<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T10:40:25.157783+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c01883ec-86c2-4586-a4df-2d588da2d567/export</id>
    <title>c01883ec-86c2-4586-a4df-2d588da2d567</title>
    <updated>2026-05-06T10:40:25.531086+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c01883ec-86c2-4586-a4df-2d588da2d567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43867", "type": "seen", "source": "https://t.me/cibsecurity/54089", "content": "\u203c CVE-2022-43867 \u203c\n\nIBM Spectrum Scale 5.1.0.1 through 5.1.4.1 could allow a local attacker to execute arbitrary commands in the container. IBM X-Force ID: 239437.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T22:40:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c01883ec-86c2-4586-a4df-2d588da2d567/export"/>
    <published>2022-12-06T22:40:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/94c70d5a-a31e-4fcb-b7fd-2a563dcd7e76/export</id>
    <title>94c70d5a-a31e-4fcb-b7fd-2a563dcd7e76</title>
    <updated>2026-05-06T10:40:25.531017+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "94c70d5a-a31e-4fcb-b7fd-2a563dcd7e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43860", "type": "seen", "source": "https://t.me/cibsecurity/55275", "content": "\u203c CVE-2022-43860 \u203c\n\nIBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information they are authorized to but not while using this interface. By performing an SQL injection an attacker could see user profile attributes through this interface. IBM X-Force ID: 239305.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-24T02:14:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/94c70d5a-a31e-4fcb-b7fd-2a563dcd7e76/export"/>
    <published>2022-12-24T02:14:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b2b93de0-c7cb-4216-9fd1-0bd8cb396336/export</id>
    <title>b2b93de0-c7cb-4216-9fd1-0bd8cb396336</title>
    <updated>2026-05-06T10:40:25.530944+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b2b93de0-c7cb-4216-9fd1-0bd8cb396336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4386", "type": "seen", "source": "https://t.me/cibsecurity/58583", "content": "\u203c CVE-2022-4386 \u203c\n\nThe Intuitive Custom Post Order WordPress plugin through 3.1.3 lacks CSRF protection in its update-menu-order ajax action, allowing an attacker to trick any user to change the menu order via a CSRF attack\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-21T12:21:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b2b93de0-c7cb-4216-9fd1-0bd8cb396336/export"/>
    <published>2023-02-21T12:21:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a0d5da9a-f7ae-4aa1-a2c7-b6a0c8230f1a/export</id>
    <title>a0d5da9a-f7ae-4aa1-a2c7-b6a0c8230f1a</title>
    <updated>2026-05-06T10:40:25.530867+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a0d5da9a-f7ae-4aa1-a2c7-b6a0c8230f1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43863", "type": "seen", "source": "https://t.me/cibsecurity/60538", "content": "\u203c CVE-2022-43863 \u203c\n\nIBM QRadar SIEM 7.4 and 7.5 is vulnerable to privilege escalation, allowing a user with some admin capabilities to gain additional admin capabilities. IBM X-Force ID: 239425.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-23T01:36:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a0d5da9a-f7ae-4aa1-a2c7-b6a0c8230f1a/export"/>
    <published>2023-03-23T01:36:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/45fedad9-d842-4b15-9113-04fcf7cd650a/export</id>
    <title>45fedad9-d842-4b15-9113-04fcf7cd650a</title>
    <updated>2026-05-06T10:40:25.530782+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "45fedad9-d842-4b15-9113-04fcf7cd650a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43866", "type": "seen", "source": "https://t.me/cibsecurity/63391", "content": "\u203c CVE-2022-43866 \u203c\n\nIBM Maximo Asset Management 7.6.1.2 and 7.6.1.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 239436.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T22:25:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/45fedad9-d842-4b15-9113-04fcf7cd650a/export"/>
    <published>2023-05-05T22:25:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9b605906-681f-4e11-95d5-afdb2c0f3468/export</id>
    <title>9b605906-681f-4e11-95d5-afdb2c0f3468</title>
    <updated>2026-05-06T10:40:25.530664+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9b605906-681f-4e11-95d5-afdb2c0f3468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4386", "type": "seen", "source": "https://t.me/arpsyndicate/581", "content": "#ExploitObserverAlert\n\nCVE-2022-4386\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-4386. The Intuitive Custom Post Order WordPress plugin before 3.1.4 lacks CSRF protection in its update-menu-order ajax action, allowing an attacker to trick any user to change the menu order via a CSRF attack\n\nFIRST-EPSS: 0.000460000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2023-11-26T01:39:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9b605906-681f-4e11-95d5-afdb2c0f3468/export"/>
    <published>2023-11-26T01:39:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0b90ad0b-0c2f-44e5-91e0-bb6b2e96efaf/export</id>
    <title>0b90ad0b-0c2f-44e5-91e0-bb6b2e96efaf</title>
    <updated>2026-05-06T10:40:25.528302+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0b90ad0b-0c2f-44e5-91e0-bb6b2e96efaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43867", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13042", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43867\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: \nIBM Spectrum Scale 5.1.0.1 through 5.1.4.1 could allow a local attacker to execute arbitrary commands in the container. IBM X-Force ID: 239437.\n\n\n\ud83d\udccf Published: 2022-12-06T18:12:25.807Z\n\ud83d\udccf Modified: 2025-04-23T13:41:44.178Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/6844771\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/239437", "creation_timestamp": "2025-04-23T14:05:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0b90ad0b-0c2f-44e5-91e0-bb6b2e96efaf/export"/>
    <published>2025-04-23T14:05:25+00:00</published>
  </entry>
</feed>
