<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T23:18:37.230735+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/50fed586-cf3b-402f-bb21-e3df455d77cf/export</id>
    <title>50fed586-cf3b-402f-bb21-e3df455d77cf</title>
    <updated>2026-05-04T23:18:37.525944+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "50fed586-cf3b-402f-bb21-e3df455d77cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43900", "type": "seen", "source": "https://t.me/cibsecurity/53783", "content": "\u203c CVE-2022-43900 \u203c\n\nIBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.2 could provide a weaker than expected security. A local attacker can create an outbound network connection to another system. IBM X-Force ID: 240827.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-01T22:41:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/50fed586-cf3b-402f-bb21-e3df455d77cf/export"/>
    <published>2022-12-01T22:41:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/43a17d72-6096-42cc-ba7a-90c6f0892a3f/export</id>
    <title>43a17d72-6096-42cc-ba7a-90c6f0892a3f</title>
    <updated>2026-05-04T23:18:37.525816+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "43a17d72-6096-42cc-ba7a-90c6f0892a3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4390", "type": "seen", "source": "https://t.me/cibsecurity/54245", "content": "\u203c CVE-2022-4390 \u203c\n\nA network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do not appear to be applied to the WAN interface for IPv6. This allows arbitrary access to any services running on the device that may be inadvertently listening via IPv6, such as the SSH and Telnet servers spawned on ports 22 and 23 by default. This misconfiguration could allow an attacker to interact with services only intended to be accessible by clients on the local network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-09T22:13:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/43a17d72-6096-42cc-ba7a-90c6f0892a3f/export"/>
    <published>2022-12-09T22:13:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e0dffcc1-58c3-4f29-9a74-fbc523515908/export</id>
    <title>e0dffcc1-58c3-4f29-9a74-fbc523515908</title>
    <updated>2026-05-04T23:18:37.525684+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e0dffcc1-58c3-4f29-9a74-fbc523515908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43907", "type": "seen", "source": "https://t.me/cibsecurity/69246", "content": "\u203c CVE-2022-43907 \u203c\n\nIBM Security Guardium 11.4 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 240901.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-28T02:21:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e0dffcc1-58c3-4f29-9a74-fbc523515908/export"/>
    <published>2023-08-28T02:21:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3beb9f1b-ccd7-4fb3-966f-79cdb6e7c3ff/export</id>
    <title>3beb9f1b-ccd7-4fb3-966f-79cdb6e7c3ff</title>
    <updated>2026-05-04T23:18:37.525575+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3beb9f1b-ccd7-4fb3-966f-79cdb6e7c3ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43909", "type": "seen", "source": "https://t.me/cibsecurity/69249", "content": "\u203c CVE-2022-43909 \u203c\n\nIBM Security Guardium 11.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 240905.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-28T02:21:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3beb9f1b-ccd7-4fb3-966f-79cdb6e7c3ff/export"/>
    <published>2023-08-28T02:21:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c02102f1-91fd-49e6-ac1f-e971d18caa64/export</id>
    <title>c02102f1-91fd-49e6-ac1f-e971d18caa64</title>
    <updated>2026-05-04T23:18:37.525445+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c02102f1-91fd-49e6-ac1f-e971d18caa64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43904", "type": "seen", "source": "https://t.me/cibsecurity/69256", "content": "\u203c CVE-2022-43904 \u203c\n\nIBM Security Guardium 11.3 and 11.4 could disclose sensitive information to an attacker due to improper restriction of excessive authentication attempts. IBM X-Force ID: 240895.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-28T07:21:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c02102f1-91fd-49e6-ac1f-e971d18caa64/export"/>
    <published>2023-08-28T07:21:21+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/664831b0-078a-4b50-872e-7b1cf9819ad6/export</id>
    <title>664831b0-078a-4b50-872e-7b1cf9819ad6</title>
