fc9-b9b6-4ef082d4d4cd/export"/>
    <published>2025-04-14T20:54:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e9314caf-bd3a-48af-b314-5c30e8064ace/export</id>
    <title>e9314caf-bd3a-48af-b314-5c30e8064ace</title>
    <updated>2026-05-01T21:29:10.367763+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e9314caf-bd3a-48af-b314-5c30e8064ace", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43851", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11700", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43851\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4\n\nuses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.\n\ud83d\udccf Published: 2025-04-14T20:39:56.933Z\n\ud83d\udccf Modified: 2025-04-14T20:40:25.922Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e9314caf-bd3a-48af-b314-5c30e8064ace/export"/>
    <published>2025-04-14T20:54:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0caf9c51-7777-4e38-a790-a35bb89c817b/export</id>
    <title>0caf9c51-7777-4e38-a790-a35bb89c817b</title>
    <updated>2026-05-01T21:29:10.367630+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0caf9c51-7777-4e38-a790-a35bb89c817b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43852", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11702", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43852\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4\u00a0could disclose sensitive information in HTTP headers that could be used in further attacks against the system.\n\ud83d\udccf Published: 2025-04-14T20:33:58.704Z\n\ud83d\udccf Modified: 2025-04-14T20:35:52.831Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0caf9c51-7777-4e38-a790-a35bb89c817b/export"/>
    <published>2025-04-14T20:54:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8b6634e5-9cda-43f1-9252-395a3f4ddccd/export</id>
    <title>8b6634e5-9cda-43f1-9252-395a3f4ddccd</title>
    <updated>2026-05-01T21:29:10.367497+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8b6634e5-9cda-43f1-9252-395a3f4ddccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43850", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvujydv2z", "content": "", "creation_timestamp": "2025-04-14T22:38:59.373854Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8b6634e5-9cda-43f1-9252-395a3f4ddccd/export"/>
    <published>2025-04-14T22:38:59.373854+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/56b76f7f-5d1f-4070-8c25-200fe6d1e523/export</id>
    <title>56b76f7f-5d1f-4070-8c25-200fe6d1e523</title>
    <updated>2026-05-01T21:29:10.367364+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "56b76f7f-5d1f-4070-8c25-200fe6d1e523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43851", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvuqvzf2h", "content": "", "creation_timestamp": "2025-04-14T22:39:00.608007Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/56b76f7f-5d1f-4070-8c25-200fe6d1e523/export"/>
    <published>2025-04-14T22:39:00.608007+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/17832727-eacc-4366-bab3-96aa3e992ad9/export</id>
    <title>17832727-eacc-4366-bab3-96aa3e992ad9</title>
    <updated>2026-05-01T21:29:10.367232+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "17832727-eacc-4366-bab3-96aa3e992ad9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43852", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvuycy62i", "content": "", "creation_timestamp": "2025-04-14T22:39:01.849240Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/17832727-eacc-4366-bab3-96aa3e992ad9/export"/>
    <published>2025-04-14T22:39:01.849240+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a2338d27-59c5-4a4f-916d-6997dfefb563/export</id>
    <title>a2338d27-59c5-4a4f-916d-6997dfefb563</title>
    <updated>2026-05-01T21:29:10.367090+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a2338d27-59c5-4a4f-916d-6997dfefb563", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43851", "type": "seen", "source": "https://t.me/cvedetector/22891", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43851 - IBM Aspera Console Cryptographic Weakness\", \n  \"Content\": \"CVE ID : CVE-2022-43851 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4  \n  \nuses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a2338d27-59c5-4a4f-916d-6997dfefb563/export"/>
    <published>2025-04-15T01:32:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/41cd4b81-e6fc-4caa-9c10-753f730ea160/export</id>
    <title>41cd4b81-e6fc-4caa-9c10-753f730ea160</title>
    <updated>2026-05-01T21:29:10.366944+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "41cd4b81-e6fc-4caa-9c10-753f730ea160", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43852", "type": "seen", "source": "https://t.me/cvedetector/22892", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43852 - IBM Aspera Console Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2022-43852 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4\u00a0could disclose sensitive information in HTTP headers that could be used in further attacks against the system. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/41cd4b81-e6fc-4caa-9c10-753f730ea160/export"/>
    <published>2025-04-15T01:32:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ca9e0019-18bd-4400-bfdb-8c6bc2a5b744/export</id>
    <title>ca9e0019-18bd-4400-bfdb-8c6bc2a5b744</title>
    <updated>2026-05-01T21:29:10.366744+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ca9e0019-18bd-4400-bfdb-8c6bc2a5b744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43850", "type": "seen", "source": "https://t.me/cvedetector/22896", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43850 - IBM Aspera Console Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43850 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4  \n  \nis vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ca9e0019-18bd-4400-bfdb-8c6bc2a5b744/export"/>
    <published>2025-04-15T01:32:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b97deb74-19b6-4d3b-bd9e-b5756c90443d/export</id>
    <title>b97deb74-19b6-4d3b-bd9e-b5756c90443d</title>
    <updated>2026-05-01T21:29:10.364625+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b97deb74-19b6-4d3b-bd9e-b5756c90443d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43855", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17991", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43855\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: IBM SPSS Statistics 26.0, 27.0.1, and 28.0 IO Module could allow a local user to create multiple files that could exhaust the file handles capacity and cause a denial of service.\n\ud83d\udccf Published: 2024-03-08T17:52:57.326Z\n\ud83d\udccf Modified: 2025-06-10T20:08:23.966Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7130881", "creation_timestamp": "2025-06-10T20:31:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b97deb74-19b6-4d3b-bd9e-b5756c90443d/export"/>
    <published>2025-06-10T20:31:52+00:00</published>
  </entry>
</feed>
