<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T13:41:35.081094+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/76506224-0268-4cbd-8396-155c603c04dd/export</id>
    <title>76506224-0268-4cbd-8396-155c603c04dd</title>
    <updated>2026-05-04T13:41:35.384041+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "76506224-0268-4cbd-8396-155c603c04dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3826", "type": "seen", "source": "https://t.me/cibsecurity/67115", "content": "\u203c CVE-2023-3826 \u203c\n\nA vulnerability has been found in IBOS OA 4.5.5 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /?r=recruit/resume/edit&amp;amp;op=status of the component Interview Handler. The manipulation of the argument resumeid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235147. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-22T12:24:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/76506224-0268-4cbd-8396-155c603c04dd/export"/>
    <published>2023-07-22T12:24:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3bcfee3e-0748-48dd-8785-7cf7d14d0016/export</id>
    <title>3bcfee3e-0748-48dd-8785-7cf7d14d0016</title>
    <updated>2026-05-04T13:41:35.383874+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3bcfee3e-0748-48dd-8785-7cf7d14d0016", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38268", "type": "seen", "source": "https://t.me/ctinow/158231", "content": "https://ift.tt/9JtrKbV\nCVE-2023-38268 | IBM InfoSphere Information Server 11.7 cross-site request forgery (XFDB-260585)", "creation_timestamp": "2023-12-22T08:21:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3bcfee3e-0748-48dd-8785-7cf7d14d0016/export"/>
    <published>2023-12-22T08:21:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/78720c59-3edc-478c-8d78-a0d9d24cfc7c/export</id>
    <title>78720c59-3edc-478c-8d78-a0d9d24cfc7c</title>
    <updated>2026-05-04T13:41:35.383746+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "78720c59-3edc-478c-8d78-a0d9d24cfc7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38267", "type": "seen", "source": "https://t.me/ctinow/166298", "content": "https://ift.tt/xGKwHTf\nCVE-2023-38267", "creation_timestamp": "2024-01-11T04:32:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/78720c59-3edc-478c-8d78-a0d9d24cfc7c/export"/>
    <published>2024-01-11T04:32:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d95b168b-c594-4af0-bd20-8df5213cd480/export</id>
    <title>d95b168b-c594-4af0-bd20-8df5213cd480</title>
    <updated>2026-05-04T13:41:35.383631+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d95b168b-c594-4af0-bd20-8df5213cd480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38267", "type": "seen", "source": "https://t.me/ctinow/175724", "content": "https://ift.tt/my6VjJC\nCVE-2023-38267 | IBM Security Verify Access Appliance up to 10.0.6.1 Configuration missing encryption (XFDB-260584)", "creation_timestamp": "2024-01-30T08:11:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d95b168b-c594-4af0-bd20-8df5213cd480/export"/>
    <published>2024-01-30T08:11:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/61b35030-fe3f-4ef4-83a6-8b56af4d00e5/export</id>
    <title>61b35030-fe3f-4ef4-83a6-8b56af4d00e5</title>
    <updated>2026-05-04T13:41:35.383482+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "61b35030-fe3f-4ef4-83a6-8b56af4d00e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38263", "type": "seen", "source": "https://t.me/ctinow/177921", "content": "https://ift.tt/bi7Y93N\nCVE-2023-38263", "creation_timestamp": "2024-02-02T05:21:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/61b35030-fe3f-4ef4-83a6-8b56af4d00e5/export"/>
    <published>2024-02-02T05:21:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5c914cf6-815c-4ffa-826b-e7d0678fafa9/export</id>
    <title>5c914cf6-815c-4ffa-826b-e7d0678fafa9</title>
    <updated>2026-05-04T13:41:35.380471+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5c914cf6-815c-4ffa-826b-e7d0678fafa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38263", "type": "seen", "source": "https://t.me/ctinow/192593", "content": "https://ift.tt/T6UQR4g\nCVE-2023-38263 | IBM SOAR QRadar Plugin App up to 5.0.3 access control (XFDB-260577)", "creation_timestamp": "2024-02-24T14:16:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5c914cf6-815c-4ffa-826b-e7d0678fafa9/export"/>
    <published>2024-02-24T14:16:32+00:00</published>
  </entry>
</feed>