    <updated>2026-05-04T23:18:37.525322+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "664831b0-078a-4b50-872e-7b1cf9819ad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43903", "type": "seen", "source": "https://t.me/cibsecurity/69813", "content": "\u203c CVE-2022-43903 \u203c\n\nIBM Security Guardium 10.6, 11.3, and 11.4 could allow an authenticated user to cause a denial of service due to due to improper input validation. IBM X-Force ID: 240894.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T07:16:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/664831b0-078a-4b50-872e-7b1cf9819ad6/export"/>
    <published>2023-09-05T07:16:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c0aed5f9-c40e-477e-b30e-761d1b948bd9/export</id>
    <title>c0aed5f9-c40e-477e-b30e-761d1b948bd9</title>
    <updated>2026-05-04T23:18:37.525170+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c0aed5f9-c40e-477e-b30e-761d1b948bd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43906", "type": "seen", "source": "https://t.me/cibsecurity/71598", "content": "\u203c CVE-2022-43906 \u203c\n\nIBM Security Guardium 11.5 could disclose sensitive information due to a missing or insecure SameSite attribute for a sensitive cookie. IBM X-Force ID: 240897.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T18:12:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c0aed5f9-c40e-477e-b30e-761d1b948bd9/export"/>
    <published>2023-10-04T18:12:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f370e2a5-4e66-435a-9ade-5b56a2754a6a/export</id>
    <title>f370e2a5-4e66-435a-9ade-5b56a2754a6a</title>
    <updated>2026-05-04T23:18:37.525032+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f370e2a5-4e66-435a-9ade-5b56a2754a6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43902", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6733", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43902\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: IBM MQ 9.2 CD, 9.2 LTS, 9.3 CD, and 9.3 LTS is vulnerable to a denial of service attack caused by specially crafted PCF or MQSC messages.  IBM X-Force ID:  240832.\n\ud83d\udccf Published: 2023-03-01T20:44:15.672Z\n\ud83d\udccf Modified: 2025-03-06T19:07:04.617Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/6890643\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/240832", "creation_timestamp": "2025-03-06T19:38:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f370e2a5-4e66-435a-9ade-5b56a2754a6a/export"/>
    <published>2025-03-06T19:38:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c298cda3-2d7d-44c7-a271-1508a4cc090a/export</id>
    <title>c298cda3-2d7d-44c7-a271-1508a4cc090a</title>
    <updated>2026-05-04T23:18:37.524843+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c298cda3-2d7d-44c7-a271-1508a4cc090a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43901", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13069", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43901\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: \nIBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.3 could disclose sensitive information. An authenticated local attacker could exploit this vulnerability to possibly gain information to other IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps components. IBM X-Force ID: 240829.\n\n\n\ud83d\udccf Published: 2022-12-01T18:09:20.923Z\n\ud83d\udccf Modified: 2025-04-23T15:57:08.780Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/6842605\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/240829", "creation_timestamp": "2025-04-23T16:04:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c298cda3-2d7d-44c7-a271-1508a4cc090a/export"/>
    <published>2025-04-23T16:04:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/56bd8bb8-effb-4876-a8ce-ae6b76e1ae64/export</id>
    <title>56bd8bb8-effb-4876-a8ce-ae6b76e1ae64</title>
    <updated>2026-05-04T23:18:37.521995+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "56bd8bb8-effb-4876-a8ce-ae6b76e1ae64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43900", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13156", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43900\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: \nIBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.2 could provide a weaker than expected security. A local attacker can create an outbound network connection to another system. IBM X-Force ID: 240827.\n\n\n\ud83d\udccf Published: 2022-12-01T18:00:27.526Z\n\ud83d\udccf Modified: 2025-04-23T20:17:32.706Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/6842605\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/240827", "creation_timestamp": "2025-04-23T21:05:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/56bd8bb8-effb-4876-a8ce-ae6b76e1ae64/export"/>
    <published>2025-04-23T21:05:07+00:00</published>
  </entry>
</feed>
