<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T11:15:50.222556+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7cc89e7c-d10a-4eb0-b47c-f7dc57cdacb0/export</id>
    <title>7cc89e7c-d10a-4eb0-b47c-f7dc57cdacb0</title>
    <updated>2026-05-04T11:15:50.556076+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7cc89e7c-d10a-4eb0-b47c-f7dc57cdacb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43914", "type": "seen", "source": "https://t.me/cibsecurity/61683", "content": "\u203c CVE-2022-43914 \u203c\n\nIBM TRIRIGA Application Platform 4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 241036.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T18:28:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7cc89e7c-d10a-4eb0-b47c-f7dc57cdacb0/export"/>
    <published>2023-04-07T18:28:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a633116f-decb-42bb-8035-9625a51df96a/export</id>
    <title>a633116f-decb-42bb-8035-9625a51df96a</title>
    <updated>2026-05-04T11:15:50.556002+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a633116f-decb-42bb-8035-9625a51df96a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43919", "type": "seen", "source": "https://t.me/cibsecurity/63365", "content": "\u203c CVE-2022-43919 \u203c\n\nIBM MQ 9.2 CD, 9.2 LTS, 9.3 CD, and 9.3 LTS could allow an authenticated attacker with authorization to craft messages to cause a denial of service. IBM X-Force ID: 241354.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T18:25:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a633116f-decb-42bb-8035-9625a51df96a/export"/>
    <published>2023-05-05T18:25:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d6f0b705-ef8f-4025-b1aa-2bb7564176fb/export</id>
    <title>d6f0b705-ef8f-4025-b1aa-2bb7564176fb</title>
    <updated>2026-05-04T11:15:50.555921+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d6f0b705-ef8f-4025-b1aa-2bb7564176fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43910", "type": "seen", "source": "https://t.me/cibsecurity/66989", "content": "\u203c CVE-2022-43910 \u203c\n\nIBM Security Guardium 11.3 could allow a local user to escalate their privileges due to improper permission controls. IBM X-Force ID: 240908.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-19T07:25:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d6f0b705-ef8f-4025-b1aa-2bb7564176fb/export"/>
    <published>2023-07-19T07:25:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/94934d46-eb73-4256-9706-371e4de39182/export</id>
    <title>94934d46-eb73-4256-9706-371e4de39182</title>
    <updated>2026-05-04T11:15:50.555840+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "94934d46-eb73-4256-9706-371e4de39182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43915", "type": "seen", "source": "https://t.me/cvedetector/4057", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43915 - IBM App Connect Enterprise Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2022-43915 \nPublished : Aug. 24, 2024, 12:15 p.m. | 34\u00a0minutes ago \nDescription : IBM App Connect Enterprise Certified Container 5.0, 7.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, and 12.1 does not limit calls to unshare in running Pods.  This can allow a user with access to execute commands in a running Pod to elevate their user privileges. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-24T14:52:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/94934d46-eb73-4256-9706-371e4de39182/export"/>
    <published>2024-08-24T14:52:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/96bd6239-a82c-4a53-ac38-604c10ed779d/export</id>
    <title>96bd6239-a82c-4a53-ac38-604c10ed779d</title>
    <updated>2026-05-04T11:15:50.555767+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "96bd6239-a82c-4a53-ac38-604c10ed779d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43916", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113917234754823128", "content": "", "creation_timestamp": "2025-01-30T12:10:56.398768Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/96bd6239-a82c-4a53-ac38-604c10ed779d/export"/>
    <published>2025-01-30T12:10:56.398768+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/597b055a-9e91-4918-94e3-9f20a3550906/export</id>
    <title>597b055a-9e91-4918-94e3-9f20a3550906</title>
    <updated>2026-05-04T11:15:50.555687+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "597b055a-9e91-4918-94e3-9f20a3550906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43916", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgxhlqc2co2h", "content": "", "creation_timestamp": "2025-01-30T12:15:57.456699Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/597b055a-9e91-4918-94e3-9f20a3550906/export"/>
    <published>2025-01-30T12:15:57.456699+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2c24b0df-2ddb-445b-9aba-5321a298d7fc/export</id>
    <title>2c24b0df-2ddb-445b-9aba-5321a298d7fc</title>
    <updated>2026-05-04T11:15:50.555603+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2c24b0df-2ddb-445b-9aba-5321a298d7fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43916", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3480", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43916\n\ud83d\udd25 CVSS Score: 6.8 (CVSS_V3)\n\ud83d\udd39 Description: IBM App Connect Enterprise Certified Container 7.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, and 12.7 Pods do not restrict network egress for Pods that are used for internal infrastructure.\n\ud83d\udccf Published: 2025-01-30T12:31:19Z\n\ud83d\udccf Modified: 2025-01-30T12:31:19Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2022-43916\n2. https://www.ibm.com/support/pages/node/7181916", "creation_timestamp": "2025-01-30T13:11:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2c24b0df-2ddb-445b-9aba-5321a298d7fc/export"/>
    <published>2025-01-30T13:11:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5c36df7e-c845-4358-ac38-279e69d47811/export</id>
    <title>5c36df7e-c845-4358-ac38-279e69d47811</title>
    <updated>2026-05-04T11:15:50.555506+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5c36df7e-c845-4358-ac38-279e69d47811", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43916", "type": "seen", "source": "https://t.me/cvedetector/16762", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43916 - IBM App Connect Enterprise Container Network Egress Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43916 \nPublished : Jan. 30, 2025, 12:15 p.m. | 39\u00a0minutes ago \nDescription : IBM App Connect Enterprise Certified Container 7.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, and 12.7 Pods do not restrict network egress for Pods that are used for internal infrastructure. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T14:16:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5c36df7e-c845-4358-ac38-279e69d47811/export"/>
    <published>2025-01-30T14:16:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f8eb4eff-8aa2-4a1b-8fbe-f1fc2cd793c3/export</id>
    <title>f8eb4eff-8aa2-4a1b-8fbe-f1fc2cd793c3</title>
    <updated>2026-05-04T11:15:50.555393+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f8eb4eff-8aa2-4a1b-8fbe-f1fc2cd793c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43916", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgxs5lb44c2e", "content": "", "creation_timestamp": "2025-01-30T15:24:56.128899Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f8eb4eff-8aa2-4a1b-8fbe-f1fc2cd793c3/export"/>
    <published>2025-01-30T15:24:56.128899+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/561efd5e-8130-4efd-99f9-96a7a3b1631f/export</id>
    <title>561efd5e-8130-4efd-99f9-96a7a3b1631f</title>
    <updated>2026-05-04T11:15:50.552686+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "561efd5e-8130-4efd-99f9-96a7a3b1631f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43916", "type": "seen", "source": "MISP/ca7dfd4e-d0b5-4d10-8982-36d9f6e53c8e", "content": "", "creation_timestamp": "2025-09-01T13:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/561efd5e-8130-4efd-99f9-96a7a3b1631f/export"/>
    <published>2025-09-01T13:53:38+00:00</published>
  </entry>
</feed>
